<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 19 May 2026 12:58:13 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@mrosenquist/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[Software Vulnerability Exploitation]]></title><description><![CDATA[Mythos is an inflection point for software vulnerability exploitation. Critical sectors, including finance, government, healthcare, and defense, are realizing how their digital infrastructures and services]]></description><link>http://direct.ecency.com/ai/@mrosenquist/software-vulnerability-exploitation</link><guid isPermaLink="true">http://direct.ecency.com/ai/@mrosenquist/software-vulnerability-exploitation</guid><category><![CDATA[ai]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 18 May 2026 20:28:45 GMT</pubDate><enclosure url="https://i.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eNRr7CjMAxp3HhvzXrcqmgu7dKzxNt4buJW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Enterprise Under Siege in the New Cyber Threat Landscape  - Webinar]]></title><description><![CDATA[I am looking forward to a spirited discussion with my amazing colleague Cassie Crossley on the rapidly shifting threat landscape. We need to discuss how Anthropic’s Mythos is a signal for major disruption]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/enterprise-under-siege-in-the-new-cyber-threat-landscape-webinar</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/enterprise-under-siege-in-the-new-cyber-threat-landscape-webinar</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 13 May 2026 23:22:30 GMT</pubDate><enclosure url="https://i.ecency.com/p/5ShzsKnKF7vq9cjBEMiBFvx2E5xzw2aLsy11TBqygcFaTj3zsAK4gGMbH9z548sma5dZEaj1KMA6CYs7mqphn8CXnxQVNjSrmzoom3GppiSrzGreG8kdRNpBndTRZonsYND16QoP7f92t7sCJe8Btohg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Apple Pivots to Intel for a Secure Western Supply Chain of Semiconductors]]></title><description><![CDATA[Apple and Intel formally reconcile to once again produce chips. As 2027 nears and the likelihood of a Chinese invasion of Taiwan rising, the risks to serious global chip disruption is something that cannot]]></description><link>http://direct.ecency.com/technology/@mrosenquist/apple-pivots-to-intel-for-a-secure-western-supply-chain-of-semiconductors</link><guid isPermaLink="true">http://direct.ecency.com/technology/@mrosenquist/apple-pivots-to-intel-for-a-secure-western-supply-chain-of-semiconductors</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 11 May 2026 21:57:39 GMT</pubDate><enclosure url="https://i.ecency.com/p/sML2JBPsdAyGmXCw438G5dsbSTzx8CksfbCo3YXSHz8PcCzfQGfzwj9PwHiLskb8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Mythos Breaks Patching]]></title><description><![CDATA[Full article:]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/mythos-breaks-patching</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/mythos-breaks-patching</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 11 May 2026 19:07:12 GMT</pubDate><enclosure url="https://i.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e99t7FbfARzFGUpuvQjwLgmLpEVwTye8ko8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How Mythos Signals Cybersecurity Disruption]]></title><description><![CDATA[What is Mythos Mythos is Anthropic’s latest AI model, and it is stirring up a tornado of concern in cybersecurity circles. Even before its release, Mythos discovered thousands of new sensitive vulnerabilities]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/how-mythos-signals-cybersecurity-disruption</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/how-mythos-signals-cybersecurity-disruption</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 04 May 2026 17:17:33 GMT</pubDate><enclosure url="https://i.ecency.com/p/6C2W1azD1rBs8i8QXbP2Ja5uHwpQX8ssNEFzu1EPiTSknHWN39h4gTG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Mythos Is Rewriting the Rules of Cybersecurity]]></title><description><![CDATA[​ With preliminary use, it uncovered thousands of sensitive flaws, some existing for decades without detection. It found them in every major operating system and web browser. Mythos's capabilities don't]]></description><link>http://direct.ecency.com/ai/@mrosenquist/mythos-is-rewriting-the-rules-of-cybersecurity</link><guid isPermaLink="true">http://direct.ecency.com/ai/@mrosenquist/mythos-is-rewriting-the-rules-of-cybersecurity</guid><category><![CDATA[ai]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 01 May 2026 21:50:30 GMT</pubDate><enclosure url="https://i.