Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Cyber Offensive Fundamentals 970x120 V0.1

Author: Sandro Sana

Sandro Sana

Member of the Red Hot Cyber Dark Lab team and director of the Red Hot Cyber Podcast. He has worked in Information Technology since 1990 and specialized in Cybersecurity since 2014 (CEH - CIH - CISSP - CSIRT Manager - CTI Expert). Speaker at SMAU 2017 and SMAU 2018, lecturer for SMAU Academy & ITS, and member of ISACA.
He is also a member of the Scientific Committee of the national Competence Center Cyber 4.0, where he contributes to the strategic direction of research, training, and innovation activities in the cybersecurity.

Profilo LinkedIn
Areas of Expertise Cyber Threat Intelligence, NIS2, Security Governance & Compliance, CSIRT & Crisis Management, Research, Disclosure, and Cyber Culture

Sandro Sana is a cybersecurity professional with over thirty years of experience in the ICT sector, specializing in cybersecurity, information systems governance, and digital risk management. He currently serves as CISO & Head of Cybersecurity at Eurosystem Group S.p.A., where he leads information protection strategies, operational resilience, and the security of critical infrastructures.

Current Positions

  • CISO & Head of Cybersecurity – Eurosystem S.p.A.: Responsible for security governance, cyber risk management, incident response, threat analysis, and the adoption of innovative solutions for the protection of corporate data and systems.
  • Director of the Red Hot Cyber Podcast: A weekly editorial format dedicated to cybersecurity, digital resilience, and cyber geopolitics, featuring industry experts and leading figures.
  • Member of the Scientific Committee – Cyber 4.0: Actively involved in providing strategic direction for research, training, and technology transfer activities within the national Competence Center.
  • Lecturer and Public Educator: Lecturer at ITS and SMAU Academy, committed to training the next generation of cybersecurity professionals.

Core Competencies

  • Cybersecurity Governance & Risk Management: design and implementation of security strategies focused on business continuity and organizational resilience.
  • Security Regulations and Frameworks: advanced expertise in NIS2, ISO/IEC 27001, CIS Controls, COBIT, ENISA, and NIST.
  • Threat Analysis & Incident Response: coordination of threat intelligence activities and management of cybersecurity incidents.
  • Education and Knowledge Sharing: development of editorial content and educational initiatives to promote cybersecurity awareness.

Initiatives and Contributions

  • Editorial Activity: author of over 600 articles published on Red Hot Cyber, Cybersecurity360, Digital360, SocialNews, and La nuova Gazzetta Piemontese.
  • Red Hot Cyber: member of the RHC Dark Lab and an active contributor to the community, with a strong commitment to technical and strategic dissemination.
  • Collaborations: support to companies, public administrations, and startups in developing effective cybersecurity and risk management strategies.

Professional Vision

He promotes an integrated vision of cybersecurity that combines technology, governance, and the human factor, in full compliance with European and international regulations. He strongly believes in knowledge sharing as a key tool to increase digital risk awareness and strengthen organizational resilience.

Web resources

Numero di articoli trovati: 71

The 6 Best Hacker Girls of All Time

We often talk about hacking, hackers, cybercrime, black, gray, and white. But is "hacker" always synonymous with the male gender? The answer is obviously no. The best hacker girls Although...

RDP Services Exposed in the Crosshairs! A Botnet of 100,000 IPs Scans the Network

In the United States, a large-scale, coordinated botnet campaign is targeting Remote Desktop Protocol (RDP)-based services. The scale and organizational structure of this campaign poses a significant threat, especially for...

RondoDox Botnet Discovered: Thousands of Devices at Risk

A large botnet called RondoDox has been discovered exploiting 56 vulnerabilities in more than 30 different devices, including bugs first demonstrated during the Pwn2Own hacking competition. Attackers target a wide...

25,000 kilometers, the new Seacom2.0 submarine cable to connect Europe, Africa and Asia

Seacom, an African submarine infrastructure operator, has announced the launch of Seacom 2.0 , an international cable system designed to connect Europe, the Middle East, Africa and Asia. The project...

Criminal Hackers Target Seniors! Datzbro Arrives: Facebook and Smartphones Targeted

A new malicious campaign is using Facebook as a vehicle to spread Datzbro , an Android malware that combines the features of a banking Trojan with those of spyware. The...

Data Act: Yet another regulation? Yes. But this one really changes the game (even for those in security).

Every time Brussels churns out a new acronym, someone in the company snorts: "More paper?" It happens. But the Data Act isn't just a stamp to add to the binder:...

Delivery of €13 million in submarine cables for the Shanhaiguan offshore project

At Haihui Port in Xiaoting, along the Yangtze River, a large red steel structure provided the backdrop for the delivery of a massive order of submarine cables from Yichang Qifan....

Rhadamanthys Stealer: Introduces an AI feature to extract seed phrases from images

Rhadamanthys is an advanced information stealer that first emerged in 2022. Featuring a rapid development cycle—with at least ten different releases since its inception—the malware is promoted and marketed on...

ShadowV2: New MaaS botnet for DDoS attacks uses containers

Amid growing criminal activity, Darktrace has uncovered a new campaign using the ShadowV2 botnet. Researchers detected malicious activity on June 24, 2025, when their honeypots were activated. This system relies...

The DDoS King is here! 40 seconds at 22.2 terabits mitigated by Cloudflare

Cloudflare has announced that it independently managed an unprecedented Distributed Denial-of-Service (DDoS) attack, the largest ever seen. The hypervolumetric attack reached an unprecedented peak of 22.2 terabits per second (Tbps)...