Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Redhotcyber Banner Sito 970x120px Uscita 101125

Author: Silvia Felici

Silvia Felici

Security Advisor per Red Hot Cyber, tecnologie Open Source e sicurezza della Supply Chain. Network Operations Specialist presso FiberCop S.p.A., vanta una solida esperienza nella protezione e gestione di reti complesse, contribuendo attivamente alla divulgazione e alla difesa dell'ecosistema digitale italiano.

Profilo LinkedIn
Areas of Expertise Network Operations, Open Source, Supply Chain Security, Technological Innovation, Operating Systems.

Silvia Felici is an ICT professional with solid experience in the telecommunications and infrastructure sectors, specializing in operating systems, networks, and communication architectures. Her profile combines hands-on technical expertise, a deep historical understanding of the evolution of computing, and a strong vocation for technology dissemination. Throughout her career, she has worked in complex, mission-critical environments, contributing to the development, management, and support of high-reliability network infrastructures.

Positions and Roles

  • ICT Professional – FiberCop: activities involving network infrastructures, systems, and communication technologies.
  • Former ICT Specialist – TIM: long-term experience in highly complex telecommunications environments.
  • Contributor – Red Hot Cyber: author of articles on the history of computing, operating systems, technological culture, and cybersecurity awareness.

Core Skills

  • Operating systems (historical and modern) and software architectures
  • Network infrastructures and telecommunications environments
  • Historical evolution of computing and digital technologies
  • Technical analysis and technology dissemination
  • Cyber culture and digital awareness
  • Open source and collaborative models

Professional Vision

Silvia Felici considers knowledge of computing history and system fundamentals a key element for understanding modern security and technological evolution. She promotes an ICT vision based on awareness, technical memory, and a deep understanding of the mechanisms that govern digital systems. Through her work with Red Hot Cyber, she contributes to the cultural growth of the community, strengthening the connection between technical expertise, information reliability, and digital responsibility.

Numero di articoli trovati: 82

The Most Famous Hacker Girls Ever: Kristina Svechinskaya

In the collective imagination, the word "hacker" or "computer criminal" is a young man with enormous computer skills, but history has taught us that in a few rare cases this...

Famous Hackers: The Story of Adrian Lamo

Adrian Lamo was a hacker who found new ways to breach companies and make them realize how insecure they were. From his early hacks to hacking into prestigious companies while...

The era of one-handed supercomputers is upon us! GIGABYTE ATOM: A petaflop and 128GB of AI storage.

On October 15, in addition to the much-vaunted NVIDIA DGX Spark solution, created in collaboration between NVIDIA and Mediatek, another mini AI accelerator made its debut to the world: the...

Goodbye Microsoft Word. China chooses WPS Office for official documents

China continues to pursue technological independence, and this time the signal has come not from microchip manufacturers, but from government officials. For the first time, the Chinese Ministry of Commerce...

Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”

The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon Valley leader, though it’s unclear who exactly he meant by...

Italian ethical hackers top the podium at the European Cybersecurity Challenge 2025.

From 6 to 9 October 2025, Warsaw hosted the 11th edition of the European Cybersecurity Challenge (ECSC) . In a close competition among 39 teams from EU member states, EFTA...

Qualcomm Acquires Arduino to Strengthen Presence in IoT and Robotics

Qualcomm announced on Tuesday the acquisition of Arduino , an Italian company known for producing low-cost programmable printed circuit boards. The company, which will become an independent subsidiary of the...

Why does the United States buy rare earths from China despite its own reserves?

In recent years, the topic of rare earths has returned to the forefront of international debate, especially given China's dominant role in this strategic sector. Many wonder: why does the...

Nvidia CEO: “The gap with China is just a few nanoseconds.”

On September 25, during the interview program Bg2 Pod , Nvidia CEO Jen-Hsun Huang expressed positions that fueled heated public debate. During his speech, Huang defended the Chinese economic system,...

Three serious vulnerabilities discovered in VMware vCenter and NSX: apply patches immediately.

On September 29, 2025, Broadcom released security advisory VMSA-2025-0016 , addressing three vulnerabilities identified in VMware vCenter and VMware NSX products. The bugs affect several solutions in the VMware ecosystem...