<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 13 May 2026 05:33:14 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@ragnaroek/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[Cyber Attack Marketplace: Where, how and why of purchasing an Attack]]></title><description><![CDATA[Over the last decade the technology industry has grown by leaps and bounds. Along with this rapid growth, cyber-attacks have evolved in parallel at an alarming rate. Part of this growth can be attributed]]></description><link>http://direct.ecency.com/cyberattack/@ragnaroek/cyber-attack-marketplace-where-how-and-why-of-purchasing-an-attack</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@ragnaroek/cyber-attack-marketplace-where-how-and-why-of-purchasing-an-attack</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[ragnaroek]]></dc:creator><pubDate>Tue, 26 Jul 2016 08:17:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/5bEGgqZEHBMds6To8UQSs91dFhDfF8fU9SaSvJ2PT7uFJVbvJKEJRZrzbUvrqEf145r7GX8CYuuzHVb3XiUajBqXGFDMPeP8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Darknet 101: An Introduction to The Darkest Places Online]]></title><description><![CDATA[Hey everyone, today we will take a closer look at the Darknet. There is so much talk these days about the Darknet. It’s the stuff of crime novels – a hotbed of criminal activity where anything can be bought]]></description><link>http://direct.ecency.com/security/@ragnaroek/darknet-101-an-introduction-to-the-darkest-places-online</link><guid isPermaLink="true">http://direct.ecency.com/security/@ragnaroek/darknet-101-an-introduction-to-the-darkest-places-online</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[ragnaroek]]></dc:creator><pubDate>Mon, 25 Jul 2016 22:23:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/368La1qZAv72bvXNcVbDeJQvzyJQsDfBooYakxc6oyBcHznsBjfkjoWwbyMZuYqQ6dJg27jEsxVqfUSgy3raMwa6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[2016 Summer Olympics: In the Crosshairs]]></title><description><![CDATA[As the 2016 Summer Olympics approach, the cyber community turns its attention to the crowds and target-rich environment created by this high profile sporting event. Over 500,000 attendees to Rio De Janeiro]]></description><link>http://direct.ecency.com/security/@ragnaroek/2016-summer-olympics-in-the-crosshairs</link><guid isPermaLink="true">http://direct.ecency.com/security/@ragnaroek/2016-summer-olympics-in-the-crosshairs</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[ragnaroek]]></dc:creator><pubDate>Mon, 25 Jul 2016 10:10:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/MG5aEqKFcQi5i77GbyxVAJMm1rWsoNpnpFtdQE986HTc8DF8FRThuS3fDCGiwuGjEcPkfkEG4B8QkW3DcGLemgbQQU83mu118?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Introduction]]></title><description><![CDATA[My name is Daniel Smith and I'm a information security researcher for radware. We already run a Blog which you can find under radwareblog I've been a crypto enthusiast since the second half of 2011. In]]></description><link>http://direct.ecency.com/introduction/@ragnaroek/introduction</link><guid isPermaLink="true">http://direct.ecency.com/introduction/@ragnaroek/introduction</guid><category><![CDATA[introduction]]></category><dc:creator><![CDATA[ragnaroek]]></dc:creator><pubDate>Mon, 25 Jul 2016 09:33:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/3q52Dkr5nBe4KspNSrDXagquUoHMGc8jbMeseoSMgyh79EEdr9q5iv2msdD5tFGroyaadgSvS2RBk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Smartphone BotNets are on the Rise]]></title><description><![CDATA[Smartphone botnets have become increasingly popular over the last few years. Android software is highly vulnerable to malware and is constantly targeted by attackers due to the OS’s popularity around the]]></description><link>http://direct.ecency.com/security/@ragnaroek/smartphone-botnets-are-on-the-rise</link><guid isPermaLink="true">http://direct.ecency.com/security/@ragnaroek/smartphone-botnets-are-on-the-rise</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[ragnaroek]]></dc:creator><pubDate>Mon, 25 Jul 2016 08:27:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/Pufd3b1W2k71FeFVQ7jdyRTzbwpQVJoZTZvaw9FnQzEKJkKhpNCkWndL?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>