Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
HackTheBox 970x120 1

Author: Silvia Felici

Silvia Felici

Security Advisor per Red Hot Cyber, tecnologie Open Source e sicurezza della Supply Chain. Network Operations Specialist presso FiberCop S.p.A., vanta una solida esperienza nella protezione e gestione di reti complesse, contribuendo attivamente alla divulgazione e alla difesa dell'ecosistema digitale italiano.

Profilo LinkedIn
Areas of Expertise Network Operations, Open Source, Supply Chain Security, Technological Innovation, Operating Systems.

Silvia Felici is an ICT professional with solid experience in the telecommunications and infrastructure sectors, specializing in operating systems, networks, and communication architectures. Her profile combines hands-on technical expertise, a deep historical understanding of the evolution of computing, and a strong vocation for technology dissemination. Throughout her career, she has worked in complex, mission-critical environments, contributing to the development, management, and support of high-reliability network infrastructures.

Positions and Roles

  • ICT Professional – FiberCop: activities involving network infrastructures, systems, and communication technologies.
  • Former ICT Specialist – TIM: long-term experience in highly complex telecommunications environments.
  • Contributor – Red Hot Cyber: author of articles on the history of computing, operating systems, technological culture, and cybersecurity awareness.

Core Skills

  • Operating systems (historical and modern) and software architectures
  • Network infrastructures and telecommunications environments
  • Historical evolution of computing and digital technologies
  • Technical analysis and technology dissemination
  • Cyber culture and digital awareness
  • Open source and collaborative models

Professional Vision

Silvia Felici considers knowledge of computing history and system fundamentals a key element for understanding modern security and technological evolution. She promotes an ICT vision based on awareness, technical memory, and a deep understanding of the mechanisms that govern digital systems. Through her work with Red Hot Cyber, she contributes to the cultural growth of the community, strengthening the connection between technical expertise, information reliability, and digital responsibility.

Numero di articoli trovati: 82

Robots in search of flesh: When AI rents peripherals. Your body!

The evolution of Artificial Intelligence has crossed a new, disturbing frontier. If until yesterday we were talking about algorithms confined behind a screen, today we are faced with the concept...

Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos

For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM 's time seems definitively over. Microsoft has decided to initiate a profound transition...

WhatsApp gets a makeover: “Paranoia” mode arrives (and no, it’s not for everyone).

WhatsApp has decided to toughen up. Not for everyone, not always, but when needed. The decision comes against a backdrop of a now-familiar climate: increasing cyber attacks, espionage that no...

Is privacy dead? No, but it’s in a coma! What are we really celebrating today, January 28th?

Today is January 28th, and like every year for quite some time now, we find ourselves celebrating European Data Protection Day. It's something that started around 2006, to commemorate the...

Digital Autonomy: France Says Goodbye to Teams and Zoom by 2027

This isn't the first initiative to emerge on this front recently. Indeed, we've heard several of them, one after the other. And it's almost inevitable: technological autonomy and national security...

NSA publishes first operational guidelines on Zero Trust

The U.S. National Security Agency (NSA) has released the first two documents in its Zero Trust Implementation Guidelines (ZIGs) series, aimed at providing practical and operational guidance to support organizations...

AI Isn’t as Reliable as You Think: The Hidden Risks of LLMs Without Good Governance

Adopting large language models (LLMs) without adequate governance, verification, and oversight risks legal, financial, and reputational damage. This data emerges from the report "Risks of Unmanaged AI Reliance: Evaluating Regional...

Linux 7.0 says goodbye to the HIPPI relic: a piece of supercomputing history has been eliminated.

The Linux kernel has long been a well-established reality, and while it still contains code for technologies no longer in use, it's likely that some people still rely on these...

Zoom Security Alert: Critical Vulnerability in Node MMR Devices

Zoom Video Communications has issued an urgent security advisory for a critical vulnerability (identified as CVE-2026-22844 ) affecting its enterprise infrastructure. The issue involves a command injection flaw in Zoom...

ESXi Zero-Day Exploit: How to Protect Your VMware Environment

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The...