Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Fortinet 970x120px

Author: Sandro Sana

Sandro Sana

Member of the Red Hot Cyber Dark Lab team and director of the Red Hot Cyber Podcast. He has worked in Information Technology since 1990 and specialized in Cybersecurity since 2014 (CEH - CIH - CISSP - CSIRT Manager - CTI Expert). Speaker at SMAU 2017 and SMAU 2018, lecturer for SMAU Academy & ITS, and member of ISACA.
He is also a member of the Scientific Committee of the national Competence Center Cyber 4.0, where he contributes to the strategic direction of research, training, and innovation activities in the cybersecurity.

Profilo LinkedIn
Areas of Expertise Cyber Threat Intelligence, NIS2, Security Governance & Compliance, CSIRT & Crisis Management, Research, Disclosure, and Cyber Culture

Sandro Sana is a cybersecurity professional with over thirty years of experience in the ICT sector, specializing in cybersecurity, information systems governance, and digital risk management. He currently serves as CISO & Head of Cybersecurity at Eurosystem Group S.p.A., where he leads information protection strategies, operational resilience, and the security of critical infrastructures.

Current Positions

  • CISO & Head of Cybersecurity – Eurosystem S.p.A.: Responsible for security governance, cyber risk management, incident response, threat analysis, and the adoption of innovative solutions for the protection of corporate data and systems.
  • Director of the Red Hot Cyber Podcast: A weekly editorial format dedicated to cybersecurity, digital resilience, and cyber geopolitics, featuring industry experts and leading figures.
  • Member of the Scientific Committee – Cyber 4.0: Actively involved in providing strategic direction for research, training, and technology transfer activities within the national Competence Center.
  • Lecturer and Public Educator: Lecturer at ITS and SMAU Academy, committed to training the next generation of cybersecurity professionals.

Core Competencies

  • Cybersecurity Governance & Risk Management: design and implementation of security strategies focused on business continuity and organizational resilience.
  • Security Regulations and Frameworks: advanced expertise in NIS2, ISO/IEC 27001, CIS Controls, COBIT, ENISA, and NIST.
  • Threat Analysis & Incident Response: coordination of threat intelligence activities and management of cybersecurity incidents.
  • Education and Knowledge Sharing: development of editorial content and educational initiatives to promote cybersecurity awareness.

Initiatives and Contributions

  • Editorial Activity: author of over 600 articles published on Red Hot Cyber, Cybersecurity360, Digital360, SocialNews, and La nuova Gazzetta Piemontese.
  • Red Hot Cyber: member of the RHC Dark Lab and an active contributor to the community, with a strong commitment to technical and strategic dissemination.
  • Collaborations: support to companies, public administrations, and startups in developing effective cybersecurity and risk management strategies.

Professional Vision

He promotes an integrated vision of cybersecurity that combines technology, governance, and the human factor, in full compliance with European and international regulations. He strongly believes in knowledge sharing as a key tool to increase digital risk awareness and strengthen organizational resilience.

Web resources

Numero di articoli trovati: 71

Taiwan raises alert: Monitoring submarine cables for Chinese interference

In the Taiwan Strait, the local Coast Guard ha intensified patrolling activities To protect the undersea cables, infrastructure considered vital to the country's communications. Commander Ruan Zhongqing led a 100-ton...

There’s no antivirus to protect you! ModStealer affects Windows, macOS, and Linux.

Mosyle has discovered a new malware program called ModStealer. The program is completely undetectable by antivirus solutions and was first uploaded to VirusTotal almost a month ago without any security...

NightshadeC2, the new botnet that uses unconventional methods to bypass protection

eSentire has reported the discovery of a new botnet called NightshadeC2, which uses unconventional methods to bypass protection and sandboxes. The malware is distributed via counterfeit versions of legitimate programs...

Stealerium and Phantom: How Open-Source Infostealers Are Taking the World by storm

Researchers at Proofpoint, a leader in cybersecurity and information protection, have detected a worrying increase in the use of open-source malware, such as Stealerium and Phantom Stealer, by opportunistic cybercriminals....

Houthi threat or mysterious incident? The Red Sea paralyzes Asia and the Middle East.

As we reported this morning, several undersea cables in the Red Sea have been severed, causing internet access delays and service disruptions in Asia and the Middle East. Microsoft said...

Wikipedia under the US Congress’s scrutiny: when freedom of expression becomes “under special surveillance”

On August 27, 2025, the Wikimedia Foundation, which operates Wikipedia, received an official letter from the Committee on Oversight and Government Reform of the United States House of Representatives.The letter,...

GitHub and GitLab are increasingly under fire! Targeted attacks targeting developers via fake repositories

By hosting fake projects on popular development platforms (GitHub and GitLab), attackers trick users into running malicious payloads that pull add-ons from a hacker-controlled repository. As a result, remote access...

Submarine cables are vulnerable! New strategies are needed.

Researchers from Reichman University (Israel) have detailed in an article in the journal Nature Electronics the growing risks and threats posed by natural and man-made factors to undersea communications cables,...

Stagershell: When malware leaves no trace. Malware Forge analysis.

In early 2025, an Italian organization found itself the victim of a sneaky intrusion. No dramatic exploit, no textbook attack. What opened the door to the attackers was a VPN...

RDP Under Fire! 30,000 Unique IP Addresses Probe Exposed Services for Targeted Attacks

Security researchers at greyNoise have detected a large, coordinated scanning operation against Microsoft Remote Desktop Protocol (RDP) services, in which attackers scanned over 30,000 unique IP addresses to assess vulnerabilities...