<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 20 May 2026 19:38:07 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/artificial/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Artificial plant picture]]></title><description><![CDATA[Hi everyone I hope you are all doing good and I am also well. Today I am thrilled to share this artificial plant . This is a gift plant and I really like this and I took picture . I like this plants flowers]]></description><link>http://direct.ecency.com/hive-127238/@abdt/artificial-plant-picture</link><guid isPermaLink="true">http://direct.ecency.com/hive-127238/@abdt/artificial-plant-picture</guid><category><![CDATA[hive-127238]]></category><dc:creator><![CDATA[abdt]]></dc:creator><pubDate>Wed, 20 May 2026 14:14:06 GMT</pubDate><enclosure url="https://i.ecency.com/p/cyxkEVqiiLy5czPNg6acYev351Du9gQgrBvuGckFeA7yRnXPdjWe4fv5XGQfiA3tRY7RmgSpfovqvzYrgCbEvSFr3Pfg8wbbfgDMUp6BLXFUexyUEomt6NqXUmbwm5gb67Q?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[AI Will Exploit What Businesses Refuse to Fix]]></title><description><![CDATA[About 50 thousand vulnerabilities were discovered last year and many are either not being fixed or the patching is purposely delayed. The next generation of AI-powered tools will abuse this weakness. Emerging]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/ai-will-exploit-what-businesses-refuse-to-fix</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/ai-will-exploit-what-businesses-refuse-to-fix</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Tue, 19 May 2026 17:14:24 GMT</pubDate><enclosure url="https://i.ecency.com/p/2YRZBi4FZVHeTcwfbUKKAkzgNpEb5tyjk2svcUxL9h3tiZvT39uLsWuQj4xA4fUPfPiw6Qiwi6vxrFzp8F8FmBZscJ1VM7qcmqY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How Mythos Signals Cybersecurity Disruption]]></title><description><![CDATA[What is Mythos Mythos is Anthropic’s latest AI model, and it is stirring up a tornado of concern in cybersecurity circles. Even before its release, Mythos discovered thousands of new sensitive vulnerabilities]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/how-mythos-signals-cybersecurity-disruption</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/how-mythos-signals-cybersecurity-disruption</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 04 May 2026 17:17:33 GMT</pubDate><enclosure url="https://i.ecency.com/p/6C2W1azD1rBs8i8QXbP2Ja5uHwpQX8ssNEFzu1EPiTSknHWN39h4gTG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Humanoid robots with artificial muscles]]></title><description><![CDATA[Humanoid robots with artificial muscles During a recent event in Silicon Valley (Souce), one that attracted attention, not because it was exaggerated, but because of the level of realism that it entails,]]></description><link>http://direct.ecency.com/hive-196387/@rebe.torres12/humanoid-robots-with-artificial-muscles-dsf</link><guid isPermaLink="true">http://direct.ecency.com/hive-196387/@rebe.torres12/humanoid-robots-with-artificial-muscles-dsf</guid><category><![CDATA[hive-196387]]></category><dc:creator><![CDATA[rebe.torres12]]></dc:creator><pubDate>Mon, 20 Apr 2026 02:24:45 GMT</pubDate><enclosure url="https://i.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQT6Qa3Tdyqb9cA7EDhoyuN56PEXdXMpaPvEa8VakGpnrwQYQqdPxef7S19P792FVi8DboYCU46?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Latest Metrics Show AI Models Surpassing Humans]]></title><description><![CDATA[How good are AI models getting at technical tasks? …better than most humans in MANY fields. This has serious implications for cybersecurity! The attackers and defenders will leverage these models in many]]></description><link>http://direct.ecency.com/ai/@mrosenquist/latest-metrics-show-ai-models-surpassing-humans</link><guid isPermaLink="true">http://direct.ecency.com/ai/@mrosenquist/latest-metrics-show-ai-models-surpassing-humans</guid><category><![CDATA[ai]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Sun, 