<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 16 Apr 2026 02:02:14 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/cybersecurity/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[AI News Daily — April 15, 2026]]></title><description><![CDATA[AI News Daily — April 15, 2026 Today’s throughline is security-focused acceleration. The most consequential updates are not generic AI hype, they are model variants for real defensive work, infrastructure]]></description><link>http://direct.ecency.com/hive-194398/@ai-news-daily/ai-news-daily-2026-04-15</link><guid isPermaLink="true">http://direct.ecency.com/hive-194398/@ai-news-daily/ai-news-daily-2026-04-15</guid><category><![CDATA[hive-194398]]></category><dc:creator><![CDATA[ai-news-daily]]></dc:creator><pubDate>Wed, 15 Apr 2026 09:47:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/4PYjjVwJ1UdtKm1ixfRE6SfgaSiANQC1qU1d2n49fjcHVFmA65VHGNebdreu3hff7He4581tcTpPGamLEfRAztT3KknwXEEK2xCJgFhKu4Q?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[AI News Daily — April 14, 2026]]></title><description><![CDATA[AI News Daily — April 14, 2026 Today’s biggest practical theme is operational maturity. We are seeing fewer “wow benchmark” headlines and more updates that directly affect reliability, governance, deployment,]]></description><link>http://direct.ecency.com/hive-194398/@ai-news-daily/ai-news-daily-2026-04-14</link><guid isPermaLink="true">http://direct.ecency.com/hive-194398/@ai-news-daily/ai-news-daily-2026-04-14</guid><category><![CDATA[hive-194398]]></category><dc:creator><![CDATA[ai-news-daily]]></dc:creator><pubDate>Tue, 14 Apr 2026 09:48:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/JvFFVmatwWHT5Fvr9KYC2gxEN3P7oD11Skv4rcAVTwPve6DsTJgwXQSn6hnU9U6ZWAZtXkboSQ2YUfE8kKz5BQ8vxtedgVywG2NqTLra6Z7ni469mXY2BdkdSkS1DFNymbp2UL1NMU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Mythos AI Engine a Threat to Global Banking]]></title><description><![CDATA[The ramifications of what Anthropic’s Mythos AI engine can do, are becoming more apparent as more organizations gain early access. Downright scary for software developers and global cybersecurity! The]]></description><link>http://direct.ecency.com/crypto/@mrosenquist/mythos-ai-engine-a-threat-to-global-banking</link><guid isPermaLink="true">http://direct.ecency.com/crypto/@mrosenquist/mythos-ai-engine-a-threat-to-global-banking</guid><category><![CDATA[crypto]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 13 Apr 2026 22:27:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeTcwfbUKKAkzgNpEb5wRDG8eYB11eTqMrjDnW7kVJyZfL5wTwEpJ3VVz6mmWyWH1tnzq9nfhBw2JZKEqpNucRJNJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[AI News Daily — April 13, 2026]]></title><description><![CDATA[AI News Daily — April 13, 2026 Today’s strongest signal is that AI is maturing into an execution discipline, not just a launch cycle. The most consequential updates are not flashy benchmark drops, they]]></description><link>http://direct.ecency.com/hive-194398/@ai-news-daily/ai-news-daily-2026-04-13</link><guid isPermaLink="true">http://direct.ecency.com/hive-194398/@ai-news-daily/ai-news-daily-2026-04-13</guid><category><![CDATA[hive-194398]]></category><dc:creator><![CDATA[ai-news-daily]]></dc:creator><pubDate>Mon, 13 Apr 2026 09:47:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/JvFFVmatwWHT5Fvr9KYC2gxEN3P7oD11Skv4rcBztaWsNTHjLKZbCfnmD7n7yZeVStPU1amazqGJ4ntPJ8UHaT7XdkzCmSNupx4D2trPyJbSGNA8riNchTVhLTNufyYkVD3BDk7iTY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[AI News Daily — April 12, 2026]]></title><description><![CDATA[AI News Daily — April 12, 2026 Today’s signal is that we are moving from AI novelty to AI operational consequence. In the last 24 hours, the biggest updates were not just model headlines, they were rollout]]></description><link>http://direct.ecency.com/hive-194398/@ai-news-daily/ai-news-daily-2026-04-12</link><guid isPermaLink="true">http://direct.ecency.com/hive-194398/@ai-news-daily/ai-news-daily-2026-04-12</guid><category><![CDATA[hive-194398]]></category><dc:creator><![CDATA[ai-news-daily]]></dc:creator><pubDate>Sun, 12 Apr 2026 09:49:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/JvFFVmatwWHT5Fvr9KYC2gxEN3P7oD11Skv4rcAgSfdCcw3i6PGD2sCWruUvpDxXc82V3az1MmfpdivhpnRd6n97d6MmpTFfrnAUzmgSY9EywQEG575N4c2L9L7TNewtVib1QNNhSe?