Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
970x20 Itcentric

Author: Silvia Felici

Silvia Felici

Security Advisor per Red Hot Cyber, tecnologie Open Source e sicurezza della Supply Chain. Network Operations Specialist presso FiberCop S.p.A., vanta una solida esperienza nella protezione e gestione di reti complesse, contribuendo attivamente alla divulgazione e alla difesa dell'ecosistema digitale italiano.

Profilo LinkedIn
Areas of Expertise Network Operations, Open Source, Supply Chain Security, Technological Innovation, Operating Systems.

Silvia Felici is an ICT professional with solid experience in the telecommunications and infrastructure sectors, specializing in operating systems, networks, and communication architectures. Her profile combines hands-on technical expertise, a deep historical understanding of the evolution of computing, and a strong vocation for technology dissemination. Throughout her career, she has worked in complex, mission-critical environments, contributing to the development, management, and support of high-reliability network infrastructures.

Positions and Roles

  • ICT Professional – FiberCop: activities involving network infrastructures, systems, and communication technologies.
  • Former ICT Specialist – TIM: long-term experience in highly complex telecommunications environments.
  • Contributor – Red Hot Cyber: author of articles on the history of computing, operating systems, technological culture, and cybersecurity awareness.

Core Skills

  • Operating systems (historical and modern) and software architectures
  • Network infrastructures and telecommunications environments
  • Historical evolution of computing and digital technologies
  • Technical analysis and technology dissemination
  • Cyber culture and digital awareness
  • Open source and collaborative models

Professional Vision

Silvia Felici considers knowledge of computing history and system fundamentals a key element for understanding modern security and technological evolution. She promotes an ICT vision based on awareness, technical memory, and a deep understanding of the mechanisms that govern digital systems. Through her work with Red Hot Cyber, she contributes to the cultural growth of the community, strengthening the connection between technical expertise, information reliability, and digital responsibility.

Numero di articoli trovati: 82

Artificial Intelligence: A Double-Edged Sword in Digital Security

Artificial intelligence is increasingly being described as a double-edged sword, capable of offering enormous advantages but also opening new avenues for digital crime. During the " TRUST AICS - 2025"...

Dedigitalization: Japanese city of Toyoda restricts smartphone use

In the Japanese city of Toyoda (Aichi Prefecture), city council members approved a draft ordinance limiting smartphone use during leisure time . The document establishes a daily limit of two...

Elon Musk unveils Colossus II, the one-gigawatt AI supercomputer

Elon Musk shared a photo of the complex housing Colossus II, the world's first gigawatt-scale AI cluster. Elon Musk has previously stated that the Colossus 2 supercomputer, developed by xAI,...

The Story of Microsoft Solitaire: From Launch with Windows 3.0 to Enduring Success

Microsoft first released Solitaire in 1990 with Windows 3.0, as a tool to familiarize users with the graphical interface and mouse use. The game was created by Wes Cherry, with...

Ready for AI-powered Notepad? Coming soon to Windows 11 with PC Copilot+!

Windows 11 users with PC Copilot+ will be able to take advantage of advanced artificial intelligence features, now an integral part of the Notepad application, thanks to an update that...

Generative Artificial Intelligence: Explosive Growth and Security Challenges

By Umberto Pirovano, Senior Manager Technical Solutions at Palo Alto Networks Generative Artificial Intelligence (GenAI) is redefining the technology and business landscape at an astonishing rate. According to Palo Alto...

Vibe coding, yes, but be careful. Speed doesn’t always beat quality.

There's a new phenomenon in the programming industry: vibe coding. Developers are increasingly using artificial intelligence agents to speed up their work, but they're also encountering unpredictable problems. The stories...

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in...

CISA launches new plan to improve CVE quality and global cyber defense

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has presented the document "CISA Strategic Focus CVE Quality for a Cyber Secure Future," a strategic vision aimed at redefining the Common...

Tasting the Exploit: HackerHood testa l’exploit di WINRAR CVE-2025-8088

Manuel Roccon, leader of Red Hot Cyber's HackerHood ethics team, has created a detailed video demonstration on YouTube that demonstrates in a practical way how the exploit based on the...