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eAhQ9rSu3a7i1yfz7MxcbgLBCkVydEXKdxJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Privacy Vulnerability in Firefox and TOR Browsers]]></title><description><![CDATA[The security company Fingerprint discovered how on Firefox browsers, websites could track users even if they used private browsing tabs or the anonymity focused TOR browser. Mozilla closed the vulnerability]]></description><link>http://direct.ecency.com/privacy/@mrosenquist/privacy-vulnerability-in-firefox-and-tor-browsers</link><guid isPermaLink="true">http://direct.ecency.com/privacy/@mrosenquist/privacy-vulnerability-in-firefox-and-tor-browsers</guid><category><![CDATA[privacy]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 23 Apr 2026 21:57:24 GMT</pubDate><enclosure url="https://i.ecency.com/p/2YRZBi4FZVHeTcwfbUKKAkzgNpEb5tyYNjzNqaWpffQTp9g3LjTSmqQ67ueqb4WR3WGrxK5nqYs1SwFYokeYioQXhRKFdoDiyf4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[From Concept to Cloud in Record Time]]></title><description><![CDATA[Developers are under pressure when building agent-based AI products that must be both innovative and safe. When security integration slows down progress, developers are forced to choose between speed and]]></description><link>http://direct.ecency.com/ai/@mrosenquist/from-concept-to-cloud-in-record-time</link><guid isPermaLink="true">http://direct.ecency.com/ai/@mrosenquist/from-concept-to-cloud-in-record-time</guid><category><![CDATA[ai]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 22 Apr 2026 21:16:21 GMT</pubDate><enclosure url="https://i.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eBs3A3vbyZGv2bnWD6zbRk73KKgKrYXnjXk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Latest Metrics Show AI Models Surpassing Humans]]></title><description><![CDATA[How good are AI models getting at technical tasks? …better than most humans in MANY fields. This has serious implications for cybersecurity! The attackers and defenders will leverage these models in many]]></description><link>http://direct.ecency.com/ai/@mrosenquist/latest-metrics-show-ai-models-surpassing-humans</link><guid isPermaLink="true">http://direct.ecency.com/ai/@mrosenquist/latest-metrics-show-ai-models-surpassing-humans</guid><category><![CDATA[ai]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Sun, 19 Apr 2026 02:00:30 GMT</pubDate><enclosure url="https://i.ecency.com/p/5bEGgqZEHBMeGRd9g1Ftt6p1G41Xe6szs1LtFxZdC32Sd3XAcUFE82pxTMPAtsQZUpw5gSApxmFXYy5dNZcpCBAU2egJLSWi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How AI Just Handed Attackers the Keys to Your System]]></title><description><![CDATA[​ I had a great discussion on the Full Metal Packet podcast, talking with Yegor Sak and Alex Paguis, about the cybersecurity risks and challenges that is accompanying the global adoption of AI. These]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/how-ai-just-handed-attackers-the-keys-to-your-system</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/how-ai-just-handed-attackers-the-keys-to-your-system</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 16 Apr 2026 17:37:00 GMT</pubDate><enclosure url="https://i.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45dw2ppyoN9YzHATT1uMpYFR2SMPB2hhApxZ4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Mythos AI Engine a Threat to Global Banking]]></title><description><![CDATA[The ramifications of what Anthropic’s Mythos AI engine can do, are becoming more apparent as more organizations gain early access. Downright scary for software developers and global cybersecurity! The]]></description><link>http://direct.ecency.com/crypto/@mrosenquist/mythos-ai-engine-a-threat-to-global-banking</link><guid isPermaLink="true">http://direct.ecency.com/crypto/@mrosenquist/mythos-ai-engine-a-threat-to-global-banking</guid><category><![CDATA[crypto]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 13 Apr 2026 22:27:00 GMT</pubDate><enclosure url="https://i.ecency.com/p/2YRZBi4FZVHeTcwfbUKKAkzgNpEb5wRDG8eYB11eTqMrjDnW7kVJyZfL5wTwEpJ3VVz6mmWyWH1tnzq9nfhBw2JZKEqpNucRJNJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Anthropic Claude Mythos Will Break Vulnerability Management]]></title><description><![CDATA[Anthropic’s latest AI Model, Claude Mythos, will break the cybersecurity vulnerability management operational models. Mythos is so good at discovering and building viable exploits it is currently being]]></description><link>http://direct.ecency.com/ai/@mrosenquist/anthropic-claude-mythos-will-break-vulnerability-management</link><guid isPermaLink="true">http://direct.ecency.com/ai/@mrosenquist/anthropic-claude-mythos-will-break-vulnerability-management</guid><category><![CDATA[ai]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 10 Apr 2026 19:14:36 GMT</pubDate><enclosure url="https://i.ecency.com/p/2YRZBi4FZVHeTcwfbUKKAkzgNpEb5wN4PcNKV5UF5aVMCJ65CVNZLAyGnVbn8ZBeWDnuF68YKzZavFFN8Y5KPapDZ1S1YWnrm4r?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Attack Against a Major Open-Source Library was Social Engineering]]></title><description><![CDATA[Details emerge on how Axios was infected with a Remote Access Trojan in March, undermining the security in one of the most popular JavaScript libraries that has 100 million downloads weekly. The attack]]></description><link>http://direct.ecency.com/software/@mrosenquist/attack-against-a-major-open-source-library-was-social-engineering</link><guid isPermaLink="true">http://direct.ecency.com/software/@mrosenquist/attack-against-a-major-open-source-library-was-social-engineering</guid><category><![CDATA[software]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 06 Apr 2026 20:14:09 GMT</pubDate><enclosure