<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sun, 12 Apr 2026 20:20:15 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/exploits/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[How a Steam Deck Runs Kali Linux and the Dark World of Zero-Day Exploits]]></title><description><![CDATA[I recently watched a video by the renowned YouTuber David Bombal, and I must say, it was an exhilarating experience. He showcased how to install Kali Linux on a Steam Deck, transforming it into a fully]]></description><link>http://direct.ecency.com/it-security/@louis88/how-a-steam-deck-runs-kali-linux-and-the-dark-world-of-zero-day-exploits</link><guid isPermaLink="true">http://direct.ecency.com/it-security/@louis88/how-a-steam-deck-runs-kali-linux-and-the-dark-world-of-zero-day-exploits</guid><category><![CDATA[it-security]]></category><dc:creator><![CDATA[louis88]]></dc:creator><pubDate>Sat, 25 May 2024 21:54:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e9titGxuHXjKLwnLmepknaXJb3kB6ffDzva?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Exploiting the Game Industry 🎮

This guy plays "Mad Games Tycoon" and exploits ...]]></title><description><![CDATA[... his way to scam the industry without making any games. This is actually true to modern game publishering!! This made me want to play such a simulation game now! #gaming #gamedev #exploits #finance]]></description><link>http://direct.ecency.com/hive-193084/@ahmadmangazap/jviq48knpwwvpx60htpp0w</link><guid isPermaLink="true">http://direct.ecency.com/hive-193084/@ahmadmangazap/jviq48knpwwvpx60htpp0w</guid><category><![CDATA[hive-193084]]></category><dc:creator><![CDATA[ahmadmangazap]]></dc:creator><pubDate>Thu, 29 Feb 2024 12:11:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eHZL15qsC1asqpPWEozVt3GdgV59RMCiUqc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[2024's Cyber Warfare: Defending Against Digital Dangers]]></title><description><![CDATA[In the year 2024, the cyber-crime landscape has evolved dramatically, presenting a myriad of complex challenges that span various domains such as digital commerce, corporate data protection, AI in]]></description><link>http://direct.ecency.com/hive-131413/@carrythezer0/2024s-cyber-warfare-defending-against-digital-dangers</link><guid isPermaLink="true">http://direct.ecency.com/hive-131413/@carrythezer0/2024s-cyber-warfare-defending-against-digital-dangers</guid><category><![CDATA[hive-131413]]></category><dc:creator><![CDATA[carrythezer0]]></dc:creator><pubDate>Wed, 31 Jan 2024 03:26:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/FUkUE5bzkAZT3HzV5tJDiU2ik81PCd4JCyhWnRcDN8XJsVFY3UNB8DCS7a2BnvQDxPxzpP4UxEE5iXooKVgRDpfSsLg7KAQdTBYPLZWo7gRZ5jLLK5kq3A4ENcRr2rAYYffMnX7EXkVKFfuS9tWC3MbUHr38V3UwYHVx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[(JaiChai) "Copy and Paste at your own peril.."]]></title><description><![CDATA[*A rare, signed, higher resolution and non-watermarked version of this image is available for download at: Imitation is the sincerest form of flattery that mediocrity can pay to greatness. - Oscar Wilde.]]></description><link>http://direct.ecency.com/proofofbrain/@jaichai/jaichai-copy-and-paste-at-your-own-peril</link><guid isPermaLink="true">http://direct.ecency.com/proofofbrain/@jaichai/jaichai-copy-and-paste-at-your-own-peril</guid><category><![CDATA[proofofbrain]]></category><dc:creator><![CDATA[jaichai]]></dc:creator><pubDate>Wed, 06 Jul 2022 06:01:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/99pyU5Ga1kwqSXWA2evTexn6YzPHotJF8R85JZsErvtTWXjKx8W8xaykP7mpZtYtySNecbEBTEfNVURubuKnrBvpxHPiLe9yRNaYJRvuifaMz8Hkeh4nCY8JaJKkx7bR1w?