<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sat, 18 Apr 2026 17:57:03 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/hive-145844/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Welcome To Cybersecurity!]]></title><description><![CDATA[Welcome to the cybersecurity community! Cybersecurity continues to grow as a concern around the world and this community means to assist those who work in the community along with those who use technology.]]></description><link>http://direct.ecency.com/hive-145844/@sqlinsix/welcome-to-cybersecurity</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@sqlinsix/welcome-to-cybersecurity</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Tue, 14 Apr 2020 09:46:09 GMT</pubDate></item><item><title><![CDATA[Introducing Tree Market!]]></title><description><![CDATA[by @tree.market on Tree.Market View my bio on CastGarden: Introducing Tree Market! 🎬 by @quest4designs 🎶 by Joystock - #Web3 #FreeMarket #Startup #blockchain #privacy #Innovation #P2P Check out today’s]]></description><link>http://direct.ecency.com/hive-145844/@cast.garden/introducing-tree-market-r91esu0rg9j</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@cast.garden/introducing-tree-market-r91esu0rg9j</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[cast.garden]]></dc:creator><pubDate>Fri, 02 Aug 2024 21:08:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/62PdCouTvNPCrne24i6EBzV6xkEbcArtxCDu9Nmc5CS28WJVLRFuUEmwjbeCcmr4GrvKj7xhN71sx2C32L1ucMvYw7GLpTmJb7wMXZ4a6ym1tHU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Current cryptocurrency regulations pose multiple systemic risks]]></title><description><![CDATA[Recently I’ve looked through crypto exchanges and discovered drastic mismanagement of security which is ingrained in current regulations regarding how identity verification (KYC) is performed. Identity]]></description><link>http://direct.ecency.com/hive-145844/@czarnyzajaczek/current-cryptocurrency-regulations-pose-multiple</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@czarnyzajaczek/current-cryptocurrency-regulations-pose-multiple</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[czarnyzajaczek]]></dc:creator><pubDate>Fri, 01 Jul 2022 21:58:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/TZjG7hXReeVqFVvkXVUAoCnJ1v1VgroFt8gEbR89p3yM84UGY7RZ8SEzQRrGk9UGREQfC3vJ3iHVcRxvkfnyXNPei73MAzQsCF1xGBHQb4P1oipRTTnQ9tZN9sf56xHU9rR27ZmZZLTjw4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cyber security : a necessary tool for modern-day business]]></title><description><![CDATA[Advancement in information and communication technology has adversely affects the operation and process of businesses, education, military etc. These domains now thrive in the cyber space as opposed to]]></description><link>http://direct.ecency.com/hive-145844/@lukaz364/cyber-security-a-necessary-tool-for-modern-day-business</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@lukaz364/cyber-security-a-necessary-tool-for-modern-day-business</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[lukaz364]]></dc:creator><pubDate>Sun, 26 Jun 2022 19:00:09 GMT</pubDate></item><item><title><![CDATA[What’s Broken with M&A Cybersecurity]]></title><description><![CDATA[Cybersecurity for Mergers and Acquisitions is a mess. There are a surprising number of significant unforeseen risks that can wreak havoc on M&A deals. In this week’s fireside chat, I am joined by Justin]]></description><link>http://direct.ecency.com/hive-145844/@mrosenquist1/xihqpioj</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@mrosenquist1/xihqpioj</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[mrosenquist1]]></dc:creator><pubDate>Tue, 27 Apr 2021 00:15:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/368La1qZAv72LaDnPi7unoyebf82PrctVf3ygNzCmTovq2yvxZn9KqwyMtSK6cUyizwnWS1GjiUeLL7Q2SdJezFY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Good and Bad of Google’s Project Zero Vulnerability Disclosure Changes]]></title><description><![CDATA[Google’s infamous Project Zero vulnerability research team recently announced it is changing its disclosure policy to be more friendly to product vendors. But is that good for cybersecurity? In this week’s]]></description><link>http://direct.ecency.com/hive-145844/@mrosenquist1/hrszqvrw</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@mrosenquist1/hrszqvrw</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[mrosenquist1]]></dc:creator><pubDate>Mon, 19 Apr 2021 17:20:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/368La1qZAv72LaDnPi7unoyebf82PrctVf3ygNzCmTovq2jp3Sf91DEoFJU3P7dj8VAp141WEi5phJ5C2WaCUBfU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[🔑🦸‍♂️  [monthly report - March 2021] ]]></title><description><![CDATA[This is a cross post of @keys-defender/monthly-report-march-2021-7-leaks-phishing-and-farming-waves-new-features-realeased by @gaottantacinque.monthly