<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 10 Apr 2026 15:18:40 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@ciriaco/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[BHIS Webcast: Blockchain and You! InfoSec Edition]]></title><description><![CDATA[Take a good look at Bitcoin right now…these are the unlucky ones. These are the unfortunate souls who jumped on another overinflated balloon. But, does this Bitcoin crash completely undermine all blockchain]]></description><link>http://direct.ecency.com/blockchain/@ciriaco/bhis-webcast-blockchain-and-you-infosec-edition</link><guid isPermaLink="true">http://direct.ecency.com/blockchain/@ciriaco/bhis-webcast-blockchain-and-you-infosec-edition</guid><category><![CDATA[blockchain]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Sun, 17 Feb 2019 16:56:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPJtopFoXw5EYeWmEMD3pSZNkS2t8ihMTbaMPY7LoEjmQHgB6PdFdzSTb31teTxng6gSC9Xx2RU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Rocke: The Champion of Monero Miners]]></title><description><![CDATA[This post was authored by David Liebenberg. Summary Cryptocurrency miners are becoming an increasingly significant part of the threat landscape. These malicious miners steal CPU cycles from compromised]]></description><link>http://direct.ecency.com/cryptocurrency/@ciriaco/rocke-the-champion-of-monero-miners</link><guid isPermaLink="true">http://direct.ecency.com/cryptocurrency/@ciriaco/rocke-the-champion-of-monero-miners</guid><category><![CDATA[cryptocurrency]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Sat, 01 Sep 2018 20:26:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/4i88GgaV8qiFU89taP2MgKXzwntUGAvkoQiKU7VxyD37q9Aw38jWb2iZfBDjuTDyRMo8QTZuT9i1vGPrxq9uL6jhRpLqMtu7Bm6bJeXwEFxJ6K4emVppF72oZg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[South Korea’s largest cryptocurrency exchange hacked]]></title><description><![CDATA[South Korea-based cryptocurrency exchange Bithumb briefly suspended its deposit and withdrawal services after hackers stole over $30 million worth of virtual currency, the company said on Wednesday. The]]></description><link>http://direct.ecency.com/steemit/@ciriaco/south-korea-s-largest-cryptocurrency-exchange-hacked</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@ciriaco/south-korea-s-largest-cryptocurrency-exchange-hacked</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Sat, 23 Jun 2018 22:22:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPPXxs74YEo5oasNu2eEanxpvQLnEdS1pMSGvaZmDCRmK8fqbNYWt3aTLUU6AC6FT7T9KMee2Ez?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Don’t be a Coinmining Zombie – Part 2: How Do You Protect Yourself from being Cryptojacked?]]></title><description><![CDATA[Safe behaviors to protect yourself from cryptojacking follow the familiar rules you should adhere to every day to protect yourself against viruses, worms, bots, and malware, including ransomware, which]]></description><link>http://direct.ecency.com/steemit/@ciriaco/don-t-be-a-coinmining-zombie-part-2-how-do-you-protect-yourself-from-being-cryptojacked</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@ciriaco/don-t-be-a-coinmining-zombie-part-2-how-do-you-protect-yourself-from-being-cryptojacked</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Fri, 15 Jun 2018 00:07:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iNv3YLHYp7N4AYgsKSerWSDFTM34hVPqSAgoB9zym2JykCKXxhj8LNa2WCAGzbSFT1Uvkqq6K98?