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Splinterlands trouble & how business isn't about avoiding systems abuse]]></title><description><![CDATA[Introduction Hello hiveans, it's your fellow Splinterlands player, and extraordinaire reporting today to explain how @aggroed and @yabapmatt have updated Splinterlands counter to their goals of improving]]></description><link>http://direct.ecency.com/spt/@taintedblood/splinterlands-trouble-and-how-business-isnt-about-avoiding-systems-abuse</link><guid isPermaLink="true">http://direct.ecency.com/spt/@taintedblood/splinterlands-trouble-and-how-business-isnt-about-avoiding-systems-abuse</guid><category><![CDATA[spt]]></category><dc:creator><![CDATA[taintedblood]]></dc:creator><pubDate>Wed, 15 Sep 2021 15:32:15 GMT</pubDate></item><item><title><![CDATA[Recent Defi Exploits and my investment in Cub Finance]]></title><description><![CDATA[I have been at least slightly affected by three different Defi exploits. GeckoSwap's Hack, Mozart Finance's Piano Minting exploit, and Pancake's Syrup Minting exploit. All three of these Projects were]]></description><link>http://direct.ecency.com/hive-167922/@torrocicefist/3zxzis-recent-defi-exploits-and-my-investment-in-cub-finance</link><guid isPermaLink="true">http://direct.ecency.com/hive-167922/@torrocicefist/3zxzis-recent-defi-exploits-and-my-investment-in-cub-finance</guid><category><![CDATA[hive-167922]]></category><dc:creator><![CDATA[torrocicefist]]></dc:creator><pubDate>Wed, 07 Apr 2021 15:05:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNbFzApDTmvFatkwuDREJFVGiTUu9JAKshPQ2qnJA2JXd4TPyr5DUxW8rxv1BqT2dSbTeyiDauxGaoJPzvgq8sfjqM7AmruuA6Vzes5pDaTYWS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[CYBER.DUMP #002]]></title><description><![CDATA[Your glimpse into the ever-advancing world of technology. This week has been slightly slow-moving for the tech world (due to the coronavirus pandemic), but there are a few very interesting news, that you]]></description><link>http://direct.ecency.com/news/@anvish.anvish/cyber-dump-002</link><guid isPermaLink="true">http://direct.ecency.com/news/@anvish.anvish/cyber-dump-002</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[anvish.anvish]]></dc:creator><pubDate>Sun, 26 Apr 2020 04:30:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/2bP4pJr4wVimqCWjYimXJe2cnCgnGdnyurpJNAo6C4e?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Lightning Release]]></title><description><![CDATA[Summary We have released a new release that is improvingthe speed in our web interface a lot.As well as removing duplicate vulnerabilitieson focusing more on quality.You can check it out your self]]></description><link>http://direct.ecency.com/vulnerabilitiy/@firosolutions/lightning-release</link><guid isPermaLink="true">http://direct.ecency.com/vulnerabilitiy/@firosolutions/lightning-release</guid><category><![CDATA[vulnerabilitiy]]></category><dc:creator><![CDATA[firosolutions]]></dc:creator><pubDate>Fri, 21 Feb 2020 15:34:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/axopD2eJJx4XNhMSpRTSQRxpQXQYtaLrvBT9GEkCvTdtLT5LJYG2A23sMrZ4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[via threatpost.com: PoC Exploits Do More Good Than Harm: Threatpost Poll; Interesting!!!!!]]