Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Redhotcyber Banner Sito 970x120px Uscita 101125

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Cybersecurity architecture, Threat intelligence, Digital forensics, Offensive security, Incident response & SOAR, Malware analysis, Compliance & frameworks

Agostino Pellegrino is an expert in cybersecurity, cyber threat intelligence, and digital forensics with over twenty years of experience, specialized in integrating technical research, field operations, and advanced training. Founder of ApInfoSec and technical contributor for Red Hot Cyber, he works on designing secure architectures, incident response, SOC/CTI/DFIR engineering, and advanced teaching. His approach is evidence-based, focused on resilience, automation, and compliance with major frameworks and standards.

Positions and Roles

  • Founder and Head – ApInfoSec: specialized consultancy, security design, cyber intelligence, incident response, digital forensics, and advanced training.
  • Technical Contributor – Red Hot Cyber: publishing articles, threat analyses, case studies, and insights on offensive and defensive techniques.
  • Instructor and Trainer: ITS programs, master’s courses, and specialized training in offensive security, penetration testing, threat intelligence, malware analysis, incident response, digital forensics, cloud security, and governance.

Core Competencies

  • Design and evaluation of enterprise and hybrid security architectures.
  • Offensive security, vulnerability assessment, and penetration testing.
  • Cyber threat intelligence, OSINT, and monitoring criminal ecosystems.
  • Malware analysis and controlled static reverse engineering.
  • Digital forensics on endpoints, servers, and cloud environments.
  • Incident response, operational playbooks, and orchestration (SOAR).
  • Compliance and alignment with ISO/IEC 27001, NIS2, GDPR, IEC 62443, DORA, MITRE ATT&CK, FIRST.
  • Development of integrated SOC/CTI operational platforms (Elastic, OpenCTI, MISP, Wazuh, Velociraptor, XSOAR).

Initiatives and Contributions

  • Development of SOC and CTI operational platforms based on open-source and commercial stacks, focusing on automation, correlation, and data quality.
  • Design of training syllabi combining theory and hands-on labs for real operational skills.

Recognitions, Projects, Certifications, and Publications

  • Author of articles and technical contributions for Red Hot Cyber.

Professional Vision

Agostino views cybersecurity as a systemic discipline where technology, processes, and human factors must be integrated. He promotes awareness, continuous verification, adaptability, and skills development, avoiding purely formal approaches. He stands out for translating complex concepts into concrete operational models, balancing technical depth, methodological rigor, and practical usability.

Numero di articoli trovati: 112

New macOS bug allows TCC bypass to steal user data

Microsoft said that attackers may have exploited a recently patched Transparency, Consent, and Control (TCC) bypass vulnerability to steal sensitive information from macOS users, including cached Apple Intelligence data. TCC...

Is Your Smart TV Spying on You? Security Gaps and Critical Vulnerabilities in IoT Devices

Networked smart devices are no longer simple helpers, but potential enemies. With every new thermostat or TV connected to the internet, a new flaw opens up in the digital infrastructure...

Zero-click exploits: the new invisible frontier of cyber attacks

In recent years, cybersecurity has seen the emergence of increasingly sophisticated threats, capable of compromising devices and personal data without the user taking any action. Among these, so-called zero-click exploits...

Vibecoding to create ransomware: FunkSec cybergang uses AI for cyberattacks

Kaspersky Lab specialists studied the activity of the FunkSec group, which emerged in late 2024. The group's main characteristics were: the use of AI-based tools (including in the development of...

Discovering the Cyber Kill Chain. Defend your network and learn how to attack and defend yourself.

In the digital age, cybersecurity has become a priority for businesses and individuals. Among the most fearsome threats are cyberattacks, targeted intrusions that can cause significant damage, both financially and...

What are Vulnerability Assessments? A Journey into Automated Software Vulnerability Scanning

A vulnerability assessment is a process of evaluating computer systems, networks, and applications to identify vulnerabilities that could be exploited by attackers to compromise the system's security. The primary goal...

Red Hot Cyber Conference 2026. The fifth edition in Rome on Monday, May 18th and Tuesday, May 19th.

The Red Hot Cyber Conference is back! After the great success of the third and fourth editions, the free annual event created by the RHC community is back! An event...

Cyberattacks skyrocket in Europe! Every three minutes, a company is hit.

With the rapid growth of digital threats, businesses around the world are under cyberattack. According to the latest data from Check Point Research, each organization experiences an average of 1,984...

What is Secure Code Development? Discovering an essential practice in cybersecurity.

In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These four pillars are Patch Management, Hardening, Secure Code Development, and...

Vulnerability in 7-Zip: Attackers can perform denial-of-service attacks

A critical security flaw related to memory corruption has been discovered in the popular 7-Zip archiver. This vulnerability can be exploited by attackers to cause denial-of-service conditions by creating malicious...