Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
Banner Ancharia Desktop 1 1

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Incident Response, Malware Analysis, Penetration Testing, Red Teaming
Numero di articoli trovati: 222

BadUSB. Webcam Spyware: The Lenovo Bug Threatening Millions of PCs

Researchers at Eclypsium have identified dangerous vulnerabilities in the Lenovo 510 FHD and Lenovo Performance FHD webcams that can be transformed into BadUSB attack devices. The issue, dubbed BadCam, was...

Satellites Under Hackers’ Control: “It’s Easier to Hack Them Than to Use Satellite Weapons”

At the Black Hat conference in Las Vegas, VisionSpace Technologies demonstrated that it is much easier and cheaper to disable a satellite or alter its trajectory than to use anti-satellite...

Critical vulnerability in Google’s Gemini CLI allows malicious commands to be executed.

A serious vulnerability has been discovered in Google's recently released Gemini CLI tool, which allows attackers to silently execute malicious commands and leak data from developers' computers if certain commands...

Google Hacked by ShinyHunters Cybergang. Customer Database Information Stolen

No IT giant can consider itself safe from cybercrime threats. We've seen these types of problems at Red Hot Cyber. For example, major companies like Microsoft and Apple have been...

Two Android Vulnerabilities Actively Exploited: Google Releases Critical Patches

Google has released the August security updates for Android, which contain patches for six vulnerabilities. Two of these are related to Qualcomm components and have already been exploited in targeted...

Adobe Experience Manager Forms under attack! Urgent patch for a score 10 RCE zero-day bug.

On August 5, 2025, Adobe released an urgent security update for Adobe Experience Manager (AEM) Forms on Java Enterprise Edition (JEE), addressing two serious vulnerabilities: CVE-2025-54253 and CVE-2025-54254. The most...

With ToolShell, you can access the Internet information Services (IIS) Machine keys.

In an article published on August 5, 2025, on the ISC SANS blog by Bojan Zdrnja, it is possible to steal "machine keys" from IIS servers. The author explores the...

Critical Bugs on NVIDIA Triton Allow Attackers to Compromise and Steal AI Model

Critical vulnerabilities have been discovered in NVIDIA's Triton Inference Server, threatening the security of AI infrastructure on Windows and Linux. The open-source solution is designed for large-scale deployment and maintenance...

0-day/0-click RCE exploit for sale on iOS. Explore the cyberweapons market for espionage.

An online forum posting dated July 26, 2025, caught our attention: a user named "Bucad" advertised the sale of an iOS RCE Exploit 0day | ZeroClick/1Click. The exploit, apparently capable...

WhatsApp in the crosshairs! At Pwn2Own Ireland 2025, a $1 million prize will be awarded for a zero-click RCE exploit.

Trend Micro's Zero Day Initiative (ZDI) has announced a reward worthy of a zero-day broker! An unprecedented $1,000,000 reward is being offered to anyone who can develop a zero-click remote...