></title><description><![CDATA[IMG SRC Wow! A few days ago I posted this article here about the question if PoC Exploits should be made public or not including link to the article from threatpost.com with their poll. The results are]]></description><link>http://direct.ecency.com/poc/@doifeellucky/via-threatpost-com-poc-exploits-do-more-good-than-harm-threatpost-poll-interesting</link><guid isPermaLink="true">http://direct.ecency.com/poc/@doifeellucky/via-threatpost-com-poc-exploits-do-more-good-than-harm-threatpost-poll-interesting</guid><category><![CDATA[poc]]></category><dc:creator><![CDATA[doifeellucky]]></dc:creator><pubDate>Thu, 23 Jan 2020 08:23:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/X37EMQ9WSwsLaUVnWj5v4rfuehQsoVtukrb5zwdXbo5aA1Ad39Ag3xeAuev33LExpRqyBByfthe5AP8P4R1zTB1pzEWQFKSrKPVY2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[PRAISE is an omnibus Sicle of harvest in the hand of a Believer!!]]></title><description><![CDATA[The Bible declares vividly that the weapons of our warfare are not physical, but mighty through God to the pulling down of strongholds....2nd Cor 10:4. Indeed this is very true! However,one may miss it]]></description><link>http://direct.ecency.com/busy/@whyaskwhy/praise-is-an-omnibus-sicle-of-harvest-in-the-hand-of-a-believer</link><guid isPermaLink="true">http://direct.ecency.com/busy/@whyaskwhy/praise-is-an-omnibus-sicle-of-harvest-in-the-hand-of-a-believer</guid><category><![CDATA[busy]]></category><dc:creator><![CDATA[whyaskwhy]]></dc:creator><pubDate>Sun, 20 Oct 2019 13:05:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUMp8dW6yuJTR9MKNu8P8DCXDU9qmmiGBpNvYrSioATcqBVLdEYjgiuHNy2GTyCxwJZRh26JbyL4ygA2mifPkECDkK?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Malngin: A powerful anonymous curated acquisition and monetization platform for exploits and OffSec capabilities]]></title><description><![CDATA[A new anonymous platform for security researchers, cryptanalysts and strategic investors is making some news of late. Malngin is offering up to US$10million in bounty rewards/one-time payouts to security]]></description><link>http://direct.ecency.com/offsec/@orch/malngin-a-powerful-anonymous-curated-acquisition-and-monetization-platform-for-exploits-and-offsec-capabilities</link><guid isPermaLink="true">http://direct.ecency.com/offsec/@orch/malngin-a-powerful-anonymous-curated-acquisition-and-monetization-platform-for-exploits-and-offsec-capabilities</guid><category><![CDATA[offsec]]></category><dc:creator><![CDATA[orch]]></dc:creator><pubDate>Wed, 17 Jul 2019 03:11:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/32FTXiZsHoAW6noHJDhrg3W8ZKHVFSsLYM859aTDCF8iErHb81v1UPgV5F8KWWwNBaBf6weTvkbqoebsgpGNoa4WBC6x1RPFf3np2LtJXBi54NBWpXUt7Nnr2PPbrs8y7QGCLFJpqV9sbiYn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[LightSail 2: the probe that exploits the Sun sent a message]]></title><description><![CDATA[LightSail 2 is a concept that promises a lot in the field of interplanetary navigation: it does not actually use a traditional fuel, but rather the Sun to move within the Solar System saving weight and]]></description><link>http://direct.ecency.com/lightsail/@edaze/lightsail-2-the-probe-that-exploits-the-sun-sent-a-message-1562438773</link><guid isPermaLink="true">http://direct.ecency.com/lightsail/@edaze/lightsail-2-the-probe-that-exploits-the-sun-sent-a-message-1562438773</guid><category><![CDATA[lightsail]]></category><dc:creator><![CDATA[edaze]]></dc:creator><pubDate>Sun, 07 Jul 2019 08:46:24 GMT</pubDate></item><item><title><![CDATA[Zipato Smart Home Hub Exploits Discovered That Could Allow An Attacker to Open iOT Door Locks]]></title><description><![CDATA[Smart