19 Apr 2026 02:00:30 GMT</pubDate><enclosure url="https://i.ecency.com/p/5bEGgqZEHBMeGRd9g1Ftt6p1G41Xe6szs1LtFxZdC32Sd3XAcUFE82pxTMPAtsQZUpw5gSApxmFXYy5dNZcpCBAU2egJLSWi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Observabilidade Preditiva: De Reativo para Proativo]]></title><description><![CDATA[Seu datacenter está monitorado 24/7. Você tem logs, métricas, traces. Alertas disparam. Time responde. Depois analisa: "por que falhou?" Essa é abordagem reativa. E custa caro. Observabilidade]]></description><link>http://direct.ecency.com/pt-brobservabilidadesrem/@nascimentoab/observabilidade-preditiva-de-reativo-para</link><guid isPermaLink="true">http://direct.ecency.com/pt-brobservabilidadesrem/@nascimentoab/observabilidade-preditiva-de-reativo-para</guid><category><![CDATA[pt-brobservabilidadesrem]]></category><dc:creator><![CDATA[nascimentoab]]></dc:creator><pubDate>Wed, 08 Apr 2026 14:21:09 GMT</pubDate><enclosure url="https://i.ecency.com/DQmVtiZVpRbfmkZj6SrUr2Aj2Uix3ArowtMcmsseKZTpJkx/03_observabilidade.png" length="0" type="image/png"/></item><item><title><![CDATA[Attack Against a Major Open-Source Library was Social Engineering]]></title><description><![CDATA[Details emerge on how Axios was infected with a Remote Access Trojan in March, undermining the security in one of the most popular JavaScript libraries that has 100 million downloads weekly. The attack]]></description><link>http://direct.ecency.com/software/@mrosenquist/attack-against-a-major-open-source-library-was-social-engineering</link><guid isPermaLink="true">http://direct.ecency.com/software/@mrosenquist/attack-against-a-major-open-source-library-was-social-engineering</guid><category><![CDATA[software]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 06 Apr 2026 20:14:09 GMT</pubDate><enclosure url="https://i.ecency.com/p/2gsjgna1uruvFsBUsT43WEAUu7VN1XAa3TokXcd9rFz99amwpHKzbMoAtdNJtCsUYRr8zSqzxE6TvpYth5NNXRpZU6z3FRPVopLa4xvEML1ocy88VU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Artificial Intelligence: Transforming the Future of Technology and Society]]></title><description><![CDATA[Artificial Intelligence (AI) is one of the most powerful technologies shaping the modern world. From smartphones and voice assistants to self-driving cars and advanced medical research, AI is transforming]]></description><link>http://direct.ecency.com/artificial/@magiee4you/artificial-intelligence-transforming-the-future</link><guid isPermaLink="true">http://direct.ecency.com/artificial/@magiee4you/artificial-intelligence-transforming-the-future</guid><category><![CDATA[artificial]]></category><dc:creator><![CDATA[magiee4you]]></dc:creator><pubDate>Wed, 25 Mar 2026 12:51:03 GMT</pubDate></item><item><title><![CDATA[How Artificial Intelligence Is Driving the Next Wave of Industrial Innovation]]></title><description><![CDATA[Artificial intelligence is rapidly transforming the way industries operate across the globe. While early applications of AI focused mainly on consumer technologies such as chatbots and recommendation systems,]]></description><link>http://direct.ecency.com/ai/@magiee4you/how-artificial-intelligence-is-driving</link><guid isPermaLink="true">http://direct.ecency.com/ai/@magiee4you/how-artificial-intelligence-is-driving</guid><category><![CDATA[ai]]></category><dc:creator><![CDATA[magiee4you]]></dc:creator><pubDate>Thu, 19 Mar 2026 12:19:24 GMT</pubDate></item><item><title><![CDATA[They create artificial neurons that play DOOM]]></title><description><![CDATA[They create artificial neurons that play DOOM Souce An Australian startup called Cortical Labs announced that it managed to train around 200,000 human brain cells grown without a laboratory to interact]]></description><link>http://direct.ecency.com/hive-196387/@rebe.torres12/they-create-artificial-neurons-that-play-doom-2w9</link><guid isPermaLink="true">http://direct.ecency.com/hive-196387/@rebe.torres12/they-create-artificial-neurons-that-play-doom-2w9</guid><category><![CDATA[hive-196387]]></category><dc:creator><![CDATA[rebe.torres12]]></dc:creator><pubDate>Sun, 08 Mar 2026 03:34:15 GMT</pubDate><enclosure url="https://i.