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Inside one xmrig botnet miner]]></title><description><![CDATA[This post is an extension of this article.! I – Introduction At the beginning of this year, after some daily IoC Feeds. I was interested in one Linux sample on hybrid-analysis! for two reasons : First,]]></description><link>http://direct.ecency.com/steemit/@ciriaco/inside-one-xmrig-botnet-miner</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@ciriaco/inside-one-xmrig-botnet-miner</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Thu, 14 Jun 2018 19:05:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQCMHKUwwf6QqhZycrLA3Xb5SMpT6tiKXhAe72xeNg1GjU2eP7SXQMoXGpi6YmZxWryrxgwrWp6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Don’t Be a Coinmining Zombie – Part 1: Getting Cryptojacked]]></title><description><![CDATA[Posted on:June 11, 2018 Posted by: Trend Micro When your computer or mobile device (and now, even your IoT device) is hijacked to secretly mine cryptocurrencies, it’s been cryptojacked and becomes a coinmining]]></description><link>http://direct.ecency.com/steemit/@ciriaco/don-t-be-a-coinmining-zombie-part-1-getting-cryptojacked</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@ciriaco/don-t-be-a-coinmining-zombie-part-1-getting-cryptojacked</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Thu, 14 Jun 2018 00:59:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iNfbXQe47VgzSadJQdsdUspQyFZDVtgUfyWzmdTcS6t9ZEGxiVBaintQGZLxzjFS71efWUrLrdt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Threat Report: Don’t Join Blockchain Revolution Without Ensuring Security]]></title><description><![CDATA[By Charles McFarland on Jun 13, 2018 On May 19 researchers discovered a series of vulnerabilities in the blockchain-based EOS platform that can lead to remote control over participating nodes. Just four]]></description><link>http://direct.ecency.com/news/@ciriaco/threat-report-don-t-join-blockchain-revolution-without-ensuring-security</link><guid isPermaLink="true">http://direct.ecency.com/news/@ciriaco/threat-report-don-t-join-blockchain-revolution-without-ensuring-security</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Thu, 14 Jun 2018 00:52:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQXjQ1tegbQ3L6Pb9zJ1rfBmcF1kDcdCedv5Q96tGrSkxKVYkHM82Czy6j5eAfPQysLEkgujdJE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[THE ELITE MICROSOFT HACKER TEAM THAT KEEPS WINDOWS PCS SAFE]]></title><description><![CDATA[ONE OF THEM jailbroke Nintendo handhelds in a former life. Another has more than one zero-day exploit to his name. A third signed on just prior to the devastating Shadow Brokers leak. These are a few of]]></description><link>http://direct.ecency.com/news/@ciriaco/the-elite-microsoft-hacker-team-that-keeps-windows-pcs-safe</link><guid isPermaLink="true">http://direct.ecency.com/news/@ciriaco/the-elite-microsoft-hacker-team-that-keeps-windows-pcs-safe</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Mon, 11 Jun 2018 12:44:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPPt8Mc81u2fspoR6Ek8hAZx9BhuTbY8xqgH3KNcRJK8uqXwF4v1pFgiuG4LZVuzWwRpE2FgHNE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Energy Department Boots Up America's Most Powerful Supercomputer]]></title><description><![CDATA[The Energy Department on Friday unveiled the fastest scientific supercomputer in the country—and perhaps the world. The Summit supercomputer, built by IBM and housed at Oak Ridge National Laboratory in]]></description><link>http://direct.ecency.com/news/@ciriaco/energy-department-boots-up-america-s-most-powerful-supercomputer</link><guid isPermaLink="true">http://direct.ecency.com/news/@ciriaco/energy-department-boots-up-america-s-most-powerful-supercomputer</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Mon, 11 Jun 2018 01:36:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iNufJt7WHcLhomkzNfkjNmnE7y9KYH1NCVwxBvbyfSbast5cdeQVbESc1U3SFsMFT2o6jDWZEQE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Canadian Business Banking Customers Hit With Targeted Phishing, Account Takeover Attacks]]></title><description><![CDATA[IBM X-Force research has been following the activity of a cybergang that has been targeting Canadian businesses with customized phishing attacks, likely operating out of Ukraine. The attacks are designed]]></description><link>http://direct.ecency.com/news/@ciriaco/canadian-business-banking-customers-hit-with-targeted-phishing-account-takeover-attacks</link><guid isPermaLink="true">http://direct.ecency.com/news/@ciriaco/canadian-business-banking-customers-hit-with-targeted-phishing-account-takeover-attacks</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Sat, 