Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
HackTheBox 320x100 1
Crowdstriker 970×120

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Incident Response, Malware Analysis, Penetration Testing, Red Teaming
Numero di articoli trovati: 222

A critical bug in Ollama allows for model replacement attacks

A vulnerability in the popular AI model launcher Ollama opened the door to drive-by attacks, allowing attackers to silently interfere with the local application via a specially crafted website, read...

Critical Score 10 Vulnerability in Erlang/Open Telecom Platform: Active Exploits on the Rise

Researchers recorded that a critical flaw in the Erlang/Open Telecom Platform SSH stack implementation began being actively exploited as early as early May 2025; approximately 70% of detections occurred on...

SQLite, Nginx, and Apache collapse in a day. Will hackers and AI agents revolutionize bug hunting?

Developing AI agents capable of identifying vulnerabilities in complex systems is still a challenging task that requires a lot of manual labor. However, these agents offer a major advantage: unlike...

A critical vulnerability has been discovered in Microsoft Web Deploy

A Microsoft Web Deploy tool has a critical security flaw that could be exploited by authenticated attackers to execute code on affected systems. This is the bug tracked under CVE-2025-53772,...

Google fixes critical bug in Gemini that allows tracking of users

Google developers have fixed a bug that allowed malicious Google Calendar invitations to remotely take control of Gemini agents running on the victim's device and steal user data. Gemini is...

Cobalt Strike for everyone with CrossC2! We’re paying attention to Linux servers without EDR

Japan has been hit by a new wave of cyberattacks using CrossC2, a tool to extend the functionality of Cobalt Strike to Linux and macOS platforms. The JPCERT/CC Coordination Center...

Bug da Oscar (score 10) per Cisco Secure Firewall Management Center

A critical security flaw has been disclosed by Cisco in its Secure Firewall Management Center (FMC) software, potentially allowing unauthenticated attackers to remotely execute shell commands of their choice with...

Heading for a bang for August! 36 RCEs for Microsoft Patch Tuesday August

August Patch Tuesday: Microsoft releases security updates that fix 107 vulnerabilities across its ecosystem products. The update includes fixes for 90 vulnerabilities, classified as follows: 13 are critical, 76 are...

Critical RCE vulnerability in Microsoft Teams: Urgent update needed

As part of the August 2025 Patch Tuesday security updates, a critical Remote Code Execution (RCE) vulnerability in Microsoft's Teams collaboration software has been patched. The critical flaw, tracked as...

As expected, the WinRAR bug has become a devastating weapon for cyber criminals

As expected, the infamous WinRAR bug is now being actively exploited by attackers on a large scale, given the software's widespread use and popularity. ESET experts have reported that the...