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iP9U4CcHbmCaG1bSrxXatLoUFyYb2YhxMiETVnuKwSTpR13e4gLGNpGeuagGkdJvseh9Ljsx18S?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Why Cyber Attackers Benefit More from AI Technology than Defenders]]></title><description><![CDATA[AI is transforming both cyber offense and defense, but the attackers hold distinct advantages. AI tools can be used for attacks and defense but the attackers are less concerned with quality or problems.]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/why-cyber-attackers-benefit-more-from-ai-technology-than-defenders</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/why-cyber-attackers-benefit-more-from-ai-technology-than-defenders</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 02 Mar 2026 21:13:27 GMT</pubDate></item><item><title><![CDATA[As redes web3 já perceberam a importância do "Fim da centralização" há décadas... E você?]]></title><description><![CDATA[Olá rede, z zz ZZZ Z Comecei minhas pesquisas sobre a Fáscia, em dezembro de 2025 e tenho certo que vocês vão ficar "Fascinados" com o tema. "Talvez a inteligência artificial apenas repita]]></description><link>http://direct.ecency.com/hive-121494/@tekabybrazil/as-redes-web3-ja-perceberam</link><guid isPermaLink="true">http://direct.ecency.com/hive-121494/@tekabybrazil/as-redes-web3-ja-perceberam</guid><category><![CDATA[hive-121494]]></category><dc:creator><![CDATA[tekabybrazil]]></dc:creator><pubDate>Sat, 28 Feb 2026 13:08:03 GMT</pubDate><enclosure url="https://i.ecency.com/DQmdeAp434BNFVuJEchZJQXfumudCM8YN39zJfvA9neYjhf/image-1772287425166.png" length="0" type="image/png"/></item><item><title><![CDATA[The First Crucial Step to Secure AI]]></title><description><![CDATA[Governance of AI is the foundational cornerstone for establishing cybersecurity, privacy, compliance, and safety. Without governance, AI adoption and use becomes the ‘wild west’ where everyone is doing]]></description><link>http://direct.ecency.com/ai/@mrosenquist/the-first-crucial-step-to-secure-ai</link><guid isPermaLink="true">http://direct.ecency.com/ai/@mrosenquist/the-first-crucial-step-to-secure-ai</guid><category><![CDATA[ai]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 27 Feb 2026 20:25:57 GMT</pubDate><enclosure url="https://i.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eR97q8e5fohQHVxSExfm3az1XbDGdWHuEpn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[AI Shocks the Cybersecurity Market]]></title><description><![CDATA[The cybersecurity market was jolted last week after Anthropic dropped a bombshell announcement. The company’s new AI Claude model identified 500 previously unknown high-risk vulnerabilities hidden in widely]]></description><link>http://direct.ecency.com/ai/@mrosenquist/ai-shocks-the-cybersecurity-market</link><guid isPermaLink="true">http://direct.ecency.com/ai/@mrosenquist/ai-shocks-the-cybersecurity-market</guid><category><![CDATA[ai]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 25 Feb 2026 23:43:45 GMT</pubDate><enclosure url="https://i.ecency.com/p/EfcLDDAkyqgqyc52TdHnx88BjGJXpnzxmEnB8yNLCo37xWGfMtGtRsLqSfLAmYJTvywumjJbvLPbuHBiugh1K36qZ6Tb4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Top AI Problem for CISOs]]></title><description><![CDATA[Cybersecurity leadership is faced with an impossible dilemma: either embrace AI and suffer the enormous risks or resist AI and be ostracized by executive leadership for inhibiting gains. ​ The solution]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/the-top-ai-problem-for-cisos</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/the-top-ai-problem-for-cisos</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Tue, 