<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 15 Apr 2026 19:36:57 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/cyber-attack/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Go out and fill all your gas tanks today, there will be a gas shortage in the next few days.]]></title><description><![CDATA[The largest pipeline company in the US, has been cyber attacked, and has been forced to shut down to contain the damage. So we loose the two point five million barrels a day transport ability, they have]]></description><link>http://direct.ecency.com/hive-110490/@smithlabs/68tahp-go-out-and-fill-all-your-gas-tanks-today-there-will-be-a-gas-shortage-in-the-next-few-days</link><guid isPermaLink="true">http://direct.ecency.com/hive-110490/@smithlabs/68tahp-go-out-and-fill-all-your-gas-tanks-today-there-will-be-a-gas-shortage-in-the-next-few-days</guid><category><![CDATA[hive-110490]]></category><dc:creator><![CDATA[smithlabs]]></dc:creator><pubDate>Mon, 10 May 2021 19:12:30 GMT</pubDate></item><item><title><![CDATA["WE HAVE OVER 100 GIGABYTES OF YOUR DATA"]]></title><description><![CDATA[On February 16th, The Wall Street Journal reported the recent cyber-attack on Jones Day, one of the largest law firms in the world. It seems the firm’s data was stolen via their major third-party file]]></description><link>http://direct.ecency.com/technology/@joebrochin/we-have-over-100-gigabytes-of-your-data</link><guid isPermaLink="true">http://direct.ecency.com/technology/@joebrochin/we-have-over-100-gigabytes-of-your-data</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[joebrochin]]></dc:creator><pubDate>Mon, 29 Mar 2021 09:19:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/2dk2RRM2dZ8gKjXsrozapsD83FxL3Xbyyi5LFttAhrXxr16mCe4arfLHj5EWpEXfXR8kNQmQrY3uknHSgVJU9GQ9sxLx12eqwoGwfEhAk89ntCmwKUy2vV2udj7KvxioYUN3xkzY6AjHZkp2QNAYTU1tUgpkswyC1MJcKzCXiW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The DDoS That Wasn’t]]></title><description><![CDATA[On June 16th Forbes published an article by Davey Winder, reporting that the day before the US suffered a major outage in some cellular communications services across the country. That Anonymous originally]]></description><link>http://direct.ecency.com/ddos/@austin.foss/the-ddos-that-wasn-t</link><guid isPermaLink="true">http://direct.ecency.com/ddos/@austin.foss/the-ddos-that-wasn-t</guid><category><![CDATA[ddos]]></category><dc:creator><![CDATA[austin.foss]]></dc:creator><pubDate>Thu, 18 Jun 2020 12:00:00 GMT</pubDate></item><item><title><![CDATA[Roger Ver's bitcoin.com under government sponsored cyber attack.]]></title><description><![CDATA[Donate Litecoin Lec6pSHx6vhyQigpVJMgSpr9LRCDY3B3ob]]></description><link>http://direct.ecency.com/bitcoin/@cloudspyder/roger-ver-s-bitcoin-com-under-government-sponsored-cyber-attack</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@cloudspyder/roger-ver-s-bitcoin-com-under-government-sponsored-cyber-attack</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[cloudspyder]]></dc:creator><pubDate>Wed, 22 Apr 2020 15:24:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy5czPNg6acYev351Du9gQgrBvuGcnDabiEwoAMtrC2NjQxUiQDncSk8mBBaVgGi8EsL4JRkFqhrQcaF8DVfqEUkMCGBmucFZc7uc5t45FaSLb2Vp1k18BUKUA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[DumpsterFire - A Tool That Generates Network Shenanigans to Facilitate Blue Team Training]]></title><description><![CDATA[DumpsterFire is an open-source tool made by blue team member to edit create and control dumpster payloads in order to create surface attacks and also facilitate the blue team process, its main purpose]]></description><link>http://direct.ecency.com/automation/@twr/dumpsterfire-atoolthatgeneratesnetworkshenaniganstofacilitateblueteamtraining-pyvbd0h0mk</link><guid isPermaLink="true">http://direct.ecency.com/automation/@twr/dumpsterfire-atoolthatgeneratesnetworkshenaniganstofacilitateblueteamtraining-pyvbd0h0mk</guid><category><![CDATA[automation]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 20 Aug 2019 15:05:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy6zvChRH7j9QCxXa7kn1JGAzPjCpQux5DQVYAwJRDprBEfycXTwQJG6DTXyq9FsKH7UXaTQV2fB4TYuJoAPJ9KwAqEyGAfWs2FYRiCJ1U6SKSvDqnX1GUk7SW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[cyber_crime]]></title><description><![CDATA[Introduction:- cyber-crime is the use of electronic medium like computer for criminals activities . in this technological world the criminals have also found a way to disturb the world through cyber-crime.]]