<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sun, 26 Apr 2026 09:54:08 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/dockerexploit/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Kinsing Malware Actively Targeting Docker Servers With Exposed APIs Ports]]></title><description><![CDATA[Researchers have found a malware operation in the wild targeting docker servers. Dubbed Kinsing, the malware is actively targeting Docker servers with exposed API ports. Kinsing Malware Targeting Docker]]></description><link>http://direct.ecency.com/affectedbycryptomining/@twr/kinsingmalwareactivelytargetingdockerserverswithexposedapisports-i5ce5ijuh6</link><guid isPermaLink="true">http://direct.ecency.com/affectedbycryptomining/@twr/kinsingmalwareactivelytargetingdockerserverswithexposedapisports-i5ce5ijuh6</guid><category><![CDATA[affectedbycryptomining]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 07 Apr 2020 22:35:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/54TLbcUcnRm4Lx9pBqYcBiBEm1uDXVKX6bsDKbXpesrDicfmLBJByirNUDPPSk9fykPPzMViSXE6f6inbofrUuHNKwLh6rZTKSMsemoAzLR9HYS4cFGfaUyqLssauB3dXBEyAT8Ge?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>