<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sun, 12 Apr 2026 23:51:22 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/cyberattacks/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[They create blockchain technology that is proof of quantum cyberattacks]]></title><description><![CDATA[They create blockchain technology that is proof of quantum cyberattacks In a future where the world's digital security foundation, from your bitcoins to the most sensitive contracts, can simply collapse]]></description><link>http://direct.ecency.com/hive-196387/@jorgebgt/they-create-blockchain-technology-that</link><guid isPermaLink="true">http://direct.ecency.com/hive-196387/@jorgebgt/they-create-blockchain-technology-that</guid><category><![CDATA[hive-196387]]></category><dc:creator><![CDATA[jorgebgt]]></dc:creator><pubDate>Fri, 11 Jul 2025 04:07:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pEPvDbJDzhdNXM7mjt1tbr2kM3X28F6SraZdJ33ZaQa4xDrHRG2nxREcrF3Tr4ba8pr4FxebA91yimSuVG9YMkkfGUHFDuMFawuMf2GyvbTUNA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[THE NUMBER ONE THREAT THAT WE ALL FACE! WITH LTC STEVE MURRAY]]></title><description><![CDATA[⇨ SUBSCRIBE HERE: bit.ly/cryptorichodysee THE NUMBER ONE THREAT THAT WE ALL FACE! WITH LTC STEVE MURRAY One Team One Fight. After May 9, 2025: - 1T1F shirts - @Ltc_steven_mur on Twitter @LTC Steven Murray]]></description><link>http://direct.ecency.com/hive-120417/@cryptorichbtc/popciain</link><guid isPermaLink="true">http://direct.ecency.com/hive-120417/@cryptorichbtc/popciain</guid><category><![CDATA[hive-120417]]></category><dc:creator><![CDATA[cryptorichbtc]]></dc:creator><pubDate>Tue, 03 Jun 2025 23:34:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/99pyU5Ga1kwr5bsMXthzYLbcngN4W2P8NtU9TWTdHC3HaQbjuuRfKKVdjVifGj8AKdHuDGpctPtMWMnQiuwSqNhcsPWk5pHu1Lzr1dBgpyCk9QWzYySNQCvDmzEJKkKiz2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[_Half of North Korea's foreign currency income comes from]]></title><description><![CDATA[March 21, 2024 About half of North Korea's foreign currency income comes from cyberattacks, including on cryptocurrency companies. Yonhap writes about this with reference to a report by the UN Security]]></description><link>http://direct.ecency.com/cyberattacks/@infernum1488/half-of-north-korea-s</link><guid isPermaLink="true">http://direct.ecency.com/cyberattacks/@infernum1488/half-of-north-korea-s</guid><category><![CDATA[cyberattacks]]></category><dc:creator><![CDATA[infernum1488]]></dc:creator><pubDate>Thu, 21 Mar 2024 23:20:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvGBHDnRaj2z6FsL6XEQR3pnqa26GnVgrsntoSb8eCQTFaiH8cTkHs1KSyL6MZTb48AWHcNXVMASvKqev2TMNxz6gNDqXgspeG6CLQAS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[AI vs. AI: The Cyber Arms Race for Tomorrow's Defense]]></title><description><![CDATA[Introduction As technology is redefining our world, it's clear that advanced cyberattacks pose a growing threat to everyone, from individuals, organizations to entire countries. These attacks, which are]]></description><link>http://direct.ecency.com/hive-167922/@rabihfarhat/ai-vs-ai-the-cyber-arms-race-for-tomorrows-defense</link><guid isPermaLink="true">http://direct.ecency.com/hive-167922/@rabihfarhat/ai-vs-ai-the-cyber-arms-race-for-tomorrows-defense</guid><category><![CDATA[hive-167922]]></category><dc:creator><![CDATA[rabihfarhat]]></dc:creator><pubDate>Tue, 20 Feb 2024 12:12:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/82kPqomaPXmNsjpEo1MWkrS8vWaabu6o1NGx6yPqJHKk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Starwars are coming]]></title><description><![CDATA[China is building sophisticated cyber weapons to “seize control” of enemy satellites, rendering them useless for data signals or surveillance during wartime, according to a leaked US intelligence report.]]