report]]></description><link>http://direct.ecency.com/hive-145844/@gaottantacinque/monthly-report-march-2021-7-leaks-phishing-and-farming-waves-new-features-realeased-hive-145844</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@gaottantacinque/monthly-report-march-2021-7-leaks-phishing-and-farming-waves-new-features-realeased-hive-145844</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[gaottantacinque]]></dc:creator><pubDate>Sat, 03 Apr 2021 16:07:00 GMT</pubDate></item><item><title><![CDATA[Chaining Exploits are Taking Vulnerabilities to a New Level]]></title><description><![CDATA[Cyberattacks are leaping ahead in sophistication and the industry is not prepared. As an example, Google Project Zero team recently detected attackers that exploited a combination of seven previously unknown]]></description><link>http://direct.ecency.com/hive-145844/@mrosenquist1/vfzcjwku</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@mrosenquist1/vfzcjwku</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[mrosenquist1]]></dc:creator><pubDate>Tue, 30 Mar 2021 16:10:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/368La1qZAv72LaDnPi7unoyebf82PrctVf3ygNzCmTovq2x9nEnFixJeG9KTDZ7Wvc4QHdWHz2zoakjez2Vs9sbC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[OnlineSecurity:: HowTo Prevent From Cyber Attacks | Live Learning Session | Exclusive @3Speak]]></title><description><![CDATA[Hey Guys; Welcome.. In this Vlog, I talk about How a person can prevent from falling Prey to Cyber Attacks. Cyber Attacks can in any form it could be::- Phishing Malware Password Attacks SQL Injections]]></description><link>http://direct.ecency.com/hive-145844/@gungunkrishu/qbexkcux</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@gungunkrishu/qbexkcux</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[gungunkrishu]]></dc:creator><pubDate>Tue, 30 Jun 2020 08:15:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/2HeX3Zi2vTf1hsWg5nYFdFyFDGZN1HWb4uWowTgoQbErXa25uN7iBUmvMvpNAEaRgrYrS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Report: More Unknown Devices on Corporate Networks]]></title><description><![CDATA[A report published this week by Sepio Systems suggests the number of devices being attached to corporate networks. Sepio Systems, a provider of tools for mitigating cyberattacks against hardware systems]]></description><link>http://direct.ecency.com/hive-145844/@sqlinsix/report-more-unknown-devices-on-corporate-networks</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@sqlinsix/report-more-unknown-devices-on-corporate-networks</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Sat, 16 May 2020 09:31:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPAK3LULoSbFXRoxD669N1nCeeYeG7J9XEVAXwSBJ9gvCVnHgfKiwF2HEwgTitsc6TFB36XE7Jn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[Renamed] Is There A Backdoor To Linux?]]></title><description><![CDATA[[Paraphrased]: an individual submitted code that contained a bug and a few people are suspicious only because the developer has been in the community for a while. Keep in mind that there are a variety]]></description><link>http://direct.ecency.com/hive-145844/@sqlinsix/renamed-is-there-a-backdoor-to-linux</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@sqlinsix/renamed-is-there-a-backdoor-to-linux</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Fri, 15 May 2020 10:30:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iNqPFGjvKVhajpjdCwAUTkmjuoyaiA3FZM2EqPzbyPMKNxQXNmF8w9PJo7fVjFBrtWCXemMaLRc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[For IT Leaders, Transformation Demands Require Focus]]></title><description><![CDATA[With the right focus, prioritization and infrastructure agility, IT leaders will be better prepared to respond to challenges of HHN and beyond. Whether we’re talking about the meeting of world economic]]></description><link>http://direct.ecency.com/hive-145844/@sqlinsix/for-it-leaders-transformation-demands-require-focus</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@sqlinsix/for-it-leaders-transformation-demands-require-focus</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Thu, 14 May 2020 09:02:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPUHWpBWMamfbQ1uf9CWE5zp4JMXCyBgKahXtp7xLtb4YYGrcCaYAAZ6nh4e8WuN1etEVmtvqYi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Is DEF CON Cancelled?]]></title><description><![CDATA[We were told DEF CON 28 is canceled. But obviously we’re not stupid enough to fall for that old trick. Protect Your Digital Assets - Consumer Guide To Digital Security As a note, stay tuned for further]]></description><link>http://direct.ecency.com/hive-145844/@sqlinsix/is-def-con-cancelled</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@sqlinsix/is-def-con-cancelled</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Wed, 13 May 2020 09:21:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP35bVGjGoE93K3E4U5KX8KtMBJ2rgQdKhZYLoeXbTd3pPR4uyt2rLPxCn4Cd4kSCrWd7S4ECkQEnEvc9STZX93h6urZeuAtSgVSkjG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Businesses Underestimate HHN Cybersecurity Risks]]></title><description><![CDATA[HHN has been impacting the world for at least five months, and cybercriminals have not let up in their attempts to manipulate the crisis for their own gain. For example, in the week before