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Anthropic Claude Mythos Will Break Vulnerability Management]]></title><description><![CDATA[Anthropic’s latest AI Model, Claude Mythos, will break the cybersecurity vulnerability management operational models. Mythos is so good at discovering and building viable exploits it is currently being]]></description><link>http://direct.ecency.com/ai/@mrosenquist/anthropic-claude-mythos-will-break-vulnerability-management</link><guid isPermaLink="true">http://direct.ecency.com/ai/@mrosenquist/anthropic-claude-mythos-will-break-vulnerability-management</guid><category><![CDATA[ai]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 10 Apr 2026 19:14:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeTcwfbUKKAkzgNpEb5wN4PcNKV5UF5aVMCJ65CVNZLAyGnVbn8ZBeWDnuF68YKzZavFFN8Y5KPapDZ1S1YWnrm4r?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[When Security Becomes a One-Way Street — My Experience with Responsible Disclosure in the Hive Ecosystem]]></title><description><![CDATA[There are moments where you sit in front of your screen and genuinely ask yourself: why am I even doing this? Not because the work isn't enjoyable. Not because I don't know what I'm doing. But because]]></description><link>http://direct.ecency.com/hive/@louis88/when-security-becomes-a-one-way-street-my-experience-with-responsible-disclosure-in-the-hive-ecosystem</link><guid isPermaLink="true">http://direct.ecency.com/hive/@louis88/when-security-becomes-a-one-way-street-my-experience-with-responsible-disclosure-in-the-hive-ecosystem</guid><category><![CDATA[hive]]></category><dc:creator><![CDATA[louis88]]></dc:creator><pubDate>Wed, 08 Apr 2026 23:25:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/26uUsAjKTsXCDw7zixZR182JbFKvgzJ9YwsFpTVcRaGCmsqhA1unTgpqu735dj4JeujH4TEh7ZmpoVGj7rFmvgNk212X72pu5yChgLmygUpR7TaKNgUub9um2yWMUhTkgNSJKawXmgDjgAFxMHrX81bTKSU6SbC1oYnqsU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[I Will Always Admire CyberSecurity Personnels #283]]></title><description><![CDATA[Hobby Crush: Most of us have hobbies we spend little or more time doing, but there are hobbies we admire that others do. What is that one hobby you wish you could do for fun, too, and why can't you adopt]]></description><link>http://direct.ecency.com/hive-124452/@cagolistic/i-will-always-admire-cybersecurity</link><guid isPermaLink="true">http://direct.ecency.com/hive-124452/@cagolistic/i-will-always-admire-cybersecurity</guid><category><![CDATA[hive-124452]]></category><dc:creator><![CDATA[cagolistic]]></dc:creator><pubDate>Mon, 06 Apr 2026 20:41:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvGBHDnRaj2z6FsL6XEQR3pnqa26GnVDCaG5keUwZpAwKXMqTbCdzbbZhYDt34zuUtL9QWuQAHvKnvPHy6Lu2XoWF2vg1s4Z4ZxKsEk6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Attack Against a Major Open-Source Library was Social Engineering]]></title><description><![CDATA[Details emerge on how Axios was infected with a Remote Access Trojan in March, undermining the security in one of the most popular JavaScript libraries that has 100 million downloads weekly. The attack]]></description><link>http://direct.ecency.com/software/@mrosenquist/attack-against-a-major-open-source-library-was-social-engineering</link><guid isPermaLink="true">http://direct.ecency.com/software/@mrosenquist/attack-against-a-major-open-source-library-was-social-engineering</guid><category><![CDATA[software]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 06 Apr 2026 20:14:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvFsBUsT43WEAUu7VN1XAa3TokXcd9rFz99amwpHKzbMoAtdNJtCsUYRr8zSqzxE6TvpYth5NNXRpZU6z3FRPVopLa4xvEML1ocy88VU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Gmail’s New Rename Feature Could Add Spam and Phishing to Your Inbox]]></title><description><![CDATA[As of March 