></description><link>http://direct.ecency.com/waivio/@notable/starwars-are-coming</link><guid isPermaLink="true">http://direct.ecency.com/waivio/@notable/starwars-are-coming</guid><category><![CDATA[waivio]]></category><dc:creator><![CDATA[notable]]></dc:creator><pubDate>Sat, 22 Apr 2023 14:59:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/HNWT6DgoBc196q36ADoGty1WEUBMYTezBR2yx2cmqPwhtM3UzUiz5qh45JxQmtnkmG8mHuUQsiaQcdLGRbf67c46YMy78BwoZDd8Tuy7n4rHxjACnPAi93PzDMb?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Part 2: Years and Years S1 E5 Predictive Programming]]></title><description><![CDATA[A collection of clips from the bbc drama series “years and years” episode 5 of series 1. Part 2: Years and Years S1 E5 Predictive Programming AB9590B9e-2840-497C-B1BF-87D386EC63D1.gif As always a special]]></description><link>http://direct.ecency.com/hive-122315/@venomnymous/part-2-years-and-years-s1-e5-predictive-programming</link><guid isPermaLink="true">http://direct.ecency.com/hive-122315/@venomnymous/part-2-years-and-years-s1-e5-predictive-programming</guid><category><![CDATA[hive-122315]]></category><dc:creator><![CDATA[venomnymous]]></dc:creator><pubDate>Sun, 15 May 2022 14:02:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP35bVGjGoE93K3E4U5KX8KtMBJ2rh4XbpvmfwRrUEiuwMwFwhnASA7trRi66AhSufrDuRpNfZJboJQayFTot8ybzsSCxuBHknVvNoY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cyber-attacks, the other battle front]]></title><description><![CDATA[Hello dear friends. As we have noticed, the bombings and attacks that cause physical damage to people and buildings in Ukraine occupy the main headlines, it is understandable that the confrontation between]]></description><link>http://direct.ecency.com/hive-163521/@emiliomoron/cyber-attacks-the-other-battle-front</link><guid isPermaLink="true">http://direct.ecency.com/hive-163521/@emiliomoron/cyber-attacks-the-other-battle-front</guid><category><![CDATA[hive-163521]]></category><dc:creator><![CDATA[emiliomoron]]></dc:creator><pubDate>Thu, 17 Mar 2022 10:44:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeLuau3m8MumiUXfA7eZTW31v33oUtB9pXeiNoYMjbLsJH1GMLEA9bfTG3ezrVJQSxaM6jPttQzFJp8jBgtt2L5Mg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Friday Vlog | High-Profile Cyberattacks | Conservatives Sue MLB]]></title><description><![CDATA[Brazen Hackers continuing to attack US high-profile corporations, government agencies, and civil society groups. GA Conservatives accuse MLB of violating the Klu Klux Klan Act of 1871. Click to Subscribe:]]></description><link>http://direct.ecency.com/cyberattacks/@buzweaveryoutube/the-friday-vlog-or-high-profile-cyberattacks-or-conservatives-sue-mlb</link><guid isPermaLink="true">http://direct.ecency.com/cyberattacks/@buzweaveryoutube/the-friday-vlog-or-high-profile-cyberattacks-or-conservatives-sue-mlb</guid><category><![CDATA[cyberattacks]]></category><dc:creator><![CDATA[buzweaveryoutube]]></dc:creator><pubDate>Fri, 04 Jun 2021 17:02:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e4E5YjTApCDYDfE4J8rxfaC67sCU51UXCqU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A COMMON TRAP THAT HAUNTS SMALL BUSINESS OWNERS]]></title><description><![CDATA[A long time