<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 10:42:18 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/infosec/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[When Security Becomes a One-Way Street — My Experience with Responsible Disclosure in the Hive Ecosystem]]></title><description><![CDATA[There are moments where you sit in front of your screen and genuinely ask yourself: why am I even doing this? Not because the work isn't enjoyable. Not because I don't know what I'm doing. But because]]></description><link>http://direct.ecency.com/hive/@louis88/when-security-becomes-a-one-way-street-my-experience-with-responsible-disclosure-in-the-hive-ecosystem</link><guid isPermaLink="true">http://direct.ecency.com/hive/@louis88/when-security-becomes-a-one-way-street-my-experience-with-responsible-disclosure-in-the-hive-ecosystem</guid><category><![CDATA[hive]]></category><dc:creator><![CDATA[louis88]]></dc:creator><pubDate>Wed, 08 Apr 2026 23:25:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/26uUsAjKTsXCDw7zixZR182JbFKvgzJ9YwsFpTVcRaGCmsqhA1unTgpqu735dj4JeujH4TEh7ZmpoVGj7rFmvgNk212X72pu5yChgLmygUpR7TaKNgUub9um2yWMUhTkgNSJKawXmgDjgAFxMHrX81bTKSU6SbC1oYnqsU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Two stories about 2FA (Two-factor authentication)]]></title><description><![CDATA[Years back… While I was doing some gardening, I was jumping over a row of bushes along the way. And my phone fell out of my pocket into the brush. I spent hours looking for it, and luckily I found it.]]></description><link>http://direct.ecency.com/writing/@solominer/two-stories-about-2fa-two-factor-authentication</link><guid isPermaLink="true">http://direct.ecency.com/writing/@solominer/two-stories-about-2fa-two-factor-authentication</guid><category><![CDATA[writing]]></category><dc:creator><![CDATA[solominer]]></dc:creator><pubDate>Mon, 06 Apr 2026 13:13:42 GMT</pubDate></item><item><title><![CDATA[Can AI hack?]]></title><description><![CDATA[Can AI Hack? Exploring the Intersection of Artificial Intelligence and Cybersecurity The question "Can AI hack?" has become increasingly relevant as artificial intelligence capabilities expand.]]></description><link>http://direct.ecency.com/hive-161155/@jackfro/can-ai-hack</link><guid isPermaLink="true">http://direct.ecency.com/hive-161155/@jackfro/can-ai-hack</guid><category><![CDATA[hive-161155]]></category><dc:creator><![CDATA[jackfro]]></dc:creator><pubDate>Thu, 08 Jan 2026 13:58:24 GMT</pubDate></item><item><title><![CDATA[🇵🇦 Hiring Alert: Cybersecurity Lead - Hola Moda Panama. Dec 12, 2025 ]]></title><description><![CDATA[My close LinkedIn contact, Oswaldo Bello, is looking for a Cybersecurity Lead to join his IT Team at Hola Moda. This is a critical role for the Panamanian market. It is not just about corporate governance;]]></description><link>http://direct.ecency.com/hive/@justinmora/hiring-alert-cybersecurity-lead-hola</link><guid isPermaLink="true">http://direct.ecency.com/hive/@justinmora/hiring-alert-cybersecurity-lead-hola</guid><category><![CDATA[hive]]></category><dc:creator><![CDATA[justinmora]]></dc:creator><pubDate>Fri, 12 Dec 2025 15:04:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVPgRCnRzbu6rj6tCWHWVCA9ZaKB4Zqp2KKzNi3eajgc8Gmc8brtUCsZ9axQW2Um3vie5cnVopEWQp2o4nSYFfGhQ96sh2NuY9edj7nejD46uMWhhpJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[First Byte - A Cybersecurity Guy’s Blog Adventure   [Introductory Post]]]></title><description><![CDATA[Welcome to the den where you get to hear tales on how I am building and securing the tech atmosphere in daytime and getting highly caffeinated to break into the systems at night. Officially, I am a DevSecOps]]></description><link>http://direct.ecency.com/hive-174578/@infosecvibes/first-byte-a-cybersecurity-guys-blog-adventure-introductory-post</link><guid isPermaLink="true">http://direct.ecency.com/hive-174578/@infosecvibes/first-byte-a-cybersecurity-guys-blog-adventure-introductory-post</guid><category><![CDATA[hive-174578]]></category><dc:creator><![CDATA[infosecvibes]]></dc:creator><pubDate>Sat, 09 Aug 2025 11:42:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/YpihifdXP4WNbGMdjw7e3DuhJWBvCw4SfuLZsrnJYHEpsqZFkiGGNCQ88fHMK2xcqm95NybWPg5orhfuotVxiDN1sKDhsHwkQ7CozYiRS5Dj5EFHqVCnXCb3eF5d7AqqBsjh8YSTf8JRVmQFczHKuhskQYuwCTbL9tRaoCLLFhyQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Threat Casting a Nation State Attack on Critical Infrastructure Scenario at CognectCon2025]]></title><description><![CDATA[During exercises at CognectCon2025 a number of cyberattack scenarios were discussed that highlighted the risks of cyber attackers leveraging cognitive vulnerabilities to cause major impacts to nation critical]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/threat-casting-a-nation-state-attack-on-critical-infrastructure-scenario-at-cognectcon2025</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/threat-casting-a-nation-state-attack-on-critical-infrastructure-scenario-at-cognectcon2025</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Sun, 22 Jun 2025 21:43:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/mXkfdToSwHxyVySZqAuuniiwqb3xsHoMciVkMMX5Y7ZKH7rhyt2QdPn3DsUf6AZjHGx8hmTfWTgPDTnhH9dDXq9zZXaBzJNY4nRMsv5L5?