Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
Banner Ransomfeed 970x120 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Sandro Sana

Sandro Sana
(161 articoli, 146 italiano, 15 inglese)161 articoli
146 italiano, 15 inglese
Member of the Red Hot Cyber Dark Lab team and director of the Red Hot Cyber Podcast. He has worked in Information Technology since 1990 and specialized in Cybersecurity since 2014 (CEH - CIH - CISSP - CSIRT Manager - CTI Expert). Speaker at SMAU 2017 and SMAU 2018, lecturer for SMAU Academy & ITS, and member of ISACA. He is also a member of the Scientific Committee of the national Competence Center Cyber 4.0, where he contributes to the strategic direction of research, training, and innovation activities in the cybersecurity.
Areas of Expertise: Cyber Threat Intelligence, NIS2, Security Governance & Compliance, CSIRT & Crisis Management, Research, Disclosure, and Cyber Culture

Ultimi articoli di Sandro Sana

Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities
This news comes to us from Recorded Future (Insikt Group) News & Research feed: Check Point Research has documented a new wave of activity attribu...
The Dark Side of AI: How Technology is Being Used to Control Humans
Cory Doctorow says it with the clarity of someone who has studied the consequences of digital capitalism for years: AI, as it’s sold today, isn’t ...
The Dark Side of Internet Control: Durov’s Warning
Post 462 on Durov’s official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool...
New Penetration Testing Methods: Adversary Emulation and the Importance of a Non-Technological Approach to Corporate Security
In the ever-evolving digital world, cybersecurity threats are becoming increasingly sophisticated and pervasive. Companies in every industry face a gr...
They told you 6G would be fast, right? But they didn’t tell you the whole truth
It’s not “ just faster ”: 6G changes the very nature of the network! When we talk about 6G, we risk reducing everything to a speed upgrade, as i...
Mossad, the rigged supply chain, and intimidated judges
Yossi Cohen, former director of the Mossad, has said publicly two things that usually remain locked away in a room without tape recorders. First, Isra...
Electricians and plumbers: They are the real winners of the AI boom
Jensen Huang, CEO of NVIDIA, has openly stated that the real winners in the AI boom, at least in the short to medium term, will be electricians, plumb...
Data Act: Yet another regulation? Yes. But this one really changes the game (even for those in security).
Every time Brussels churns out a new acronym, someone in the company snorts: “More paper?” It happens. But the Data Act isn’t just a stamp to ad...
Chat Control: Between hunting down illegal channels and cracking down on freedom and privacy
The news is simple, the technology is not. Chat Control (CSAR) was created to uncover CSAM and grooming dynamics within messaging platforms. The “mo...
Wikipedia under the US Congress’s scrutiny: when freedom of expression becomes “under special surveillance”
On August 27, 2025, the Wikimedia Foundation, which operates Wikipedia, received an official letter from the Committee on Oversight and Government Ref...
Stagershell: When malware leaves no trace. Malware Forge analysis.
In early 2025, an Italian organization found itself the victim of a sneaky intrusion. No dramatic exploit, no textbook attack. What opened the door to...
What are Rootkits? Discovering one of the most insidious threats
Rootkits are one of the most insidious and complex cyber threats in the digital security landscape. The term “rootkit” comes from the combination ...
Digital Forensics: The Science That Uncovers the Secrets Hidden in Data
Digital Forensics, or computer forensics, is a discipline that deals with the collection, preservation, analysis, and presentation of digital data for...
Analysis of Recorded Future’s CVE Report – February 2025
The monthly Recorded Future CVE report for February 2025 provides a detailed overview of current cybersecurity threats, highlighting a slight decline ...
OpenSSH: An RCE run as Root puts 14 million instances on Linux at risk
A recent critical vulnerability in OpenSSH, identified as CVE-2024-6387, could allow unauthenticated remote code execution with root privileges on gli...