Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
HackTheBox 970x120 1

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Incident Response, Malware Analysis, Penetration Testing, Red Teaming
Numero di articoli trovati: 222

Vulnerability in 7-Zip: Attackers can perform denial-of-service attacks

A critical security flaw related to memory corruption has been discovered in the popular 7-Zip archiver. This vulnerability can be exploited by attackers to cause denial-of-service conditions by creating malicious...

ToolShell: The New Threat Affecting Microsoft SharePoint Servers

An advanced cyberattack campaign has been detected targeting Microsoft SharePoint servers. This threat exploits a series of vulnerabilities, known as "ToolShell," which allows attackers to gain complete and remote control...

Millions of vehicles at risk of RCE attacks via the PerfektBlue Bluetooth bug

Four vulnerabilities, dubbed PerfektBlue, affect OpenSynergy's Bluetooth BlueSDK stack. The vulnerabilities allow remote execution of arbitrary code and could contribute to accessing critical components in vehicles from manufacturers such as...

What is ICT Risk Management? A process that supports cybersecurity.

ICT Risk Management is a process that identifies, assesses, and manages risks related to the use of information and communications technologies (ICT). It is a fundamental aspect for any organization...

The World of Cybercrime: From Profit-Seeking Criminals to Hacktivists and State-Owned Hackers

The increasingly widespread use of digital technologies has opened up new opportunities for cybercriminals operating online, giving rise to a veritable cybercrime ecosystem. In this context, various actors can jeopardize...

Three score 10 bugs have been detected in Cisco ISE and ISE-PIC: urgent updates required.

Several vulnerabilities have been identified in the Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) products that could allow a remote attacker to execute arbitrary commands...

Google Chrome emergency fix for critical bug that leads to sandbox escape

Google has released an emergency update for the Chrome browser, simultaneously eliminating six vulnerabilities, one of which is already actively exploited in real-world attacks. The issue affects critical components associated...

The new version of the Konfety malware uses advanced evasion techniques

A new version of the Android malware called Konfety has become even more sophisticated: specialists at Zimperium zLabs have discovered an improved variant that uses non-standard ZIP archives and loads...

RenderShock: The new digital threat that attacks Windows systems with a mouse click

A new form of digital attack called RenderShock has hit corporate Windows systems. It doesn't require any clicks or opening attachments: everything happens completely in the background, via trusted preview...

Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10

This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have...