<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sun, 12 Apr 2026 20:49:59 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@payloadartist/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[Analyzing and Preventing Sub-domain Takeovers: Real Risks? Causes?]]></title><description><![CDATA[0x00 - Intro and Cause Sub-domain takeovers form a common class of vulnerability, in which an unused sub-domain pointing to a retired service is left as it is by developers. Often developers use SaaS and]]></description><link>http://direct.ecency.com/infosec/@payloadartist/analyzing-and-preventing-sub-domain-takeovers-real-risks-causes</link><guid isPermaLink="true">http://direct.ecency.com/infosec/@payloadartist/analyzing-and-preventing-sub-domain-takeovers-real-risks-causes</guid><category><![CDATA[infosec]]></category><dc:creator><![CDATA[payloadartist]]></dc:creator><pubDate>Thu, 06 Jun 2019 16:54:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrVbcMPxw2VDDUBHeCopyFtXi3kN1aX8nX4Nfu9Ft5L6Gz5oUuNz2y1SjJ4357hE1qjySqLnSDmg6rwc8C1qt82qd3t?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>