Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
UtiliaCS 970x120

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Incident Response, Malware Analysis, Penetration Testing, Red Teaming

Auto-Color malware distributed via a vulnerability in SAP NetWeaver

Darktrace has recorded a targeted attack on a US chemical company, in which attackers exploited a critical vulnerability in the SAP NetWeaver platform. The threat, registered as CVE-2025-31324, consisted of...
Share on Facebook Share on LinkedIn Share on X

New macOS bug allows TCC bypass to steal user data

Microsoft said that attackers may have exploited a recently patched Transparency, Consent, and Control (TCC) bypass vulnerability to steal sensitive information from macOS users, including cached Apple Intelligence data. TCC...
Share on Facebook Share on LinkedIn Share on X

Is Your Smart TV Spying on You? Security Gaps and Critical Vulnerabilities in IoT Devices

Networked smart devices are no longer simple helpers, but potential enemies. With every new thermostat or TV connected to the internet, a new flaw opens up in the digital infrastructure...
Share on Facebook Share on LinkedIn Share on X

Zero-click exploits: the new invisible frontier of cyber attacks

In recent years, cybersecurity has seen the emergence of increasingly sophisticated threats, capable of compromising devices and personal data without the user taking any action. Among these, so-called zero-click exploits...
Share on Facebook Share on LinkedIn Share on X

Fire Ant Attacks: How a vCenter Bug Opens the Door to IT Hell

Sygnia reports that the initial Fire Ant attack vector, CVE-2023-34048, exploits an out-of-bounds write vulnerability in the vCenter Server implementation of the DCERPC protocol, allowing unauthenticated remote code execution. Security...
Share on Facebook Share on LinkedIn Share on X

What are Vulnerability Assessments? A Journey into Automated Software Vulnerability Scanning

A vulnerability assessment is a process of evaluating computer systems, networks, and applications to identify vulnerabilities that could be exploited by attackers to compromise the system's security. The primary goal...
Share on Facebook Share on LinkedIn Share on X

SharePoint Exploits Are Underway: Businesses and Organizations in the Crosshairs

The threat landscape never sleeps, but this time it woke up with a bang. On July 18, 2025, security firm Eye Security issued a warning that immediately resonated throughout the...
Share on Facebook Share on LinkedIn Share on X

16 flaws discovered in MediaTek chips: smartphones and smart TVs at risk!

In an age where connectivity is ubiquitous and smart devices are an integral part of our daily lives, cybersecurity is no longer optional, but a necessity. Every month, major chip...
Share on Facebook Share on LinkedIn Share on X

Sophos fixes five vulnerabilities in Sophos Firewall, two of which are rated critical

Sophos recently announced the fixes for five independent security vulnerabilities found in its firewalls, some critical and others high and medium. The vulnerabilities have been fixed via automatically distributed hotfixes,...
Share on Facebook Share on LinkedIn Share on X

Vulnerability in 7-Zip: Attackers can perform denial-of-service attacks

A critical security flaw related to memory corruption has been discovered in the popular 7-Zip archiver. This vulnerability can be exploited by attackers to cause denial-of-service conditions by creating malicious...
Share on Facebook Share on LinkedIn Share on X