Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
UtiliaCS 970x120

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Incident Response, Malware Analysis, Penetration Testing, Red Teaming

An RCE in Apple CarPlay allows root access to vehicle infotainment systems

At the DefCon security conference, researchers presented a significant exploit chain that allows attackers to gain administrator permissions for vehicle entertainment systems through Apple CarPlay. The attack known as "Pwn...
Share on Facebook Share on LinkedIn Share on X

Critical vulnerability in Adobe Commerce and Magento: the SessionReaper bug

Adobe has reported a critical bug (CVE-2025-54236) affecting the Commerce and Magento platforms. Researchers have called this vulnerability SessionReaper and describe it as one of the most serious in the...
Share on Facebook Share on LinkedIn Share on X

Microsoft Patch Tuesday for September: 81 vulnerabilities and 2 active 0days

The recent September Patch Tuesday security update saw Microsoft release a comprehensive series of updates, addressing a total of 81 vulnerabilities in its products and services. Specifically, 9 of these...
Share on Facebook Share on LinkedIn Share on X

Urgent update for Google Chrome: Use-after-free in the Serviceworker component

An urgent security update has been released by Google for the Chrome browser on Windows, Mac, and Linux operating systems. This new version fixes a critical vulnerability that could allow...
Share on Facebook Share on LinkedIn Share on X

A critical bug in FortiDDoS-F leads to the execution of unauthorized commands

A security flaw has been discovered in Fortinet's FortiDDoS-F product line that could allow a privileged attacker to execute prohibited commands. The vulnerability, classified as CVE-2024-45325, involves an operating system...
Share on Facebook Share on LinkedIn Share on X

Apache Jackrabbit RCE Vulnerability: Exploitation in Progress, Update Now

A dangerous vulnerability has been discovered in Apache Jackrabbit that could lead to remote execution of arbitrary code and compromise enterprise systems. The issue is registered as CVE-2025-58782 and affects...
Share on Facebook Share on LinkedIn Share on X

WhatsApp and Apple in emergency: DNG bug allows remote control without clicking

On August 20, Apple released an unscheduled security update for all major operating systems: iOS, iPadOS, macOS, and other platforms. The patch addresses the CVE-2025-43300 vulnerability in the ImageIO module:...
Share on Facebook Share on LinkedIn Share on X

CrowdStrike Threat Hunting Report 2025: Cybercriminals Use AI for Large-Scale Attacks

Over 320 companies have been breached by groups linked to North Korea (DPRK) with generative AI-powered attacks. Threat actors are leveraging AI agents, making autonomous systems the new attack perimeter...
Share on Facebook Share on LinkedIn Share on X

LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy

In the current cybersecurity landscape, threats are moving ever faster and more sophisticated. Traditional defense tools are no longer sufficient to ensure complete visibility, especially when the attack leaves no...
Share on Facebook Share on LinkedIn Share on X

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing University and the University of Sydney have an...
Share on Facebook Share on LinkedIn Share on X