ago I heard a saying that “the only thing a race car driver should worry about is winning the race”. This means the race car driver isn't doing other stuff throughout the day... He’s not hauling]]></description><link>http://direct.ecency.com/hive-163521/@joebrochin/a-common-trap-that-haunts-small-business-owners-qtcbxn</link><guid isPermaLink="true">http://direct.ecency.com/hive-163521/@joebrochin/a-common-trap-that-haunts-small-business-owners-qtcbxn</guid><category><![CDATA[hive-163521]]></category><dc:creator><![CDATA[joebrochin]]></dc:creator><pubDate>Wed, 19 May 2021 06:13:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/2dk2RRM2dZ8gKjXsrozapsD83FxL3Xbyyi5LFttAhrXxr16mCe4arfLHj5EWpEXfXR8kNQmQrYR8xyLc6wvdZSedquFXwAf29u8yxr1gxBgxkbg9TrJdhfoFN26U1yXmV6cVgU5FRsCs3goCKkYr7QRAzsWF9HGf1optQJRiUN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[WHAT SMALL BUSINESSES NEED TO KNOW ABOUT CYBERATTACKS IN 2021]]></title><description><![CDATA[I saw an article this week about a gang of hackers trying to extort Apple for $50 million after stealing some files. Turns out these files were valuable blueprints that Apple desperately does not want]]></description><link>http://direct.ecency.com/hive-163521/@joebrochin/what-small-businesses-need-to-know-about-cyberattacks-in-2021</link><guid isPermaLink="true">http://direct.ecency.com/hive-163521/@joebrochin/what-small-businesses-need-to-know-about-cyberattacks-in-2021</guid><category><![CDATA[hive-163521]]></category><dc:creator><![CDATA[joebrochin]]></dc:creator><pubDate>Mon, 17 May 2021 00:30:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/2dk2RRM2dZ8gKjXsrozapsD83FxL3Xbyyi5LFttAhrXxr16mCe4arfLHj5EWpEXfXR8kNQmQrYb7P6oASWV711pA165nS5H1ge5VWKwYCYNqk8YCPuBmdUkLifNCrHShThvm7ZSodLxQWsKZxysCFi9nkaJC8aDpSXKnChTWWJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Why WAF is a Must Have Before RASP For Your Websites]]></title><description><![CDATA[Protecting web applications has always been a focus of cybersecurity professionals. That’s why they work tirelessly toward developing new tools to protect web apps. To understand this better, let’s take]]></description><link>http://direct.ecency.com/businesscyberthreat/@twr/whywafisamusthavebeforeraspforyourwebsites-kw5twwmpgi</link><guid isPermaLink="true">http://direct.ecency.com/businesscyberthreat/@twr/whywafisamusthavebeforeraspforyourwebsites-kw5twwmpgi</guid><category><![CDATA[businesscyberthreat]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 08 Jun 2020 16:00:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNbgWqLjvdaPqD9RmZVAY3F45qZteHQajVXsWerTgBJWnAJZPGbVp4PwXAJWoi2pcjBoW2XorG9EK2enEdiqrCCQN2LZuwXpVnUcxR7zMCjREN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Most Effective Ways to Protect Your Small Business from Cyber Attacks]]></title><description><![CDATA[If you want to protect your business from cyberattacks consider following this guide on istarthub.net -]]></description><link>http://direct.ecency.com/cyberattacks/@istarthub/the-most-effective-ways-to-protect-your-small-business-from-cyber-attacks</link><guid isPermaLink="true">http://direct.ecency.com/cyberattacks/@istarthub/the-most-effective-ways-to-protect-your-small-business-from-cyber-attacks</guid><category><![CDATA[cyberattacks]]></category><dc:creator><![CDATA[istarthub]]></dc:creator><pubDate>Tue, 17 Dec 2019 11:44:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/7NqGr5y7HSV19FVTGeUZefh4vVjAuEPNwiaZXzDN5HbBKrEVYYENHn5MFYjmsNusRA9SkwJytbnZjWCTqe9CEXjwez3x4xFdhTAGV3sows51FzwEDuTbCcHRpELDuFWSFWSNatL3YcWmDnBdH7aHFfEgquonfkw3VghmutTpdpR2AAqj4BcCB3MSk3XocioEVswpHfRs3hiAvW24bsLr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[‘Treason!’ Trump slams NYT claim of US cyberattacks on Russia’s power grid as harmful fake news]]></title><description><![CDATA[Following a bombastic report that US government hackers are targeting Russia’s power grid, President Donald Trump took to Twitter to accuse the NY Times of spreading fake news detrimental to US credibility]]></description><link>http://direct.ecency.com/news/@deeprabbithole/treason-trump-slams-nyt-claim-of-us-cyberattacks-on-russias-power-grid-as-harmful-fake-news-1560692276</link><guid isPermaLink="true">http://direct.ecency.com/news/@deeprabbithole/treason-trump-slams-nyt-claim-of-us-cyberattacks-on-russias-power-grid-as-harmful-fake-news-1560692276</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[deeprabbithole]]></dc:creator><pubDate>Mon, 17 Jun 2019 15:38:12 GMT</pubDate></item><item><title><![CDATA[US Russian Cyber Attacks, Trump can't be trusted, TREASON?]]></title><description><![CDATA[The Morning Call: 2019-06-17 Interested in proprietary trading? Learn more here: Reference links: #russia #cyberattacks #treason]]></description><link>http://direct.ecency.com/russia/@traderpropshop/us-russian-cyber-attacks-trump-can-t-be-trusted-treason</link><guid isPermaLink="true">http://direct.ecency.com/russia/@traderpropshop/us-russian-cyber-attacks-trump-can-t-be-trusted-treason</guid><category><![CDATA[russia]]></category><dc:creator><![CDATA[traderpropshop]]></dc:creator><pubDate>Mon, 17 Jun 2019 06:33:48 GMT</pubDate></item><item><title><![CDATA[Docker Container Escape Vulnerability With PoC (CVE-2019-5736)]]></title><description><![CDATA[A runtime used to support Docker and Linux container engines suffered a vulnerability the past few days. An attack could consequently compromise the entire infrastructure Polish researchers Adam Iwaniuk]]></description><link>http://direct.ecency.com/attack/@twr/dockercontainerescapevulnerabilitywithpoccve-2019-5736-vg9q1ciadh</link><guid isPermaLink="true">http://direct.ecency.com/attack/@twr/dockercontainerescapevulnerabilitywithpoccve-2019-5736-vg9q1ciadh</guid><category><![CDATA[attack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 18 Feb 2019 12:36:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBr4rFUo5GyYyWxdnuHExLUZnEzuw3AFi4sN7w4sjNh22FwQmu65pgo7xFYDAPNaQpDLx6mrE4gzqV5Ef8r?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Research Suggests Human Error Responsible for Cyber Security Breaches]]></title><description><![CDATA[Cybersecurity incidents can be a huge problem for businesses and individuals. Hackers using malware to steal data is often the scenario that people think about. However, research suggests that human error]]></description><link>http://direct.ecency.com/bettertraining/@twr/researchsuggestshumanerrorresponsibleforcybersecuritybreaches-uf881k2qzo</link><guid isPermaLink="true">http://direct.ecency.com/bettertraining/@twr/researchsuggestshumanerrorresponsibleforcybersecuritybreaches-uf881k2qzo</guid><category><![CDATA[bettertraining]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 24 Jan 2019 20:25:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/2r8F9rTBenJQstst1uynghrX8KfVsMRABQCve2x2UaAUpxsPn7jyc4XP8J9QBASmBnx1T7skRfJUogc3u2DDw6od1wDSzqfNYxjriiUpPaZznTa9NGBvZYYD313kWmv9L?