Easter—the original]]></description><link>http://direct.ecency.com/hive-145844/@sqlinsix/businesses-underestimate-hhn-cybersecurity-risks</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@sqlinsix/businesses-underestimate-hhn-cybersecurity-risks</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Tue, 12 May 2020 10:40:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQCgcGq9G6v1Er6gLR52hpmZC1HqiD3ABQsdrvugqsDgaHGXnZdsoihTkUXmpZHdwmFWo9xS5C2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What Everyone MUST Know About Hackers]]></title><description><![CDATA[Outside of the principles and techniques that we learn in The Consumer Guide To Digital Security, the presentation of What Everyone Should Know About Hackers - Who and Why, covers the below information]]></description><link>http://direct.ecency.com/hive-145844/@sqlinsix/what-everyone-must-know-about-hackers</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@sqlinsix/what-everyone-must-know-about-hackers</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Mon, 11 May 2020 08:48:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e31ADFnuwJW5ijVHSyK8yxrQPUFQSTvS8UN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Demystifying a Docker Image]]></title><description><![CDATA[Six months ago ForAllSecure started analyzing Docker images. What does this mean? Imagine we have a user who wants us to fuzz their application. How do they give it to us? Do they tar it up? Do they give]]></description><link>http://direct.ecency.com/hive-145844/@sqlinsix/demystifying-a-docker-image</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@sqlinsix/demystifying-a-docker-image</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Sun, 10 May 2020 09:20:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQbgEQucFJUzW2jTUh5WTgPCGDDcVFJgcCo9TdLPMXChtXPMw3Hseq9PgKp1PbyfHBdxhxNr8Rc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Linux Foundation Takes on Digital Trust With ToIP Foundation]]></title><description><![CDATA[The Linux Foundation announced it will host the Trust over IP (ToIP) Foundation, an independent project to enable trustworthy exchange and verification of data between any two parties on the internet in]]></description><link>http://direct.ecency.com/hive-145844/@sqlinsix/the-linux-foundation-takes-on-digital-trust-with-toip-foundation</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@sqlinsix/the-linux-foundation-takes-on-digital-trust-with-toip-foundation</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Sat, 09 May 2020 08:56:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQMEGaWWCDttumuQd22RE7xW3MECTBRn1WjDcR87o3PR9j2ZNpXtQfndLotxx4tRiH9pZ3DiFxJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Xiaomi U-Turn: Admits Sending Private Data it Said it Didn’t]]></title><description><![CDATA[This just gets weirder: Xiaomi was caught out by security researchers, who found its devices phoning home with private data. But the Chinese company promised it did no such thing. Then it doubled-down]]></description><link>http://direct.ecency.com/hive-145844/@sqlinsix/xiaomi-u-turn-admits-sending-private-data-it-said-it-didn-t</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@sqlinsix/xiaomi-u-turn-admits-sending-private-data-it-said-it-didn-t</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Fri, 08 May 2020 08:43:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPEyBn8B74aDZnwRwUAFSpKGrxT151NjSnnZsPpudkwwc53PMFpoMhARr6UGtwJ6KipHHuAqgZU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Enterprise Application Access Increases Security for Your Enterprise Applications — and the Data Behind Them]]></title><description><![CDATA[Companies all over the world are moving rapidly to enable their entire workforce to work remotely due to the current environment. Akamai’s Enterprise Application Access solution is designed to provide]]></description><link>http://direct.ecency.com/hive-145844/@sqlinsix/enterprise-application-access-increases-security-for-your-enterprise-applications-and-the-data-behind-them</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@sqlinsix/enterprise-application-access-increases-security-for-your-enterprise-applications-and-the-data-behind-them</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Thu, 07 May 2020 08:48:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iNu3BKxWzVyzU2V5T9zXSTwgSVgF1MS44CB7MDNoHnqfLh2o1C7jsUj4X6HCyDpqQCcBijWToxS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[Our Thoughts] Steal Data Through Sound, Sans Speaker?]]></title><description><![CDATA[A university researcher has figured out how to get a PC’s power supply to make noises. Why’s that interesting? Because it could be used to transmit and steal data. Yes, the irrepressible Mordechai Guri]]></description><link>http://direct.ecency.com/hive-145844/@sqlinsix/our-thoughts-steal-data-though-sound-sans-speaker</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@sqlinsix/our-thoughts-steal-data-though-sound-sans-speaker</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Wed, 06 May 2020 09:09:51 GMT</pubDate></item></channel></rss>