Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
Banner Ransomfeed 970x120 1

Author: Sandro Sana

Sandro Sana

Member of the Red Hot Cyber Dark Lab team and director of the Red Hot Cyber Podcast. He has worked in Information Technology since 1990 and specialized in Cybersecurity since 2014 (CEH - CIH - CISSP - CSIRT Manager - CTI Expert). Speaker at SMAU 2017 and SMAU 2018, lecturer for SMAU Academy & ITS, and member of ISACA.
He is also a member of the Scientific Committee of the national Competence Center Cyber 4.0, where he contributes to the strategic direction of research, training, and innovation activities in the cybersecurity.

Profilo LinkedIn
Areas of Expertise Cyber Threat Intelligence, NIS2, Security Governance & Compliance, CSIRT & Crisis Management, Research, Disclosure, and Cyber Culture

Wikipedia under the US Congress’s scrutiny: when freedom of expression becomes “under special surveillance”

On August 27, 2025, the Wikimedia Foundation, which operates Wikipedia, received an official letter from the Committee on Oversight and Government Reform of the United States House of Representatives.The letter,...
Share on Facebook Share on LinkedIn Share on X

Stagershell: When malware leaves no trace. Malware Forge analysis.

In early 2025, an Italian organization found itself the victim of a sneaky intrusion. No dramatic exploit, no textbook attack. What opened the door to the attackers was a VPN...
Share on Facebook Share on LinkedIn Share on X

What are Rootkits? Discovering one of the most insidious threats

Rootkits are one of the most insidious and complex cyber threats in the digital security landscape. The term "rootkit" comes from the combination of two words: "root," which in Unix...
Share on Facebook Share on LinkedIn Share on X

Digital Forensics: The Science That Uncovers the Secrets Hidden in Data

Digital Forensics, or computer forensics, is a discipline that deals with the collection, preservation, analysis, and presentation of digital data for use as evidence in a legal context. This field...
Share on Facebook Share on LinkedIn Share on X

Analysis of Recorded Future’s CVE Report – February 2025

The monthly Recorded Future CVE report for February 2025 provides a detailed overview of current cybersecurity threats, highlighting a slight decline compared to the previous month. A total of 25...
Share on Facebook Share on LinkedIn Share on X

OpenSSH: An RCE run as Root puts 14 million instances on Linux at risk

A recent critical vulnerability in OpenSSH, identified as CVE-2024-6387, could allow unauthenticated remote code execution with root privileges on glibc-based Linux systems. This flaw resides in the server component of...
Share on Facebook Share on LinkedIn Share on X