<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 20 Apr 2026 23:08:26 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/f5networks/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[US CISA Alerts of Active Exploitation of F5 BIG-IP Vulnerability]]></title><description><![CDATA[Earlier this month, a serious security flaw surfaced online targeting F5 Networks. Now, the US CISA has issued an alert about the active exploits of this F5 BIG-IP vulnerability. CISA Warns Of F5 BIG-IP]]></description><link>http://direct.ecency.com/applicationfirewall/@twr/uscisaalertsofactiveexploitationoff5big-ipvulnerability-jcy5rq74y2</link><guid isPermaLink="true">http://direct.ecency.com/applicationfirewall/@twr/uscisaalertsofactiveexploitationoff5big-ipvulnerability-jcy5rq74y2</guid><category><![CDATA[applicationfirewall]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 29 Jul 2020 14:30:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeXL7n7YbBjpQ6NM6KhL7QJpmn4BVBcXuzwD3YsLzYLQ18XdxyQmUT5M9rJYWGsEGzmEyay3SgTwHhhDYk2Y8HzUv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[F5 Networks Vulnerability Comes Under Active Exploit Right After Disclosure]]></title><description><![CDATA[It hasn’t been long since the enterprise networking gear provider F5 Networks disclosed a vulnerability. And now, right after the disclosure, cybercriminals have started to exploit the vulnerability. Users]]></description><link>http://direct.ecency.com/applicationfirewall/@twr/f5networksvulnerabilitycomesunderactiveexploitrightafterdisclosure-cheenzuop2</link><guid isPermaLink="true">http://direct.ecency.com/applicationfirewall/@twr/f5networksvulnerabilitycomesunderactiveexploitrightafterdisclosure-cheenzuop2</guid><category><![CDATA[applicationfirewall]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 07 Jul 2020 12:45:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeXL7n7YbBjpQ6NM6KhL7QJpmn4BVBcXuzwD3YsLzYLQ18XdxyQmUT5M9rJYWGsEGzmEyay3SgTwHhhDYk2Y8HzUv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Botnett utnytter Linux-systemer med åpne SSH-porter til å utvinne kryptovaluta - Digi]]></title><description><![CDATA[IT-sikkerhetsselskapet F5 Networks har oppdaget et nytt botnett som ser ut til å ha som formål å utvinne kryptovaluta. Botnettet, som har fått navnet PyCryptoMiner, har en del spesielle egenskaper. Det]]></description><link>http://direct.ecency.com/pycryptominer/@kapteinb/botnett-utnytter-linux-systemer-med-apne-ssh-porter-til-a-utvinne-kryptovaluta-digi</link><guid isPermaLink="true">http://direct.ecency.com/pycryptominer/@kapteinb/botnett-utnytter-linux-systemer-med-apne-ssh-porter-til-a-utvinne-kryptovaluta-digi</guid><category><![CDATA[pycryptominer]]></category><dc:creator><![CDATA[kapteinb]]></dc:creator><pubDate>Thu, 11 Jan 2018 09:22:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXa4ejxphDmtz74RzshGCgY7QacHRiw5v4rmJo3v5YGnsZd9LCZcbjwtaNctupDE91c86h4vUJK8?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>