home solutions may seem to provide convenient security compared to conventional home security (door locks). Nonetheless, these IoT solutions can be vulnerable to cyber attacks. Recently, researchers]]></description><link>http://direct.ecency.com/apiexploit/@twr/zipatosmarthomehubexploitsdiscoveredthatcouldallowanattackertoopeniotdoorlocks-os9ajodwqe</link><guid isPermaLink="true">http://direct.ecency.com/apiexploit/@twr/zipatosmarthomehubexploitsdiscoveredthatcouldallowanattackertoopeniotdoorlocks-os9ajodwqe</guid><category><![CDATA[apiexploit]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 05 Jul 2019 11:56:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBr4rFUo5GyYyWxdnuHExLUZnEzuw3AFi4sN7w4sjNh22FwQmu65pgo7xFYDAPNaQpDSRZTs6GKH8zQDeGW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[CUJO Firewall Vulnerabilities Exposed]]></title><description><![CDATA[Two separate vulnerabilities ran the risk of compromising the security of devices developed by Cujo AI. The smart hardware, Cujo Firewall, protects personal devices from online threats. The firewall comes]]></description><link>http://direct.ecency.com/apiexploit/@twr/cujofirewallvulnerabilitiesexposed-lic4iwstz1</link><guid isPermaLink="true">http://direct.ecency.com/apiexploit/@twr/cujofirewallvulnerabilitiesexposed-lic4iwstz1</guid><category><![CDATA[apiexploit]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 03 Feb 2019 11:49:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgsZzNugMsWc8TEZPbkgbExfggncdWXqvG5JDbe6v2jdWYw9wAuSHUeZgsAkgRkEU7PV4PPcix27nLJVAWZC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[HardenedBSD otro sistema basado en FreeBSD con características interesantes.]]></title><description><![CDATA[Introducción Fundado en 2014 por Oliver Pinter y Shawn Webb, HardenedBSD es un fork o trabajo derivado de FreeBSD enfocado en mejoras de seguridad. El proyecto HardenedBSD esta implementando muchas]]></description><link>http://direct.ecency.com/spanish/@cosmicboy123/hardenedbsd-otro-sistema-basado-en-freebsd-con-caracteristicas-interesantes</link><guid isPermaLink="true">http://direct.ecency.com/spanish/@cosmicboy123/hardenedbsd-otro-sistema-basado-en-freebsd-con-caracteristicas-interesantes</guid><category><![CDATA[spanish]]></category><dc:creator><![CDATA[cosmicboy123]]></dc:creator><pubDate>Mon, 28 May 2018 18:04:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQbScAK7FzR2953SYm523NLxWPnEAVeB67eRUCXDtRmBeWxsX7HawRGBkjnUzfoN6CoktcY4eS2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[Report] slothicorn.com - Vulnerability for a DDos attack]]></title><description><![CDATA[After reviewing the Slothicorn website I noticed that this website is based in Wordpress. Hence, I've decided to quickly test this Wordpress installation in order to find security flaws. Here is what I've]]></description><link>http://direct.ecency.com/slothicorn/@jaysermendez/report-slothicorn-com-vulnerability-for-a-ddos-attack</link><guid isPermaLink="true">http://direct.ecency.com/slothicorn/@jaysermendez/report-slothicorn-com-vulnerability-for-a-ddos-attack</guid><category><![CDATA[slothicorn]]></category><dc:creator><![CDATA[jaysermendez]]></dc:creator><pubDate>Sat, 12 May 2018 00:23:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/7b4bio5hobgu85mFpLjsB5bdcQRiiGHJEPFYM5Ssib8BDvTcdKf2MNm9ngTBkoaUznREGaEaxXbJyaage9eohnrqBvPBx4ZGrPCGHpkjpNE4ZMHxcWrpt6eQQhkS3PNSQNQoAEXwwmbbGcT2sikpbmVgJZi6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Archvaldor's Warcraft Hacks On Dtube]]></title><description><![CDATA[Archvaldor's Warcraft Hacks now on Dtube. ▶️ DTube ▶️ IPFS]]></description><link>http://direct.ecency.com/warcraft/@archvaldor/ahvnw5bd</link><guid isPermaLink="true">http://direct.ecency.com/warcraft/@archvaldor/ahvnw5bd</guid><category><![CDATA[warcraft]]></category><dc:creator><![CDATA[archvaldor]]></dc:creator><pubDate>Thu, 10 May 2018 01:55:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBqwzwxM6L1P6uLNceBDDCMABLn6cSqVameVGeKL6QaAv5GBg6JnAxen9C5rLjNZYYtCSi9D687qXdYYdwb?