></description><link>http://direct.ecency.com/cyber-crime/@always-onn/cybercrime</link><guid isPermaLink="true">http://direct.ecency.com/cyber-crime/@always-onn/cybercrime</guid><category><![CDATA[cyber-crime]]></category><dc:creator><![CDATA[always-onn]]></dc:creator><pubDate>Sun, 23 Jun 2019 14:37:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/2VZXybTSZJq1AreaDn1D7Jp7ZEvgLC9TvJctofX1ChMgSZscrRnMqRUMqJXXNQKWEK1PTNrHzYJeqR8oQ8rncBcXPG8yFSkqUDDedpN68TdyQepvB4TjsxnYanYvLFr9ZSPv1eqD7jEp8qJAsMHrCzJ2ouG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[FBI: US sanctions incite North Korea to perpetrate cyberattacks]]></title><description><![CDATA[In recent years, North Korea is considered the number one suspect in several cryptocurrency-related cyber attacks worldwide , ranging from targeted actions against crypto-purses in neighboring countries]]></description><link>http://direct.ecency.com/crypto/@infoslink/fbiussanctionsincitenorthkoreatoperpetratecyberattacks-svbfd95kf8</link><guid isPermaLink="true">http://direct.ecency.com/crypto/@infoslink/fbiussanctionsincitenorthkoreatoperpetratecyberattacks-svbfd95kf8</guid><category><![CDATA[crypto]]></category><dc:creator><![CDATA[infoslink]]></dc:creator><pubDate>Wed, 05 Jun 2019 22:16:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/aiVb1SUiufHLPpvgLtiPZBrz5t5KmLLpEFf1ZraMzYVvrf6m1ppoHRxfSVSLXEGjT3Mr6oGNfpTPQbcSnR8daXHfnB79axbYCxTgGQFvX8XosL3uC8KN2V5zgLZty5gNe6YcZvZW2Tt8wSFPrPRUQH6r8PLELUKrECb3Nomrs1VXFDC53G2w3dyYjD4MHCNHdt2oni7YTKepkdQ7frFiihHL69TU7k4Pa1WEPFM8EQCSWxfcFVY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Huge aluminium plants hit by cyber-attack - BBC News]]></title><description><![CDATA[Norwegian company Hydro went back to manual operation due to cyber-attack which started on Monday. What happened to Hydro should act as a warning to other companies as well to build a stronger security]]></description><link>http://direct.ecency.com/dlike/@atongis/huge-aluminium-plants-hit-by-cyber-attack--bbc-news</link><guid isPermaLink="true">http://direct.ecency.com/dlike/@atongis/huge-aluminium-plants-hit-by-cyber-attack--bbc-news</guid><category><![CDATA[dlike]]></category><dc:creator><![CDATA[atongis]]></dc:creator><pubDate>Tue, 19 Mar 2019 14:00:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/2N61tyyncFaFc3UVeBFff3UPxw99FAwKnhs6CcNe3NvEZSyeCvqSGqrKed3xd4nZYo9oCo62MgmjakSkzgcoYYLgh1Fi28QwoVRsKMBu1fEkGrnPTG5UE3w6fqeyrEAfP2oZ7ETpeRNE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hakfrenics - Simulated cyber attacks for testing applications]]></title><description><![CDATA[Hakfrenics Simulated cyber attacks for testing applications Screenshots View Image Hunter's comment Hakfrenics offers simulated cyber attacks for testing of web applications and mobile apps. Developers]]></description><link>http://direct.ecency.com/steemhunt/@pretty-hunter/hakfrenics-simulated-cyber-attacks-for-testing-applications</link><guid isPermaLink="true">http://direct.ecency.com/steemhunt/@pretty-hunter/hakfrenics-simulated-cyber-attacks-for-testing-applications</guid><category><![CDATA[steemhunt]]></category><dc:creator><![CDATA[pretty-hunter]]></dc:creator><pubDate>Wed, 20 Feb 2019 18:12:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/2N61tyyncFaFn76Q5qUCSNabNpGdxHFSaCxb3LZQkVsV3A3ThoktCz8fivmYTokrk4SXnTHqWkhKYjkGDuGPzZ927QK8K26S8AbP3aZAoWPKeGB8EvstYYrYeQyWvCrtwTvaRGZTU7cA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[massExploitConsole - An Open Source Tool For Exploiting Known Vulnerabilities]]></title><description><![CDATA[MassExploitConsole is a python based easy-to-use cli tool for executing exploits. It has a collection of exploits to execute, built-in scanner for enumeration, built-in crawler and proxychains to hide]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/massexploitconsole-anopensourcetoolforexploitingknownvulnerabilities-c9arfax8s6</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/massexploitconsole-anopensourcetoolforexploitingknownvulnerabilities-c9arfax8s6</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 09 Dec 2018 11:21:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig8o3UqtPumh9wgxQzoDZVptMXGp8AwBqpa4GyjBbKFeb6hkhNHHknA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Xerosploit - Open Source Toolkit For Man In The Middle