Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
970x120 Olympous

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Incident Response, Malware Analysis, Penetration Testing, Red Teaming

Heading for a bang for August! 36 RCEs for Microsoft Patch Tuesday August

August Patch Tuesday: Microsoft releases security updates that fix 107 vulnerabilities across its ecosystem products. The update includes fixes for 90 vulnerabilities, classified as follows: 13 are critical, 76 are...
Share on Facebook Share on LinkedIn Share on X

Critical RCE vulnerability in Microsoft Teams: Urgent update needed

As part of the August 2025 Patch Tuesday security updates, a critical Remote Code Execution (RCE) vulnerability in Microsoft's Teams collaboration software has been patched. The critical flaw, tracked as...
Share on Facebook Share on LinkedIn Share on X

Satellites Under Hackers’ Control: “It’s Easier to Hack Them Than to Use Satellite Weapons”

At the Black Hat conference in Las Vegas, VisionSpace Technologies demonstrated that it is much easier and cheaper to disable a satellite or alter its trajectory than to use anti-satellite...
Share on Facebook Share on LinkedIn Share on X

Critical vulnerability in Google’s Gemini CLI allows malicious commands to be executed.

A serious vulnerability has been discovered in Google's recently released Gemini CLI tool, which allows attackers to silently execute malicious commands and leak data from developers' computers if certain commands...
Share on Facebook Share on LinkedIn Share on X

Two Android Vulnerabilities Actively Exploited: Google Releases Critical Patches

Google has released the August security updates for Android, which contain patches for six vulnerabilities. Two of these are related to Qualcomm components and have already been exploited in targeted...
Share on Facebook Share on LinkedIn Share on X

With ToolShell, you can access the Internet information Services (IIS) Machine keys.

In an article published on August 5, 2025, on the ISC SANS blog by Bojan Zdrnja, it is possible to steal "machine keys" from IIS servers. The author explores the...
Share on Facebook Share on LinkedIn Share on X

Critical Bugs on NVIDIA Triton Allow Attackers to Compromise and Steal AI Model

Critical vulnerabilities have been discovered in NVIDIA's Triton Inference Server, threatening the security of AI infrastructure on Windows and Linux. The open-source solution is designed for large-scale deployment and maintenance...
Share on Facebook Share on LinkedIn Share on X

0-day/0-click RCE exploit for sale on iOS. Explore the cyberweapons market for espionage.

An online forum posting dated July 26, 2025, caught our attention: a user named "Bucad" advertised the sale of an iOS RCE Exploit 0day | ZeroClick/1Click. The exploit, apparently capable...
Share on Facebook Share on LinkedIn Share on X

WhatsApp in the crosshairs! At Pwn2Own Ireland 2025, a $1 million prize will be awarded for a zero-click RCE exploit.

Trend Micro's Zero Day Initiative (ZDI) has announced a reward worthy of a zero-day broker! An unprecedented $1,000,000 reward is being offered to anyone who can develop a zero-click remote...
Share on Facebook Share on LinkedIn Share on X

Analysis of the Silver Fox Trojan’s Google Translate-imitating attack campaign

According to the Knownsec 404 Advanced Threat Intelligence Team, a surge in attack activity has recently been observed involving the Silver Fox Trojan, which mimics popular tools such as Google...
Share on Facebook Share on LinkedIn Share on X