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hackers Attack IPMI Default Passwords to Deploy Ransomware On Linux Servers]]></title><description><![CDATA[BleepingComputer recently exposed a Ransomware variant called JungleSec which affects Linux servers through the IPMI (Intelligent Platform Management Interface). The threat actors targeted unsecured IPMIs]]></description><link>http://direct.ecency.com/bleepingcomputeripmiransomware/@twr/hackersattackipmidefaultpasswordstodeployransomwareonlinuxservers-9h7leld5s7</link><guid isPermaLink="true">http://direct.ecency.com/bleepingcomputeripmiransomware/@twr/hackersattackipmidefaultpasswordstodeployransomwareonlinuxservers-9h7leld5s7</guid><category><![CDATA[bleepingcomputeripmiransomware]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 29 Dec 2018 17:39:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvKvh668FyFDthV4M117w2aub16wmxRSCfcc9yeY4MF4gwzJzjVahL4L6oXD1phiM869rkYfqM3923GdrLi8oFub6gfokrsDbBk8HXXL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Turkey, the Middle East, the focus of cyber attacks]]></title><description><![CDATA[Turkey, the Middle East, the focus of #cyber #attacks According to Trend Micro's latest report, the number of cyber #threats in the world, which is declining, increased in July to close to 4 billion. #Turkey]]></description><link>http://direct.ecency.com/cyberattacks/@afl.cloud/turkey-the-middle-east-the-focus-of-cyber-attacks</link><guid isPermaLink="true">http://direct.ecency.com/cyberattacks/@afl.cloud/turkey-the-middle-east-the-focus-of-cyber-attacks</guid><category><![CDATA[cyberattacks]]></category><dc:creator><![CDATA[afl.cloud]]></dc:creator><pubDate>Sat, 15 Sep 2018 07:30:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/gPCasciUWmEwHnsXKML7xF4NE4zxEVyvENsPKp9LmDaFuyvKVM4JTcTpkSaTQTo61Xj7hFDYEghp9k7QcPR9jArzqr98uE28fFBUcBgoRPocvphhWaWfBwXNzCC7FefFHiiyaaRozncfJWY2Xp?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[People are vulnerable targets for hackers]]></title><description><![CDATA[By Emmanuel Marshall If your mental image of hacking is a bunch of scruffy teenagers in a basement furiously punching code into a screen as they try and beat a supercomputer in a virtual espionage contest,]]></description><link>http://direct.ecency.com/hackers/@uncloak/people-are-vulnerable-targets-for-hackers</link><guid isPermaLink="true">http://direct.ecency.com/hackers/@uncloak/people-are-vulnerable-targets-for-hackers</guid><category><![CDATA[hackers]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Mon, 10 Sep 2018 17:33:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/3jpR3paJ37V8JxyWvtbhvcm5k3roJwHBR4WTALx7XaoRovVzPuycQgGqmyjf6NCQToHixBdrnrTM154Q2WUkRH4zXFgs8VrDjAsXGb4cTN2U9SPuffxva9TExDLzDdoUgP5tA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[GDPR will cost unprepared companies big money]]></title><description><![CDATA[The EU GDPR guidelines stipulate that companies must “install appropriate technical and organisational safeguards that ensure the security of the personal data, including protection against unauthorised]]></description><link>http://direct.ecency.com/cyberattacks/@uncloak/gdpr-will-cost-unprepared-companies-big-money</link><guid isPermaLink="true">http://direct.ecency.com/cyberattacks/@uncloak/gdpr-will-cost-unprepared-companies-big-money</guid><category><![CDATA[cyberattacks]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Tue, 04 Sep 2018 12:39:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjVs3Hye1oHX44R9EcpQD5C9xXzj68nJaq3CeBxEXr7wa8zjaHW97e2hxGgicRBhh5bErHxVP5L8eGAPTQwF294iCpAM7fwHmt3xvd38WvRYA?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>