Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Banner Desktop

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Cybersecurity architecture, Threat intelligence, Digital forensics, Offensive security, Incident response & SOAR, Malware analysis, Compliance & frameworks

Agostino Pellegrino is an expert in cybersecurity, cyber threat intelligence, and digital forensics with over twenty years of experience, specialized in integrating technical research, field operations, and advanced training. Founder of ApInfoSec and technical contributor for Red Hot Cyber, he works on designing secure architectures, incident response, SOC/CTI/DFIR engineering, and advanced teaching. His approach is evidence-based, focused on resilience, automation, and compliance with major frameworks and standards.

Positions and Roles

  • Founder and Head – ApInfoSec: specialized consultancy, security design, cyber intelligence, incident response, digital forensics, and advanced training.
  • Technical Contributor – Red Hot Cyber: publishing articles, threat analyses, case studies, and insights on offensive and defensive techniques.
  • Instructor and Trainer: ITS programs, master’s courses, and specialized training in offensive security, penetration testing, threat intelligence, malware analysis, incident response, digital forensics, cloud security, and governance.

Core Competencies

  • Design and evaluation of enterprise and hybrid security architectures.
  • Offensive security, vulnerability assessment, and penetration testing.
  • Cyber threat intelligence, OSINT, and monitoring criminal ecosystems.
  • Malware analysis and controlled static reverse engineering.
  • Digital forensics on endpoints, servers, and cloud environments.
  • Incident response, operational playbooks, and orchestration (SOAR).
  • Compliance and alignment with ISO/IEC 27001, NIS2, GDPR, IEC 62443, DORA, MITRE ATT&CK, FIRST.
  • Development of integrated SOC/CTI operational platforms (Elastic, OpenCTI, MISP, Wazuh, Velociraptor, XSOAR).

Initiatives and Contributions

  • Development of SOC and CTI operational platforms based on open-source and commercial stacks, focusing on automation, correlation, and data quality.
  • Design of training syllabi combining theory and hands-on labs for real operational skills.

Recognitions, Projects, Certifications, and Publications

  • Author of articles and technical contributions for Red Hot Cyber.

Professional Vision

Agostino views cybersecurity as a systemic discipline where technology, processes, and human factors must be integrated. He promotes awareness, continuous verification, adaptability, and skills development, avoiding purely formal approaches. He stands out for translating complex concepts into concrete operational models, balancing technical depth, methodological rigor, and practical usability.

Numero di articoli trovati: 112

Cybersecurity in the Middle East: Egitto and Qatar Lead the Way

Global attention to cybersecurity continues to grow in a context dominated by digital transformation and the rapid spread of artificial intelligence (AI) technologies, making it easier to identify vulnerabilities and...

BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected

Researchers at the Google Threat Intelligence Group (GTIG) have uncovered details of an espionage campaign conducted by the Chinese group APT24. This activity has been ongoing for approximately three years,...

ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.

Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack schemes. Attention focused on the Raspberry Pi, which the attackers used...

Critical Vulnerability in Azure Bastion Scores 10! When RDP and SSH in the Cloud Are Checkmated

An authentication bypass vulnerability has been discovered in Azure Bastion , Microsoft's managed service that enables secure RDP and SSH connections to virtual machines in Azure without directly exposing them...

IBM AIX: Two critical bugs allow execution of arbitrary commands (Score 10 and 9.6)

Two serious vulnerabilities in IBM's AIX operating system could allow remote attackers to execute arbitrary commands on affected systems, prompting the company to issue important security updates. Both vulnerabilities represent...

A bug in ImunifyAV antivirus leads to RCE. 56 million sites at risk.

A vulnerability has been discovered in the Linux hosting ecosystem : the ImunifyAV malware scanner has been found to be vulnerable to remote code execution (RCE). The issue affects the...

Two 0-day attacks, one attack: the perfect strike against Citrix and Cisco. Amazon’s discovery

Amazon ha segnalato un complesso attacco informatico in cui gli aggressori hanno sfruttato simultaneamente due vulnerabilità zero-day, presenti nei prodotti Citrix e Cisco. Secondo il responsabile della sicurezza informatica dell'azienda,...

Let’s find out what cyber insurance is. It insures your online business, but not only that.

The digital world is constantly evolving, and with the growth of online activity, protecting your business from potential cyber threats has become increasingly important. Cyber insurance is a form of...

CISA Warns! New Bugs in Gladinet, Control Web Panel, and WordPress Expose Systems

Two vulnerabilities related to Gladinet and Control Web Panel (CWP) have been added to the U.S. Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs), due to...

0day as weapons: sold 8 US defense 0day exploits to Moscow

Peter Williams, a former employee of the defense contractor, pleaded guilty in US federal court to two counts of theft of trade secrets, admitting to selling eight zero-day vulnerabilities to...