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA["Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots]]></title><description><![CDATA["But a new strain of malware, dubbed "Hide n Seek," can live through a power-cycle: it writes a copy of itself to the /etc/init.d/ directory in the IoT device's embedded GNU/Linux system,]]></description><link>http://direct.ecency.com/hideandseek/@satablank/hide-and-seek-becomes-first-iot-botnet-capable-of-surviving-device-reboots</link><guid isPermaLink="true">http://direct.ecency.com/hideandseek/@satablank/hide-and-seek-becomes-first-iot-botnet-capable-of-surviving-device-reboots</guid><category><![CDATA[hideandseek]]></category><dc:creator><![CDATA[satablank]]></dc:creator><pubDate>Wed, 09 May 2018 17:22:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4uukrKt7k8wZS1P34dSFsK1QfaGMsF8ACSPTdK1Qk2PNLSGGYEkH6ZCxF6WQ1guwKEAwGecxgynuDWmBSWEGe9kXfXss7mzRvDUKrG54DcDG3MbjHsJe?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Attempted Product Assassination? - AMD Ryzen Security Flaws - Though the shady part is in how they were disclosed to AMD.]]></title><description><![CDATA[A mysterious lab based out of Israel named CTS-Labs notified AMD of five potential flaws in the Ryzen product line 24 hours before it was disclosed. This is typically done 90 days to give the tech companies]]></description><link>http://direct.ecency.com/news/@dwinblood/attempted-product-assassination-amd-ryzen-security-flaws-though-the-shady-part-is-in-how-they-were-disclosed-to-amd</link><guid isPermaLink="true">http://direct.ecency.com/news/@dwinblood/attempted-product-assassination-amd-ryzen-security-flaws-though-the-shady-part-is-in-how-they-were-disclosed-to-amd</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[dwinblood]]></dc:creator><pubDate>Thu, 15 Mar 2018 18:19:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXZ1PLVU9i4NiYQGLXo3ngfuUkvzfm7bvFay18MbMyMevdM3ezJCHuEVkrEWgQPT7G5q2KHgfKiv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The city of Asilah Morocco between art and history]]></title><description><![CDATA[The city of Asilah or; A Moroccan city located on the Atlantic coast. Over the past three decades, the city has undergone significant transformations in infrastructure, public utilities and urban forms,]]></description><link>http://direct.ecency.com/travel/@xasmae/the-city-of-asilah-morocco-between-art-and-history</link><guid isPermaLink="true">http://direct.ecency.com/travel/@xasmae/the-city-of-asilah-morocco-between-art-and-history</guid><category><![CDATA[travel]]></category><dc:creator><![CDATA[xasmae]]></dc:creator><pubDate>Sat, 17 Feb 2018 11:29:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/aiVb1SUiufHQn12zHMM7zTLseAxh75XbguEn6WEUKq8eR3stzRcHSRRXY2UxsEehHdpd1qzhVifRVPwJ3PSfYG2ZQXcqkNcznQ5peNj26unZkfVcULyFf4w4oTqsKsSnvqFMMFw6gXRfRcd29HZ95DyGK73XKEVkZYEo22yZNjZcBTpGE7pNXUB9vWrX6UiVXiYD9GaCmbywYWwwENLpJYUY5nZ2GtBiw3RB5BPXC5wWuRzFdmY?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>