24 Feb 2026 19:29:21 GMT</pubDate></item><item><title><![CDATA[AI Dominates Cybersecurity]]></title><description><![CDATA[​ AI will dominate the course of cybersecurity in 2026! Attacker's capabilities, growth of vulnerabilities among victims, defender's technology, and the strategic management by CISOs are all radically]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/ai-dominates-cybersecurity</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/ai-dominates-cybersecurity</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Sun, 22 Feb 2026 22:48:06 GMT</pubDate></item><item><title><![CDATA[ 🚀 Meet Kangamoon: The Revolution Combining Memes and Real Profits!]]></title><description><![CDATA[Have you ever imagined a project that blends the infectious humor of Memecoins with the real utility of Play-to-Earn (P2E) and Social-Fi? If you haven't heard of Kangamoon ($KANG) yet, get ready—this ecosystem]]></description><link>http://direct.ecency.com/someeofficial/@selhomarlopes/meet-kangamoon-the-revolution-combining-memes-and-real-profits</link><guid isPermaLink="true">http://direct.ecency.com/someeofficial/@selhomarlopes/meet-kangamoon-the-revolution-combining-memes-and-real-profits</guid><category><![CDATA[someeofficial]]></category><dc:creator><![CDATA[selhomarlopes]]></dc:creator><pubDate>Thu, 19 Feb 2026 17:53:00 GMT</pubDate><enclosure url="https://i.ecency.com/p/C3TZR1g81UNbFzApDTmvFatkwuDREJFVGiTUu9HoFY6M7bkc8GviCXcteW5aje2owhbt7nKQEzXykJvUqwD53ViYaxgZoTFiJENsE4ahFgHAn1L1oLB7Jce?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A Busy Week for Cybersecurity Speaking Engagements]]></title><description><![CDATA[I have a busy week with podcasts, webinars, and a keynote! Communicating and sharing is vital to the cybersecurity industry. It is how we leverage shared knowledge and experiences to make more informed]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/a-busy-week-for-cybersecurity-speaking-engagements</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/a-busy-week-for-cybersecurity-speaking-engagements</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 19 Feb 2026 01:42:24 GMT</pubDate><enclosure url="https://i.ecency.com/p/8hHVpauQQYxe1XRgmBVcaxhzdz742SYS7LK3mDjmpKW67tkj3RCRcKmbF74?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A Brave New World?]]></title><description><![CDATA[Image by Tumisu from Pixabay A new era began a decade ago. In the last two years, or perhaps longer, a kind of global embarrassment has emerged. No one ever wanted to be left behind, miss the boat, or]]></description><link>http://direct.ecency.com/hive-126152/@xrayman/a-brave-new-world-taf5ki</link><guid isPermaLink="true">http://direct.ecency.com/hive-126152/@xrayman/a-brave-new-world-taf5ki</guid><category><![CDATA[hive-126152]]></category><dc:creator><![CDATA[xrayman]]></dc:creator><pubDate>Fri, 13 Feb 2026 22:38:42 GMT</pubDate><enclosure url="https://i.ecency.com/p/26uUsAjKTsXCDw7zixZR182JbFKvgzJ9YwsFpTVcRaGCmsqhA1unTgprUcTohhK2z8qTtSuCBngcRWkzvEgCrqQHfqYP1gZiJwDQQoVmKSd8sh9jSnxXrmtSva4y9u4GmyfvBJGb4e6ci3NWnYaTgH5KwS5V8huME8MKPt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Securing Agentic AI Connectivity]]></title><description><![CDATA[Securing Agentic AI Connectivity AI agents are no longer theoretical, they are here, powerful, and being connected to business systems in ways that introduce cybersecurity risks! They’re calling APIs,]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/securing-agentic-ai-connectivity</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/securing-agentic-ai-connectivity</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 12 Feb 2026 22:50:36 GMT</pubDate><enclosure url="https://i.ecency.com/p/EfcLDDAkyqgqyc52TdHnx88BjGJXpnzxmEnB8yNLCo37xWGfMtGtRsLqSfPmZL68pmh3erjMreXwNT4YENdo6xK4e8mTC?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>