<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 20 Apr 2026 18:41:46 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/data-stealingtrojansstealers/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[New Jupyter Malware Is A Blend of Infostealer And Backdoor]]></title><description><![CDATA[As new threats keep emerging, researchers have found new malware in the wild. Identified as Jupyter, the malware isn’t only an infostealing trojan but also possesses full backdoor functionality. Jupyter]]></description><link>http://direct.ecency.com/data-stealingtrojansstealers/@twr/newjupytermalwareisablendofinfostealerandbackdoor-0nx86kq2g6ur2mllmiwd</link><guid isPermaLink="true">http://direct.ecency.com/data-stealingtrojansstealers/@twr/newjupytermalwareisablendofinfostealerandbackdoor-0nx86kq2g6ur2mllmiwd</guid><category><![CDATA[data-stealingtrojansstealers]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 20 Nov 2020 15:10:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/54TLbcUcnRm4Lx9pBqYcBiBEm1uDXVKX6bsDKbXpesrDicfmLBJByirNUDPPSk9fykPPzMViSXE6f6inbofrUuHNKwLh6rZTKSMsemoAzLR9HYS4cFGfaUyqLssauB3dXBEyAT8Ge?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[QBot Trojan Comes Back With New Nasty Tricks – Active Campaigns Detected]]></title><description><![CDATA[The old banking trojan QBot has surfaced online once again as researchers discovered its new variant active in the wild. The malware now employs new tricks to steal users’ money. New QBot Trojan Variant]]></description><link>http://direct.ecency.com/bankingtrojan/@twr/qbottrojancomesbackwithnewnastytricksactivecampaignsdetected-c7b39043sa</link><guid isPermaLink="true">http://direct.ecency.com/bankingtrojan/@twr/qbottrojancomesbackwithnewnastytricksactivecampaignsdetected-c7b39043sa</guid><category><![CDATA[bankingtrojan]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 05 Sep 2020 14:15:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/23KQwnti57stzCcFhWj7wg3tnqxkPok8chkAcLG9M8v5Xxzbtm74fA9Rx2S6iSbj2oGxS3o2CBcCoUEKMNweVuns876mj4a?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Microsoft Warns Of Another ‘Anubis’ Malware Targeting Windows]]></title><description><![CDATA[Microsoft recently warned of a new malware targeting Windows systems. Also dubbed Anubis, this Windows malware is not related to the Android banking trojan discovered earlier. Microsoft Warns Of Anubis]]></description><link>http://direct.ecency.com/cryptocurrencymalware/@twr/microsoftwarnsofanotheranubismalwaretargetingwindows-xlzsprhx4s</link><guid isPermaLink="true">http://direct.ecency.com/cryptocurrencymalware/@twr/microsoftwarnsofanotheranubismalwaretargetingwindows-xlzsprhx4s</guid><category><![CDATA[cryptocurrencymalware]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 02 Sep 2020 13:50:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgsZzNugMsWc8TEZPbkgbExfggncdWXqvG5JDbe6v2jdWYw9wAuSHUeZgsAkgSGjWB12aosi6zqDcRZ1ysPc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Researchers Make Decryptor For ThiefQuest Ransomware Publicly Available]]></title><description><![CDATA[ThiefQuest or EvilQuest recently made it to the news following its discovery. The ransomware specifically aimed at Mac devices. Thankfully, following the continuous analyses by the cybersecurity community,]]></description><link>http://direct.ecency.com/appleransomware/@twr/researchersmakedecryptorforthiefquestransomwarepubliclyavailable-0z19rifn3e</link><guid isPermaLink="true">http://direct.ecency.com/appleransomware/@twr/researchersmakedecryptorforthiefquestransomwarepubliclyavailable-0z19rifn3e</guid><category><![CDATA[appleransomware]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 14 Jul 2020 14:05:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/mXkfdToSwHy4h1jQhTWHtNrVigXbdMMCxtK1oTsVhcdZX1o1dQLpb1AMJgKv3KWADiYkMuevtDU4SxeAzjyrKB5yCbwcKUiKzBcWvyqy8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[New Ryuk Stealer Targets Government And Military Sectors]]></title><description><![CDATA[Ryuk has now emerged within a new guise. In brief, the new strain of Ryuk Stealer exhibits advanced properties that enable it to target government and military sectors. Ryuk Malware Stealer Revamped]]></description><link>http://direct.ecency.com/data-stealingtrojansstealers/@twr/newryukstealertargetsgovernmentandmilitarysectors-e8jnbe6zki</link><guid isPermaLink="true">http://direct.ecency.com/data-stealingtrojansstealers/@twr/newryukstealertargetsgovernmentandmilitarysectors-e8jnbe6zki</guid><category><![CDATA[data-stealingtrojansstealers]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 30 Jan 2020 14:00:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgsZzNugMsWc8TEZPbkgbExfggncdWXqvG5JDbe6v2jdWYw9wAuSHUeZgsAkgRkEU7PjYxVEJZfbYyoGdm2n?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Astaroth Trojan Exploits Antivirus Software]]></title><description><![CDATA[The Astaroth Trojan steals credentials and other user data through antivirus software, Avast, and services. It sends scam campaigns with zipfile attachments containing .jpeg, .gif and extensionless files.]]></description><link>http://direct.ecency.com/data-stealingtrojansstealers/@twr/astarothtrojanexploitsantivirussoftware-rcfhpil48o</link><guid isPermaLink="true">http://direct.ecency.com/data-stealingtrojansstealers/@twr/astarothtrojanexploitsantivirussoftware-rcfhpil48o</guid><category><![CDATA[data-stealingtrojansstealers]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 15 Feb 2019 12:06:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQc8j2KJaNXywTd35FmuBgqmH1XbTzf75TEmRcrEVSAAd2g5nM5HKhxRpZ9j17hJcLL2dcbuGARA3uzipmdU6vguTLE6eo4z9iFAuTfMyELMWSut?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Dark Web Market: The Cost Of Malware, Exploits And Services.]]></title><description><![CDATA[You may have an inkling about what goes on in the dark web. In case you do not know already, the dark web is the part of the internet not indexed by search engines. It therefore requires special software]]></description><link>http://direct.ecency.com/data-stealingtrojansstealers/@twr/thedarkwebmarketthecostofmalwareexploitsandservices-b7njuekksh</link><guid isPermaLink="true">http://direct.ecency.com/data-stealingtrojansstealers/@twr/thedarkwebmarketthecostofmalwareexploitsandservices-b7njuekksh</guid><category><![CDATA[data-stealingtrojansstealers]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 03 Aug 2018 19:00:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/gPCasciUWmF1t2qk9kCnSQ78yJVZJEYafEVBNTUuVg2vsxiEpE78eF8DWYASwjiUYnZsu7Z9o5CNPNUEG31JNn9YfCCRdb4JKhnsdXYeHRB8Pr1TQXcbcL5jkt2RtxqCV1kZ582kW6HBbX7JsY?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>