Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Cyber Offensive Fundamentals 970x120 V0.1

Author: Sandro Sana

Sandro Sana

Member of the Red Hot Cyber Dark Lab team and director of the Red Hot Cyber Podcast. He has worked in Information Technology since 1990 and specialized in Cybersecurity since 2014 (CEH - CIH - CISSP - CSIRT Manager - CTI Expert). Speaker at SMAU 2017 and SMAU 2018, lecturer for SMAU Academy & ITS, and member of ISACA.
He is also a member of the Scientific Committee of the national Competence Center Cyber 4.0, where he contributes to the strategic direction of research, training, and innovation activities in the cybersecurity.

Profilo LinkedIn
Areas of Expertise Cyber Threat Intelligence, NIS2, Security Governance & Compliance, CSIRT & Crisis Management, Research, Disclosure, and Cyber Culture

Sandro Sana is a cybersecurity professional with over thirty years of experience in the ICT sector, specializing in cybersecurity, information systems governance, and digital risk management. He currently serves as CISO & Head of Cybersecurity at Eurosystem Group S.p.A., where he leads information protection strategies, operational resilience, and the security of critical infrastructures.

Current Positions

  • CISO & Head of Cybersecurity – Eurosystem S.p.A.: Responsible for security governance, cyber risk management, incident response, threat analysis, and the adoption of innovative solutions for the protection of corporate data and systems.
  • Director of the Red Hot Cyber Podcast: A weekly editorial format dedicated to cybersecurity, digital resilience, and cyber geopolitics, featuring industry experts and leading figures.
  • Member of the Scientific Committee – Cyber 4.0: Actively involved in providing strategic direction for research, training, and technology transfer activities within the national Competence Center.
  • Lecturer and Public Educator: Lecturer at ITS and SMAU Academy, committed to training the next generation of cybersecurity professionals.

Core Competencies

  • Cybersecurity Governance & Risk Management: design and implementation of security strategies focused on business continuity and organizational resilience.
  • Security Regulations and Frameworks: advanced expertise in NIS2, ISO/IEC 27001, CIS Controls, COBIT, ENISA, and NIST.
  • Threat Analysis & Incident Response: coordination of threat intelligence activities and management of cybersecurity incidents.
  • Education and Knowledge Sharing: development of editorial content and educational initiatives to promote cybersecurity awareness.

Initiatives and Contributions

  • Editorial Activity: author of over 600 articles published on Red Hot Cyber, Cybersecurity360, Digital360, SocialNews, and La nuova Gazzetta Piemontese.
  • Red Hot Cyber: member of the RHC Dark Lab and an active contributor to the community, with a strong commitment to technical and strategic dissemination.
  • Collaborations: support to companies, public administrations, and startups in developing effective cybersecurity and risk management strategies.

Professional Vision

He promotes an integrated vision of cybersecurity that combines technology, governance, and the human factor, in full compliance with European and international regulations. He strongly believes in knowledge sharing as a key tool to increase digital risk awareness and strengthen organizational resilience.

Web resources

Numero di articoli trovati: 71

RapperBot DDoS botnet dismantled and alleged developer arrested

The U.S. Department of Justice has indicted the alleged developer and administrator of the RapperBot DDoS botnet, which was leased to cybercriminals. The botnet itself was seized by law enforcement...

Do you click on text message links? Here are 4.2 million reasons not to.

Proofpoint has released the second volume of its annual study "Human Factor 2025", focusing on phishing and URL-based attacks. Analysis of data from May 2024 to May 2025 shows that...

Did you respond to IT support on Teams? Congratulations! The Trojan is on your PC with rights that exceed yours.

The research team at Trustwave SpiderLabs has identified a new wave of EncryptHub attacks that combine human error and the exploitation of a vulnerability in the Microsoft Management Console. Operators...

150 Malicious Firefox Extensions Stole $1 Million in Cryptocurrency

Koi Security analysts have discovered the GreedyBear malware campaign active in the Mozilla add-on store. 150 malicious Firefox extensions stole over $1 million worth of cryptocurrency from users. The fraudulent...

SonicWall in the crosshairs: possible 0-day vulnerability, users at risk

Last Sunday, Red Hot Cyber published an in-depth analysis of the increased malicious activity of the AKIRA ransomware, which appears to exploit an undocumented 0-day vulnerability in SonicWall devices with...

What are Rootkits? Discovering one of the most insidious threats

Rootkits are one of the most insidious and complex cyber threats in the digital security landscape. The term "rootkit" comes from the combination of two words: "root," which in Unix...

What are Remote Access Trojans (RATs): The menacing shadow behind spam emails

Remote Access Trojans (RATs), or Remote Access Trojans, are a category of malware. They are designed to allow attackers to remotely control an infected device. This malware is particularly dangerous...

Raven Stealer is here! The malware that steals your data by using Telegram as a “training tool.”

Amid growing activity by malicious campaigns using legitimate communication channels to bypass traditional defenses, a new tool has attracted the attention of cybersecurity specialists: Raven Stealer. This information-stealing program appeared...

Digital Forensics: The Science That Uncovers the Secrets Hidden in Data

Digital Forensics, or computer forensics, is a discipline that deals with the collection, preservation, analysis, and presentation of digital data for use as evidence in a legal context. This field...

What is Cyber Threat Intelligence? Let’s explore a fundamental discipline in cybersecurity.

Cyber Threat Intelligence (CTI) is the practice of collecting, analyzing, and using cyber threat information to protect organizations from malicious activity. CTI has become a key element of cybersecurity, helping...