Attacks]]></title><description><![CDATA[Xerosploit is a python-based toolkit for creating efficient Man In The Middle attacks which combines the power of bettercap and nmap. The interface is pretty easy to use. It allows you to scan your network]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/xerosploit-opensourcetoolkitformaninthemiddleattacks-xi7g7j4lmi</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/xerosploit-opensourcetoolkitformaninthemiddleattacks-xi7g7j4lmi</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 23 Nov 2018 20:48:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUcsNv7tRtPzCvhDgVX1MFsfrds3HPqqSviGAFfDEyJcXaEEA3yuJA6Bx4cS3wnCv7qeV5hPTZQ3xJoWcRHBWsqrKp?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Central Bankers Are Up To Something - Episode 1639a]]></title><description><![CDATA[IMF says Spain needs 5 million migrants to pay pensions, what about all the youths that are not working. US household debt hit 13.3 trillion dollars, nothing to worry about. Retail sector rebound with]]></description><link>http://direct.ecency.com/migrants/@x22report/the-central-bankers-are-up-to-something-episode-1639a</link><guid isPermaLink="true">http://direct.ecency.com/migrants/@x22report/the-central-bankers-are-up-to-something-episode-1639a</guid><category><![CDATA[migrants]]></category><dc:creator><![CDATA[x22report]]></dc:creator><pubDate>Wed, 15 Aug 2018 23:45:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e4dKF81SBPpq9PpZKaJAsFJsGLrHAkgs2yt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Framework Created To Stop Cyber-Attacks On Internet-Connected Cars]]></title><description><![CDATA[A new study carried out by doctoral candidate, Maanak Gupta at the University of Texas in San Antonio and Ravi Sadhu the founding executive director of the UTSA Institute for Cyber Security examined the]]></description><link>http://direct.ecency.com/cyber-attack/@twr/frameworkcreatedtostopcyber-attacksoninternet-connectedcars-tbg8rnstqo</link><guid isPermaLink="true">http://direct.ecency.com/cyber-attack/@twr/frameworkcreatedtostopcyber-attacksoninternet-connectedcars-tbg8rnstqo</guid><category><![CDATA[cyber-attack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 30 May 2018 09:00:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/Zskj9C56UonaJ3kKNW49nDBLArERfL389VBpeom5fEJYW3TU2PW79bu3ZmeYtuWPWYtixJzCJujK2dLm7rQwBP6drkbSLQhSDSiQNJPaMhjntEPydRVG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[One In Three Health Care Services Hit By Cyber-Attack]]></title><description><![CDATA[More than one in three health care providers have been hit with a cyber-attack over the past year, according to Imperva. This has caused 10% of them to pay a ransom or other extortion-related fee. The]]></description><link>http://direct.ecency.com/breaches/@twr/oneinthreehealthcareserviceshitbycyber-attack-3wls6obqgm</link><guid isPermaLink="true">http://direct.ecency.com/breaches/@twr/oneinthreehealthcareserviceshitbycyber-attack-3wls6obqgm</guid><category><![CDATA[breaches]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 27 May 2018 04:00:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/62PdCouTvNPDSo5wavrnZYWhf6NUVUiYs2vVj2RvPXYxqQKVUffSViUCMUAFwxYTZbBpnSZQs9VoJt8V1jhddQMPVRheYNDU7Yu4a8De9EVyhH8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Tasmania’s Hospital Computer System Still At Risk Of Cyber-Attack]]></title><description><![CDATA[According to a report by the Auditor-General, Tasmania’s Health and Human Services department is at an “excessive risk of cyber attack”. The Auditor-General office released an evaluation of four 2015 reviews]]></description><link>http://direct.ecency.com/cybersecurity/@twr/tasmaniashospitalcomputersystemstillatriskofcyber-attack-mfcukrm0kb</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@twr/tasmaniashospitalcomputersystemstillatriskofcyber-attack-mfcukrm0kb</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 25 May 2018 09:30:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/RGgukq5E6HBPrpKosyNE5GkXfDM8nQbhsa4YVzKuvHCHkvZMC3VEP6XPVomDj1rS6syk5H2ga9VVrpBrt8TZ6ph6kwBtxxDstaCQTUocFi6xAxTCSGC5uEgRssmMFbU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[British Attorney General States Cyber Attack On Nation Will Be An Act Of War]]></title><description><![CDATA[The UK Attorney General said today that, hostile states that have been targeting essential infrastructures as well as key services in Britain should be dealt in the same way as any other attack on the]]></description><link>http://direct.ecency.com/article51oftheuncharter/@twr/britishattorneygeneralstatescyberattackonnationwillbeanactofwar-2cqvqdjcz5</link><guid isPermaLink="true">http://direct.ecency.com/article51oftheuncharter/@twr/britishattorneygeneralstatescyberattackonnationwillbeanactofwar-2cqvqdjcz5</guid><category><![CDATA[article51oftheuncharter]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 24 May 2018 07:30:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/X37EMQ9WSwsNuKMjTPzqrTVdzWyJsSYQeeW5hs5MpYqS57uqhf2fWjowfP4xA9pj7uL2wPZznXaf3wxTxUd7mjViej7iMVfPqubhp?