url="https://i.ecency.com/p/2gsjgna1uruvFsBUsT43WEAUu7VN1XAa3TokXcd9rFz99amwpHKzbMoAtdNJtCsUYRr8zSqzxE6TvpYth5NNXRpZU6z3FRPVopLa4xvEML1ocy88VU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Gmail’s New Rename Feature Could Add Spam and Phishing to Your Inbox]]></title><description><![CDATA[As of March 31st, Google is allowing users to change their primary Gmail address username. Although a nice feature for those who created unfortunate names originally, it may also undermine spam and phishing]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/gmail-s-new-rename-feature-could-add-spam-and-phishing-to-your-inbox</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/gmail-s-new-rename-feature-could-add-spam-and-phishing-to-your-inbox</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 02 Apr 2026 16:54:24 GMT</pubDate><enclosure url="https://i.ecency.com/p/PB8ro82ZpZP1LwhMpNsM9QB2i14js7msiXzEBSZa8hiozwEkczbgFuZiGX22BJvnRGXbojwa8bA5SbPDZXydkgGmkgiZqdtiFgZmsk3EjhDR9eqF?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cybersecurity Can Learn from the Artemis Launch]]></title><description><![CDATA[The Artemis II mission, bringing humans back to the Moon, had a successful launch today! An amazing cumulation of efforts to manage the mindboggling combination of risks to push a massive rocket into space,]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/cybersecurity-can-learn-from-the-artemis-launch</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/cybersecurity-can-learn-from-the-artemis-launch</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 02 Apr 2026 00:09:48 GMT</pubDate><enclosure url="https://i.ecency.com/p/6gUbcKN7Uxen6Lzy8s8AoPEQbXTFReURcZStdJH8xQsDgY4s5bzChkhrbdHRiNC1TxG9k2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Your next user isn't human. Is your app ready?]]></title><description><![CDATA[The rise of agentic AI means that your future users will not be human, but rather their AI-agent proxies. Is your app ready?More insights: Auth0 LinkedIn page:]]></description><link>http://direct.ecency.com/ai/@mrosenquist/your-next-user-isn-t-human-is-your-app-ready</link><guid isPermaLink="true">http://direct.ecency.com/ai/@mrosenquist/your-next-user-isn-t-human-is-your-app-ready</guid><category><![CDATA[ai]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 01 Apr 2026 16:04:06 GMT</pubDate></item><item><title><![CDATA[RSAC Focuses Cybersecurity Insights, Tech, and Community in One Place]]></title><description><![CDATA[The RSAC conference has once again descended upon San Francisco and delivered an event that brings together the largest collection of industry leaders, technologies, and cybersecurity community events!]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/rsac-focuses-cybersecurity-insights-tech-and-community-in-one-place</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/rsac-focuses-cybersecurity-insights-tech-and-community-in-one-place</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 27 Mar 2026 19:11:06 GMT</pubDate><enclosure url="https://i.ecency.com/p/BRWJ2YmdUFozvhzfVpSViWN9rFcoyX8nSmkzHW4GadFddvX8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Turing Award Winners]]></title><description><![CDATA[Congrats to Charles Bennett and Gilles Brassard for winning the Turing Award for their industry leadership and breakthroughs with Quantum Information, specifically quantum key distribution. Their work]]></description><link>http://direct.ecency.com/technology/@mrosenquist/turing-award-winners</link><guid isPermaLink="true">http://direct.ecency.com/technology/@mrosenquist/turing-award-winners</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 20 Mar 2026 17:59:24 GMT</pubDate></item><item><title><![CDATA[Cybercriminals are Winning with AI]]></title><description><![CDATA[AI has become the most powerful tool for financial fraud since the dawn of the Internet. As predicted, criminals are exploiting it faster, more effectively, and at scale. According to the latest Interpol]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/cybercriminals-are-winning-with-ai</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/cybercriminals-are-winning-with-ai</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 19 Mar 2026 20:22:57 GMT</pubDate><enclosure url="https://i.ecency.com/p/2YRZBi4FZVHeTcwfbUKKAkzgNpEb5sqPYEFseghMM8yUtjmhhxakzBnCS2eeWyiTzFNbcYwRUyYG2oQdMPiYhFRQ7jMnxkVfocr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How SMBs Can Proactively Strengthen Cybersecurity]]></title><description><![CDATA[Cyber attackers increasingly target SMBs because they are often the easiest path into larger supply chains. As cyberattacks are ramping up, specifically against Critical Infrastructure sectors, Small and]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/how-smbs-can-proactively-strengthen-cybersecurity</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/how-smbs-can-proactively-strengthen-cybersecurity</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 13 Mar 2026 18:45:48 GMT</pubDate><enclosure url="https://i.ecency.com/p/2YRZBi4FZVHeTcwfbUKKAkzgNpEb5tkzpuUYw6b8xiNmMXh4WyAgUaEaXzQn1CCTCHdvh3CDYHGVUBJxNDwA3tVW59BGeorPxCn?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>