Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
Banner Ransomfeed 970x120 1

Author: Agostino Pellegrino

Agostino Pellegrino

He is a freelancer, teacher and expert in Computer Forensics, Cyber Security and Ethical Hacking and Network Management. He has collaborated with leading educational institutions internationally and has practiced teaching and mentorship in advanced Offensive Security techniques for NATO obtaining major awards from the U.S. Government. His motto is "Study. Always."

Profilo LinkedIn
Areas of Expertise Incident Response, Malware Analysis, Penetration Testing, Red Teaming

Rootkit on Cisco Devices: Operation Zero Disk Discovered

A sophisticated attack campaign dubbed “Operation Zero Disk” has recently been detected, where threat actors are actively exploiting a critical vulnerability in the Cisco Simple Network Management Protocol (SNMP) to...
Share on Facebook Share on LinkedIn Share on X

12 security bugs discovered in Ivanti Endpoint Manager (EPM). Update now!

Ivanti has published 13 vulnerabilities in its Endpoint Manager (EPM) software , including two high-severity flaws that could allow remote code execution and privilege escalation . Despite the lack of...
Share on Facebook Share on LinkedIn Share on X

A PNG containing a Trojan. Astaroth persistently abuses GitHub.

McAfee researchers have reported new activity by the Astaroth banking trojan , which has started using GitHub as a persistent channel for distributing configuration data. This approach allows attackers to...
Share on Facebook Share on LinkedIn Share on X

7-Zip Vulnerable: Symbolic Link Exploit Allows Malicious Code Injection

Two critical vulnerabilities in the 7-Zip archiver allowed remote code execution when processing ZIP files. The flaws affect how the program handles symbolic links within archives, allowing directory traversal and...
Share on Facebook Share on LinkedIn Share on X

Oracle E-Business Suite Zero-Day Attack: Clop Exploits CVE-2025-61882

Last week, Oracle warned customers of a critical zero-day vulnerability in its E-Business Suite (CVE-2025-61882), which allows remote execution of arbitrary code without authentication. It has now been revealed that...
Share on Facebook Share on LinkedIn Share on X

RediShell: A 13-year-old score 10 RCE has been upgraded to Redis

A 13-year-old critical flaw, known as RediShell , in Redis allows remote code execution (RCE) , giving attackers the ability to gain full control of the underlying host system. The...
Share on Facebook Share on LinkedIn Share on X

Oracle E-Business Suite 9.8 Vulnerability: Urgent Updates Needed

Oracle has published a security advisory regarding a critical vulnerability identified as CVE-2025-61882 in the Oracle E-Business Suite . The flaw can be exploited remotely without authentication , potentially allowing...
Share on Facebook Share on LinkedIn Share on X

With 50 dollars and physical access to the server, the Cloud goes to hell

A team of researchers has developed a simple hardware tool that challenges the fundamental principles of trusted computing in modern cloud environments. Using a device costing less than $50, they...
Share on Facebook Share on LinkedIn Share on X

From user to root in a second! CISA warns: millions of operating systems at risk. Patch!

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in the popular Sudo utility, used on Linux and Unix-like systems, to its catalog of currently exploitable...
Share on Facebook Share on LinkedIn Share on X

0-day 0-click WhatsApp! All it takes is one image to take control of your iPhone.

Some spyware producer is probably doing gymnastics... tearing their hair out. But it's the usual charade: someone finds, someone cashes in, someone integrates, and then the researcher on duty comes...
Share on Facebook Share on LinkedIn Share on X