31st, Google is allowing users to change their primary Gmail address username. Although a nice feature for those who created unfortunate names originally, it may also undermine spam and phishing]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/gmail-s-new-rename-feature-could-add-spam-and-phishing-to-your-inbox</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/gmail-s-new-rename-feature-could-add-spam-and-phishing-to-your-inbox</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 02 Apr 2026 16:54:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP1LwhMpNsM9QB2i14js7msiXzEBSZa8hiozwEkczbgFuZiGX22BJvnRGXbojwa8bA5SbPDZXydkgGmkgiZqdtiFgZmsk3EjhDR9eqF?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cybersecurity Can Learn from the Artemis Launch]]></title><description><![CDATA[The Artemis II mission, bringing humans back to the Moon, had a successful launch today! An amazing cumulation of efforts to manage the mindboggling combination of risks to push a massive rocket into space,]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/cybersecurity-can-learn-from-the-artemis-launch</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/cybersecurity-can-learn-from-the-artemis-launch</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 02 Apr 2026 00:09:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/6gUbcKN7Uxen6Lzy8s8AoPEQbXTFReURcZStdJH8xQsDgY4s5bzChkhrbdHRiNC1TxG9k2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Your next user isn't human. Is your app ready?]]></title><description><![CDATA[The rise of agentic AI means that your future users will not be human, but rather their AI-agent proxies. Is your app ready?More insights: Auth0 LinkedIn page:]]></description><link>http://direct.ecency.com/ai/@mrosenquist/your-next-user-isn-t-human-is-your-app-ready</link><guid isPermaLink="true">http://direct.ecency.com/ai/@mrosenquist/your-next-user-isn-t-human-is-your-app-ready</guid><category><![CDATA[ai]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 01 Apr 2026 16:04:06 GMT</pubDate></item><item><title><![CDATA[RSAC Focuses Cybersecurity Insights, Tech, and Community in One Place]]></title><description><![CDATA[The RSAC conference has once again descended upon San Francisco and delivered an event that brings together the largest collection of industry leaders, technologies, and cybersecurity community events!]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/rsac-focuses-cybersecurity-insights-tech-and-community-in-one-place</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/rsac-focuses-cybersecurity-insights-tech-and-community-in-one-place</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 27 Mar 2026 19:11:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/BRWJ2YmdUFozvhzfVpSViWN9rFcoyX8nSmkzHW4GadFddvX8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Tails 7.6]]></title><description><![CDATA[A new version of Tails 7.6 has been released. Tails (The Amnesic Incognito Live System) is a specialized live Linux distribution for secure and anonymous internet use. The system is based on Debian stable.]]></description><link>http://direct.ecency.com/linux/@pavroo/tails-7-6</link><guid isPermaLink="true">http://direct.ecency.com/linux/@pavroo/tails-7-6</guid><category><![CDATA[linux]]></category><dc:creator><![CDATA[pavroo]]></dc:creator><pubDate>Thu, 26 Mar 2026 11:15:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/Zskj9C56UonZ32EJw6nMcm9UJXZFc4FvMtk6wyeAH5hTy5gmkaDmUn5KVmqjpH76U5g5xmtxsCn3i17V1YTfJZV8yYdYfdhGfRbAMrWX8h2FBdA2zHGs?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Kali Linux 2026.1]]></title><description><![CDATA[A new version of Kali Linux 2026.1 has been released. Kali Linux is a specialized Linux distribution used for security testing and cracking. #linux #debian #cybersecurity]]></description><link>http://direct.ecency.com/linux/@pavroo/kali-linux-2026-1</link><guid isPermaLink="true">http://direct.ecency.com/linux/@pavroo/kali-linux-2026-1</guid><category><![CDATA[linux]]></category><dc:creator><![CDATA[pavroo]]></dc:creator><pubDate>Wed, 25 Mar 2026 10:26:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pJD9LKQ1BG3BAmr5TYaANmrJEBZ9YLn9GHzNKPgN8kU5zPLixtGhvekBHf3nQFp6bWCedoHAhf957jFxZt85voSJADrbRuguHy6U9SFxbW8DuH?