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cisco Issues A Warning; Half A Million Routers Have Been Hacked]]></title><description><![CDATA[Cybercriminals have hacked and infected at least 500,000 routers as well as storage devices in what is believed to be part of a planned attack on the Ukraine by Russia. The U.S Department of Homeland security]]></description><link>http://direct.ecency.com/championsleaguefinalcyberattack/@twr/ciscoissuesawarninghalfamillionroutershavebeenhacked-nppf6f6rbx</link><guid isPermaLink="true">http://direct.ecency.com/championsleaguefinalcyberattack/@twr/ciscoissuesawarninghalfamillionroutershavebeenhacked-nppf6f6rbx</guid><category><![CDATA[championsleaguefinalcyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 24 May 2018 05:19:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/2923mN3pnd7PkuakBQXmJo7H1UVt66NeaYFPNJYUW7vThRKEhhw2FD7ceiVqFGJYr57z3bLaUqj8D8tYrP6QhTzPrfdZt3rb1ZYxKWFHnLpYnr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Lawyers Exposing Client Data To Risk Of Cyber-Attack]]></title><description><![CDATA[Current cyber security processes that lawyers use can put their client data at risk, according to a new research done in Australia. Researchers from Edith Cowan University’s Security Research Institute]]></description><link>http://direct.ecency.com/australiansurveycybersecurityoflawyers/@twr/lawyersexposingclientdatatoriskofcyber-attack-woq17e0v35</link><guid isPermaLink="true">http://direct.ecency.com/australiansurveycybersecurityoflawyers/@twr/lawyersexposingclientdatatoriskofcyber-attack-woq17e0v35</guid><category><![CDATA[australiansurveycybersecurityoflawyers]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 23 May 2018 05:22:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP3vrQovkik6e66T8hnLhLPdqV7nVJzeRr5Sdvch7efXk337Lsrya9rEqtmuZp4LLW7PvMwLmwpxq5dLi8Port5fkWCuYKZ1Lo8mfhp?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Doctor Turned Cyber-Criminal Claims Hacking Into Nigerian Banks Is Easy]]></title><description><![CDATA[Michael Thompson Williams is a medical doctor turned international hacker who was on the police wanted list for a very long time, has recently been arrested by the Lagos State Police in Nigeria. Michael]]></description><link>http://direct.ecency.com/bank/@twr/doctorturnedcyber-criminalclaimshackingintonigerianbanksiseasy-3covuz1cr8</link><guid isPermaLink="true">http://direct.ecency.com/bank/@twr/doctorturnedcyber-criminalclaimshackingintonigerianbanksiseasy-3covuz1cr8</guid><category><![CDATA[bank]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 22 May 2018 07:30:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/X37EMQ9WSwsNuKMjTPzqrTVdzWyJsSYQeeW5hs5MpYqS57uqhf2fWjowfP4xA9pj7uL2wPZznXaf3xBY9ago8paZ9dYp3EpLVbkYe?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Britain Reveals Its First-Ever Cyber-Attack Against ISIS, Will Canada Follow By Example?]]></title><description><![CDATA[The event that passed unnoticed amidst the royal wedding is a piece of history that unfolded this spring. This disclosure was made by the head of the Government Communications Headquarters claiming that]]></description><link>http://direct.ecency.com/britain/@twr/britainrevealsitsfirst-evercyber-attackagainstisiswillcanadafollowbyexample-bt26tu4gcv</link><guid isPermaLink="true">http://direct.ecency.com/britain/@twr/britainrevealsitsfirst-evercyber-attackagainstisiswillcanadafollowbyexample-bt26tu4gcv</guid><category><![CDATA[britain]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 20 May 2018 12:00:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/MG5aEqKFcQi8KqD2wHMZMi2fpbjkaL86Q4MBEhpiajpZfymNq2i5rAYcVK7tbzsmV8SfsBhRS2aHZieG4FyXQu1fvybzCQpsG?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>