Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
Banner Ancharia Desktop 1 1

Author: Silvia Felici

Silvia Felici

Security Advisor per Red Hot Cyber, specializzato in SEO strategica, tecnologie Open Source e sicurezza della Supply Chain. Network Operations Specialist presso FiberCop S.p.A., vanta una solida esperienza nella protezione e gestione di reti complesse, contribuendo attivamente alla divulgazione e alla difesa dell'ecosistema digitale italiano.

Profilo LinkedIn
Areas of Expertise Strategic SEO, Network Operations, Open Source, Supply Chain Security, Technological Innovation, Operating Systems.
Numero di articoli trovati: 116

Gmail introduces Shielded Email. Temporary email to fight spam and protect your privacy.

Google continues to actively develop Gmail, adding new features with elements of artificial intelligence to the email service. These updates make using email more convenient, but at the same time,...

What is cyber hacktivism? History, motivations, hacking, consequences, and evolution.

The term "hacktivism" is a combination of the English terms "hacking" and "hacktivism" and was coined to describe the use of computer hacking for political or social purposes. It is...

Commodore 64: The return of the best-selling retro computer of all time is now

The record for best-selling desktop computer of all time is still held by the Commodore 64, as certified by the Guinness Book of Records, despite its discontinuation in 1994. However,...

The History of the Linux Kernel (1 of 2). From Torvalds to the Hacker Community

Article by Pietro Cornelio and Massimiliano Brolli The history of the Linux Kernel is a story of pure hacking as well as being a miracle of "collaboration". It is the...

Apple 2: the story of a great success.

On June 10, 1977, the Apple II went on sale, the historic microcomputer that kicked off the home computing revolution. We'd like to dedicate an article to its history. The...

Creeper & Reaper: The story of the first worm and the first antivirus software.

It's not uncommon to find references to information technology innovations in video games. Ada Lovelace (the first programmer in history), gave her name to the robot in Folsom 4, but...

Who are the most famous hackers in history?

We often talk about hackers, but who are the famous hackers that ever existed? Considered by many as eccentric geniuses and computer wizards, by others they have the appearance of...

He’s 13 and Hacked Microsoft Teams! The Story of Dylan, One of the Youngest Bug Hunters

At just 13 years old, Dylan became the youngest security researcher to collaborate with the Microsoft Security Response Center (MSRC), demonstrating how curiosity and perseverance can have a real impact,...

The History of Email. How This Invention Impacted the Modern Era

Email was in fact the first of those disruptive revolutions that catapulted the world into the era of networks and the Internet. Thinking about offices today, before the email revolution...

Linux Pwned! Privilege Escalation on SUDO in 5 seconds. HackerHood tests the CVE-2025-32463 exploit

Yesterday, Red Hot Cyber published an in-depth analysis of a gserious vulnerability discovered in SUDO (CVE-2025-32463), which allows escalation of privileges to root in Linux environments by exploiting an abuse...