Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
Banner Ransomfeed 970x120 1

Author: Silvia Felici

Silvia Felici

Security Advisor per Red Hot Cyber, specializzato in SEO strategica, tecnologie Open Source e sicurezza della Supply Chain. Network Operations Specialist presso FiberCop S.p.A., vanta una solida esperienza nella protezione e gestione di reti complesse, contribuendo attivamente alla divulgazione e alla difesa dell'ecosistema digitale italiano.

Profilo LinkedIn
Areas of Expertise Strategic SEO, Network Operations, Open Source, Supply Chain Security, Technological Innovation, Operating Systems.
Numero di articoli trovati: 116

Linux Kernel 6.16 Released. New Features and Improvements Without Much Woww Effect

Last weekend the final version of the Linux kernel 6.16 was released, traditionally announced by Linus Torvalds himself. Development proceeded calmly, but without any major innovations: the release proved more...

Target: Your Voice! Scattered Spider targets VMware ESXi by cloning employee voices.

The Scattered Spider group has intensified its attacks on corporate IT environments, targeting the VMware ESXi hypervisors of US companies in the retail, transportation, and insurance sectors. These attacks do...

What is Ethical Hacking: An Introduction to the Fascinating World of Ethical Hacking

Ethical Hacking is a fascinating yet enigmatic discipline. It's a field where ethics and technology merge to defend the digital world. If you're already intrigued by this mysterious world, or...

Electronic and robotic warfare: Ukraine is banking on “AD Berserk” to counter enemy drones.

Electronic warfare is taking on an increasingly strategic role in modern warfare, becoming a crucial element in protecting infrastructure, troops, and vehicles from airborne and digital threats. In this context,...

The AI Revolution and How It Will Change the World

In the contemporary technological landscape, one transformative force clearly emerges: Artificial Intelligence (AI). AI is revolutionizing our world in ways we would have struggled to imagine just a few decades...
Artificial Intelligence

Artificial Intelligence: History, Technology, Ethics, Regulations, and the Future

Artificial intelligence (AI) is software that can generate output (i.e., content, predictions, decisions, recommendations) capable of interacting with the environment and according to human objectives. The spread of this technology...

What are Common Vulnerabilities and Exposures (CVE)

The primary goal of computer security is vulnerability management. In achieving this goal, CVE helps specialists, who are an integral part of the information security community. If you're a reader...

TIM’s Red Team Research discovers five CVEs on Eclipse GlassFish, one critical (score 9.8)

Thursday, July 16 was a significant day for the cybersecurity researchers of the Italian Red Team Research (RTR) team of TIM, which saw the publication of five new vulnerabilities (CVE)...

Patch Management: The process to adopt to make your company more secure from cyber attacks

"In the dark forest of the digital world" (as Dante Alighieri would say today), cybersecurity has become a top priority for companies of all sizes. Constant cyber attacks make headlines...

Chinese humanoid robot replaces its own battery and works 24 hours a day

The presentation of the Walker S2 represents a major step forward in the operational autonomy of humanoid robots. Thanks to the ability to autonomously replace its own battery, the robot...