02 Jun 2018 20:00:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iNqHxk2EctAsrdFsEzCs8Vo7cCGKwQBAxYnQnG6sa4tndTCoCefcwFTK32y6nVQHgeuryyzwdpr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Blockchain introduced for network security]]></title><description><![CDATA[Seoul - Korea Telecom, South Korea's major telecommunications company, is adopting blockchain technology in order to introduce tighter security and improved transparency. The introduction of blockchain]]></description><link>http://direct.ecency.com/news/@ciriaco/blockchain-introduced-for-network-security</link><guid isPermaLink="true">http://direct.ecency.com/news/@ciriaco/blockchain-introduced-for-network-security</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Thu, 22 Mar 2018 18:52:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXZuToMeGLrjwaxkaU9n8rhYJBJJoz2FZkmxVDUy1be4QJ2ZsMVZL8ggm9vPqrdK5HiZtmxjZSBY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Blockchain security: What keeps your transaction data safe?]]></title><description><![CDATA[Proponents of the distributed ledger technology known as blockchain consider it to be one of the best ways to secure transactions. I don’t know about you, but hearing that anything is the “best” immediately]]></description><link>http://direct.ecency.com/news/@ciriaco/blockchain-security-what-keeps-your-transaction-data-safe</link><guid isPermaLink="true">http://direct.ecency.com/news/@ciriaco/blockchain-security-what-keeps-your-transaction-data-safe</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Sun, 18 Mar 2018 19:31:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYSxdC8GN21QdnoRubVsGkuuUjrKzRnYRtWqbi9fpUFuVHRPggtbSYmyGRdc7VZvW3qRiDCXBpz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Shopping for a VPN app? Read this.]]></title><description><![CDATA[February 22, 2018 by Andrea Arias Attorney, Division of Privacy and Identity Protection You probably know by now that using your mobile device on the public Wi-Fi network of your local coffee shop or airport]]></description><link>http://direct.ecency.com/news/@ciriaco/shopping-for-a-vpn-app-read-this</link><guid isPermaLink="true">http://direct.ecency.com/news/@ciriaco/shopping-for-a-vpn-app-read-this</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Sun, 25 Feb 2018 05:29:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/LcTxR7u1XKae8Zaj594qUJafNyNSBw9svATPAkZ7vigTpvRC6ygnvvk2TVTfnruZ9HyZtWESx71Qw5mh83BzgWTjdQFigHRjeujzY1oD1quEnTYQQE78JMru14PTSEEBBPvdg2igKowadV7Hy5W8Mx6Kg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Provoking iran could have unseen cyber consequences]]></title><description><![CDATA[PRESIDENT Trump announced that he will not certify Iran’s cooperation with the 2015 nuclear agreement negotiated by the Obama Administration. The move doesn’t eliminate or rework the deal, possibilities]]></description><link>http://direct.ecency.com/news/@ciriaco/provoking-iran-could-have-unseen-cyber-consequences</link><guid isPermaLink="true">http://direct.ecency.com/news/@ciriaco/provoking-iran-could-have-unseen-cyber-consequences</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Sun, 15 Oct 2017 20:55:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYvduzQK1EydJZ2M19vqrAfTgvkPKy1deJNbYfHqaYVwPiQ5U47zgHjdagPMMp6k3eJZHbGb5Uz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Common Types of Cyberattacks in Education and What We Can Learn from Them]]></title><description><![CDATA[Cybercriminals have increasingly taken notice of schools and universities as profitable targets for cyberattacks. A key reason for this is the types of information schools keep on students, parents, and]]></description><link>http://direct.ecency.com/news/@ciriaco/common-types-of-cyberattacks-in-education-and-what-we-can-learn-from-them</link><guid isPermaLink="true">http://direct.ecency.com/news/@ciriaco/common-types-of-cyberattacks-in-education-and-what-we-can-learn-from-them</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Mon, 09 Oct 2017 19:56:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYXnWeRDMmnb1DnPYCzAJfRjoicL46LKQPY8PLe6h7vfniADBGCQWhP2nEgRPsSQnZ9WFzkcc46?