Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Olympous
UtiliaCS 970x120

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Incident Response, Malware Analysis, Penetration Testing, Red Teaming
Numero di articoli trovati: 222

It’s a global cyber shock! Beijing’s 007s are infiltrating and compromising the world’s Internet backbones.

The United States and several allied countries have issued a joint warning about a growing cyber offensive conducted by actors sponsored by the People's Republic of China. According to a...

Critical vulnerabilities in NetScaler ADC and Gateway. Update now! Attacks are ongoing!

NetScaler has alerted administrators of three new vulnerabilities in NetScaler ADC and NetScaler Gateway, one of which is already being used in active attacks. Updates are available and the vendor...

The US Army evolves: more power for cyber and electronic operations

The U.S. Army is increasingly investing in reintroducing electronic warfare capabilities among its troops, planning to equip division-level units with advanced cyber tools over the next two years. This development...

19 million installs of 77APP spread malware on Google Play

Zscaler researchers discovered that 77 malicious Android apps, with a combined total of over 19 million installs, were distributing various malware families in the official Google Play store. "We identified...

PoC Zero-Click Exploit on iPhone and Mac: How Two Bytes Can Compromise the Apple Ecosystem

An in-depth analysis and proof-of-concept example has been released regarding CVE-2025-43300, a critical security flaw in Apple's image processing infrastructure that allows remote code execution without the need for a...

Google’s 2025 Performance Review: Fewer Bugs, More Vibe Coding

For Google employees, "staying ahead of the curve" means not just developing AI, but also being able to use it every day. In recent months, the company has seen growing...

Critical Downgrade Bug in Chat-GPT Leads to Jailbreak of Model

A critical flaw found in OpenAI's latest model, ChatGPT-5, allows attackers to bypass advanced security features through the use of simple expressions. This bug, dubbed "PROMISQROUTE" by researchers at Adversa...

Mozilla Fixes Dangerous RCE Bug in Firefox 142

Mozilla has fixed several high-severity security bugs with the release of Firefox 142, preventing attackers from remotely executing code of their choosing on affected systems. The security advisory, published on...

LastPass, 1Password, and Keeper under fire! Widespread zero-day bugs detected, putting millions of users at risk.

A cybersecurity expert has identified zero-day vulnerabilities affecting eleven popular password managers, potentially putting tens of millions of users at risk of credential theft with a single malicious click. An...

Zero-Day RCE Exploit for Windows Selling for $125,000: How to Protect Yourself

Browsing the dark web can reveal disturbing and alarming ads for those involved in cybersecurity. Recently, we noticed a post offering a zero-day exploit, an extremely dangerous type of tool,...