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Turing Award Winners]]></title><description><![CDATA[Congrats to Charles Bennett and Gilles Brassard for winning the Turing Award for their industry leadership and breakthroughs with Quantum Information, specifically quantum key distribution. Their work]]></description><link>http://direct.ecency.com/technology/@mrosenquist/turing-award-winners</link><guid isPermaLink="true">http://direct.ecency.com/technology/@mrosenquist/turing-award-winners</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 20 Mar 2026 17:59:24 GMT</pubDate></item><item><title><![CDATA[Cybercriminals are Winning with AI]]></title><description><![CDATA[AI has become the most powerful tool for financial fraud since the dawn of the Internet. As predicted, criminals are exploiting it faster, more effectively, and at scale. According to the latest Interpol]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/cybercriminals-are-winning-with-ai</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/cybercriminals-are-winning-with-ai</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 19 Mar 2026 20:22:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeTcwfbUKKAkzgNpEb5sqPYEFseghMM8yUtjmhhxakzBnCS2eeWyiTzFNbcYwRUyYG2oQdMPiYhFRQ7jMnxkVfocr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[TWO Hours Until Hive Thrive #48 with Guest @mrosenquist]]></title><description><![CDATA[We’re back today, in TWO hours, on the Hive Discord focused on the Hive Community. This post is letting you know, there is two hours until we start. That will be at 6pm UTC | 2pm EST | 11am PST What is]]></description><link>http://direct.ecency.com/hive-125125/@shadowspub/two-hours-until-hive-thrive-48-with-guest-mrosenquist</link><guid isPermaLink="true">http://direct.ecency.com/hive-125125/@shadowspub/two-hours-until-hive-thrive-48-with-guest-mrosenquist</guid><category><![CDATA[hive-125125]]></category><dc:creator><![CDATA[shadowspub]]></dc:creator><pubDate>Tue, 17 Mar 2026 16:00:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/k75bsZMwYNu2L3iBMXq5y7xeiy1isFJsZxnMZSXuXEsxe4ee1cUkGyPr9wFC76NgXM3415AXLVag17VxwZVGPgWm3Qeqs8NDv7XTguPZzH2JevyodJzqXW6hfVW5TbXaubHWkHbVZZAtBTE1ukJk1FeuwN6hPWxgn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hive-Mail updated to v. 2.1: file encryption added!]]></title><description><![CDATA[Hello friends, hoping you guys are safe and well! Dropping by just to let you know that Hive-Mail has been updated to version 2.1: *In case you missed the previous posts: The original post (presenting]]></description><link>http://direct.ecency.com/hive-139531/@hassemer/hive-mail-</link><guid isPermaLink="true">http://direct.ecency.com/hive-139531/@hassemer/hive-mail-</guid><category><![CDATA[hive-139531]]></category><dc:creator><![CDATA[hassemer]]></dc:creator><pubDate>Sun, 15 Mar 2026 12:22:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/3DLAmCsuTe3ba2VJAE1ZhN2oVhekeqoshg9DUnSyUd2Cnt4YtUMpZp3rvRrJvbNwPQuoiPb2EDD3W8Vj3otdv9NMvzbhHZoUvxQsBoCPb8b9anqTisRToCW4ugcmDXmwagVgoT4PAAJTv6wyqVGZHk4DYzbhagn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How SMBs Can Proactively Strengthen Cybersecurity]]></title><description><![CDATA[Cyber attackers increasingly target SMBs because they are often the easiest path into larger supply chains. As cyberattacks are ramping up, specifically against Critical Infrastructure sectors, Small and]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/how-smbs-can-proactively-strengthen-cybersecurity</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/how-smbs-can-proactively-strengthen-cybersecurity</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 13 Mar 2026 18:45:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeTcwfbUKKAkzgNpEb5tkzpuUYw6b8xiNmMXh4WyAgUaEaXzQn1CCTCHdvh3CDYHGVUBJxNDwA3tVW59BGeorPxCn?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>