Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Banner Ransomfeed 970x120 1

Author: Silvia Felici

Silvia Felici

Security Advisor per Red Hot Cyber, tecnologie Open Source e sicurezza della Supply Chain. Network Operations Specialist presso FiberCop S.p.A., vanta una solida esperienza nella protezione e gestione di reti complesse, contribuendo attivamente alla divulgazione e alla difesa dell'ecosistema digitale italiano.

Profilo LinkedIn
Areas of Expertise Network Operations, Open Source, Supply Chain Security, Technological Innovation, Operating Systems.

Silvia Felici is an ICT professional with solid experience in the telecommunications and infrastructure sectors, specializing in operating systems, networks, and communication architectures. Her profile combines hands-on technical expertise, a deep historical understanding of the evolution of computing, and a strong vocation for technology dissemination. Throughout her career, she has worked in complex, mission-critical environments, contributing to the development, management, and support of high-reliability network infrastructures.

Positions and Roles

  • ICT Professional – FiberCop: activities involving network infrastructures, systems, and communication technologies.
  • Former ICT Specialist – TIM: long-term experience in highly complex telecommunications environments.
  • Contributor – Red Hot Cyber: author of articles on the history of computing, operating systems, technological culture, and cybersecurity awareness.

Core Skills

  • Operating systems (historical and modern) and software architectures
  • Network infrastructures and telecommunications environments
  • Historical evolution of computing and digital technologies
  • Technical analysis and technology dissemination
  • Cyber culture and digital awareness
  • Open source and collaborative models

Professional Vision

Silvia Felici considers knowledge of computing history and system fundamentals a key element for understanding modern security and technological evolution. She promotes an ICT vision based on awareness, technical memory, and a deep understanding of the mechanisms that govern digital systems. Through her work with Red Hot Cyber, she contributes to the cultural growth of the community, strengthening the connection between technical expertise, information reliability, and digital responsibility.

Numero di articoli trovati: 82

Zero Tolerance in Office! Microsoft will block external links in Excel for security reasons.

Microsoft continua a impegnarsi per contrastare i meccanismi potenzialmente pericolosi in Office e Windows annunciando nuove restrizioni in Excel. A partire da ottobre 2025, Microsoft adotterà misure drastiche per isolare...

The secret AI race: the United States, China, and billions of dollars! And Europe? Who will win?

In recent years, global competition in AI has reached unprecedented levels, driven by massive investments: United States, China, and European Unionrespectively plan to invest billions of dollars to be first...

Happy birthday and RIP Windows 10! Ten years of Windows, from successes to failures.

It's been ten years since the release of Windows 10, the system designed to restore user confidence after the failed experiment with the Windows 8 interface. In 2015, Microsoft attempted...

What is Ethical Hacking: An Introduction to the Fascinating World of Ethical Hacking

Ethical Hacking is a fascinating yet enigmatic discipline. It's a field where ethics and technology merge to defend the digital world. If you're already intrigued by this mysterious world, or...

What are Common Vulnerabilities and Exposures (CVE)

The primary goal of computer security is vulnerability management. In achieving this goal, CVE helps specialists, who are an integral part of the information security community. If you're a reader...

TIM’s Red Team Research discovers five CVEs on Eclipse GlassFish, one critical (score 9.8)

Thursday, July 16 was a significant day for the cybersecurity researchers of the Italian Red Team Research (RTR) team of TIM, which saw the publication of five new vulnerabilities (CVE)...

Patch Management: The process to adopt to make your company more secure from cyber attacks

"In the dark forest of the digital world" (as Dante Alighieri would say today), cybersecurity has become a top priority for companies of all sizes. Constant cyber attacks make headlines...

Commodore 64: The return of the best-selling retro computer of all time is now

The record for best-selling desktop computer of all time is still held by the Commodore 64, as certified by the Guinness Book of Records, despite its discontinuation in 1994. However,...

Who are the most famous hackers in history?

We often talk about hackers, but who are the famous hackers that ever existed? Considered by many as eccentric geniuses and computer wizards, by others they have the appearance of...

Famous hackers: the sad story of Jonathan James, aka c0mrade.

He was born on December 12, 1983, in a small village called Pinecrest located in Miami-Dade County, Florida. His father was a computer programmer and his mother was a housewife....