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[12 Daunting Ransomware Statistics]]></title><description><![CDATA[Between the massive WannaCry and NotPetya attacks of 2017, which reached businesses across the globe, ransomware is on the minds of many security professionals. Interest continues to increase as ransomware]]></description><link>http://direct.ecency.com/news/@ciriaco/12-daunting-ransomware-statistics</link><guid isPermaLink="true">http://direct.ecency.com/news/@ciriaco/12-daunting-ransomware-statistics</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Sat, 07 Oct 2017 16:37:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXa4PsTqM5Vpg8AG26F3tZS1CATfs6biUERzyPK4sgnVE4uS6JM9JHdbznSNxfVwGVuiKtZtKSva?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Spam / Fraud Alert: Real Estate Token ICO Scam - real.markets]]></title><description><![CDATA[Subject: Real Estate Token From: melissa@redacted.tld Date / Time: October 1st 2017, 16:23:47.000 Subject: Special-Sale is OPEN NOW From: lido@redacted.tld Date / Time: October 1st 2017, 14:18:53.000 Subject:]]></description><link>http://direct.ecency.com/bitcoin/@ciriaco/spam-fraud-alert-real-estate-token-ico-scam-real-markets</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@ciriaco/spam-fraud-alert-real-estate-token-ico-scam-real-markets</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Sun, 01 Oct 2017 19:28:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXa3eQqyMc85BXyneN5WQ9hDUsiRUGSPJMhcaRCQdxYgnXQmqE8mnLFzdrsFakhDZhQmDsXJAigN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Ransomware Numbers Continue to Look Abysmal]]></title><description><![CDATA[Ransomware is one of the fastest-growing concerns among IT pros, according to several studies out this week. Even after several years of escalation, ransomware continues its hockey-stick growth by just]]></description><link>http://direct.ecency.com/news/@ciriaco/ransomware-numbers-continue-to-look-abysmal</link><guid isPermaLink="true">http://direct.ecency.com/news/@ciriaco/ransomware-numbers-continue-to-look-abysmal</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Fri, 29 Sep 2017 02:00:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYc2BVYR78cLaGyQegZMSgeC8SpWjLBTxtYQx4jMWLvbUG8URKEBZTb2qCQVko4rJRhJc8fme2S?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Researchers Use Heart Rhythms for Continuous Authentication]]></title><description><![CDATA[Researchers from the University at Buffalo SUNY, and the Department of Electrical and Computer Engineering at Texas Tech University have proposed a novel new continuous user authentication method using]]></description><link>http://direct.ecency.com/news/@ciriaco/researchers-use-heart-rhythms-for-continuous-authentication</link><guid isPermaLink="true">http://direct.ecency.com/news/@ciriaco/researchers-use-heart-rhythms-for-continuous-authentication</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Thu, 28 Sep 2017 01:41:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXa8BJFSurVhGA9Y6DLtrhSAqJ3HU7gxSQd4qpPHSGy9CkMUJh84ZHaVHB67GQhdZ7U1kGhn3sP4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[US Financial Regulator Launches Unit to Police Cyber-threats]]></title><description><![CDATA[The US Securities and Exchange Commission has announced it is setting up a special unit dedicated to identifying cyber-related misconduct. The announcement came days after the top US financial regulator]]></description><link>http://direct.ecency.com/news/@ciriaco/us-financial-regulator-launches-unit-to-police-cyber-threats</link><guid isPermaLink="true">http://direct.ecency.com/news/@ciriaco/us-financial-regulator-launches-unit-to-police-cyber-threats</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[ciriaco]]></dc:creator><pubDate>Tue, 26 Sep 2017 13:33:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYqUtc3NE3kf71yQaNsDDtqC8GvfFxb6tjHCXtRXuWJpc7ZoW14osf1fJ1PVRETM47Gt7K4zL78?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>