Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Heliaca 970x120 1

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Cybersecurity architecture, Threat intelligence, Digital forensics, Offensive security, Incident response & SOAR, Malware analysis, Compliance & frameworks

Agostino Pellegrino is an expert in cybersecurity, cyber threat intelligence, and digital forensics with over twenty years of experience, specialized in integrating technical research, field operations, and advanced training. Founder of ApInfoSec and technical contributor for Red Hot Cyber, he works on designing secure architectures, incident response, SOC/CTI/DFIR engineering, and advanced teaching. His approach is evidence-based, focused on resilience, automation, and compliance with major frameworks and standards.

Positions and Roles

  • Founder and Head – ApInfoSec: specialized consultancy, security design, cyber intelligence, incident response, digital forensics, and advanced training.
  • Technical Contributor – Red Hot Cyber: publishing articles, threat analyses, case studies, and insights on offensive and defensive techniques.
  • Instructor and Trainer: ITS programs, master’s courses, and specialized training in offensive security, penetration testing, threat intelligence, malware analysis, incident response, digital forensics, cloud security, and governance.

Core Competencies

  • Design and evaluation of enterprise and hybrid security architectures.
  • Offensive security, vulnerability assessment, and penetration testing.
  • Cyber threat intelligence, OSINT, and monitoring criminal ecosystems.
  • Malware analysis and controlled static reverse engineering.
  • Digital forensics on endpoints, servers, and cloud environments.
  • Incident response, operational playbooks, and orchestration (SOAR).
  • Compliance and alignment with ISO/IEC 27001, NIS2, GDPR, IEC 62443, DORA, MITRE ATT&CK, FIRST.
  • Development of integrated SOC/CTI operational platforms (Elastic, OpenCTI, MISP, Wazuh, Velociraptor, XSOAR).

Initiatives and Contributions

  • Development of SOC and CTI operational platforms based on open-source and commercial stacks, focusing on automation, correlation, and data quality.
  • Design of training syllabi combining theory and hands-on labs for real operational skills.

Recognitions, Projects, Certifications, and Publications

  • Author of articles and technical contributions for Red Hot Cyber.

Professional Vision

Agostino views cybersecurity as a systemic discipline where technology, processes, and human factors must be integrated. He promotes awareness, continuous verification, adaptability, and skills development, avoiding purely formal approaches. He stands out for translating complex concepts into concrete operational models, balancing technical depth, methodological rigor, and practical usability.

Numero di articoli trovati: 112

ToolShell: The New Threat Affecting Microsoft SharePoint Servers

An advanced cyberattack campaign has been detected targeting Microsoft SharePoint servers. This threat exploits a series of vulnerabilities, known as "ToolShell," which allows attackers to gain complete and remote control...

What is ICT Risk Management? A process that supports cybersecurity.

ICT Risk Management is a process that identifies, assesses, and manages risks related to the use of information and communications technologies (ICT). It is a fundamental aspect for any organization...

The new version of the Konfety malware uses advanced evasion techniques

A new version of the Android malware called Konfety has become even more sophisticated: specialists at Zimperium zLabs have discovered an improved variant that uses non-standard ZIP archives and loads...

RenderShock: The new digital threat that attacks Windows systems with a mouse click

A new form of digital attack called RenderShock has hit corporate Windows systems. It doesn't require any clicks or opening attachments: everything happens completely in the background, via trusted preview...

Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10

This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have...

A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.

Huntress researchers have detected active exploitation of a critical vulnerability in Wing FTP Server, just one day after its public disclosure. The vulnerability CVE-2025-47812 has been assigned the highest severity...

The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase

China's growing rise has prompted U.S. officials to strongly emphasize the need to improve its offensive cyber capabilities. However, some doubts remain about the ability to meet the challenge, given...

Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers

Hundreds of printer models from Brother and other manufacturers (Fujifilm, Toshiba, Ricoh and Konica Minolta) have been found to be vulnerable to serious vulnerabilities discovered by researchers at Rapid7. For...

US-Iran Cyberwar: DHS Raises Alarm, American Networks Under Attack

The United States has warned of possible cyber attacks by pro-Iranian groups following a series of airstrikes against Iranian nuclear facilities, as part of the armed conflict between Iran and...

“Jailbreak as a Service” is Coming: 60 Euros a Month to Purchase Cybercrime-Ready AI Systems

According to a report by Cato Networks, cybercriminals continue to actively use LLM patterns in their attacks. Specifically, we are talking about versions of theGrok and Mixtral patterns that have been deliberately modified to bypass...