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[INTERPOL Takes Down a Infostealers Operation]]></title><description><![CDATA[Congrats to INTERPOL for taking down a major cyber information-theft infrastructure! Over 20 thousand Ips/domains were shuttered and 41 servers that contained more than 100GB of sensitive data was seized.]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/interpol-takes-down-a-infostealers-operation</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/interpol-takes-down-a-infostealers-operation</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Tue, 17 Jun 2025 20:05:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgs17AhwfjdYjmQiiEjHuNoPeo82oP443PSSvt6EKZtkZb2W5UjxzHgoTcbQma5WGQ167AREFVXSdKiMb5Ya?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Perfect Vulnerability for CISO Ultra Reliable Systems]]></title><description><![CDATA[A “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recently discovered cybersecurity vulnerability CVE-2024–20418 is remote,]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/perfect-vulnerability-for-ciso-ultra-reliable-systems</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/perfect-vulnerability-for-ciso-ultra-reliable-systems</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 08 Nov 2024 22:04:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/62PdCouTvNPDEhvvuLr4dD1Yw8onfsPL3PQx2jsHrdNqgPQt49xB7rt8u6N26pf4t6zzVwNux9JDZykBa5tCozuiLAh5Ce85pmqDbMdEo2ZYEYN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA["Russia's Cyber Militia: Investigation and Legal Challenges"]]></title><description><![CDATA[Cybercrime, Investigation, Stroganov Group, Flint, Legal Proceedings, Information Security, Organized Crime, Cybersecurity, Criminal Case, Prosecutor. Title: Tags: #OSINT #criminal_activity #cybercrime]]></description><link>http://direct.ecency.com/cybercrime/@peertube1337/russia-s-cyber-militia-investigation</link><guid isPermaLink="true">http://direct.ecency.com/cybercrime/@peertube1337/russia-s-cyber-militia-investigation</guid><category><![CDATA[cybercrime]]></category><dc:creator><![CDATA[peertube1337]]></dc:creator><pubDate>Mon, 11 Mar 2024 22:26:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvGBHDnRaj2z6FsL6XEQR3pnqa26GnVs77V1rCTX9QXwJQ7hkkHNdHahXWau5KPMRCeKDpZMVqzehzWKqhBVVET7H49Ccek9SkYiDmYa?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Tools and Techniques for Cognitive Security]]></title><description><![CDATA[CogSec (Cognitive Security) Collaborative 1. Tools and Techniques for Cognitive Security Tools and Techniques for Cognitive Security by SJ Terp & Roger Johnstone CanSecWest, March 18th 2020 2. Who]]></description><link>http://direct.ecency.com/cogsec/@aagabriel/tools-and-techniques-for-cognitive-security</link><guid isPermaLink="true">http://direct.ecency.com/cogsec/@aagabriel/tools-and-techniques-for-cognitive-security</guid><category><![CDATA[cogsec]]></category><dc:creator><![CDATA[aagabriel]]></dc:creator><pubDate>Sat, 18 Nov 2023 18:52:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/BgxWBRxjvNho1d5owNvLc9kLkZETgqoQLu9zcBbNBbDDEp9W4DbuZJuew7zRnZihikeXYJMpc7f93etrw6E1vvL1Zggsb1YY5X1sYvmsBCTUiMXcCAEr4oGvYXJC126kuSehfBr3r1TuF6gxg7Dk54oGSz2ydZVoHjWL3f5anuYLTok?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[National Cybersecurity Plan Fails to Address Ransomware]]></title><description><![CDATA[The US National Cybersecurity Strategy Implementation Plan fails to address ransomware. There is a real opportunity for the government to make significant progress in crushing the growing scourge of ransomware]]></description><link>http://direct.ecency.com/hive-163521/@mrosenquist/national-cybersecurity-plan-fails-to-address-ransomware</link><guid isPermaLink="true">http://direct.ecency.com/hive-163521/@mrosenquist/national-cybersecurity-plan-fails-to-address-ransomware</guid><category><![CDATA[hive-163521]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Tue, 18 Jul 2023 15:38:03 GMT</pubDate></item><item><title><![CDATA[Taking review of my IT information security upskilling, soon to take my second tim ...]]></title><description><![CDATA[... e security+ certification. #dbuzz #hive #cryptography #infosec]]></description><link>http://direct.ecency.com/hive-193084/@ruldan20/dc9qldu8vmfjooulft29vz</link><guid isPermaLink="true">http://direct.ecency.com/hive-193084/@ruldan20/dc9qldu8vmfjooulft29vz</guid><category><![CDATA[hive-193084]]></category><dc:creator><![CDATA[ruldan20]]></dc:creator><pubDate>Tue, 18 Jul 2023 11:53:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/6gUbcKN7Uxen7Pvi2PjJek8M92PGvq4rXZBiZWFnMSjbPh7vtGWakn3GHLnsaD8nP1m4Gv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Using WAX permissions to create a custom Warsaken claim-only keypair]]></title><description><![CDATA[Within the world of cybersecurity, one of the key controls that we can employ to protect ourselves is Least Privilege; this principle dictates that we must perform activities with the minimal permissions]]></description><link>http://direct.ecency.com/wax/@scetrov/using-wax-permissions-to-create-a-custom-warsaken-claim-only-keypair</link><guid isPermaLink="true">http://direct.ecency.com/wax/@scetrov/using-wax-permissions-to-create-a-custom-warsaken-claim-only-keypair</guid><category><![CDATA[wax]]></category><dc:creator><![CDATA[scetrov]]></dc:creator><pubDate>Thu, 22 Jun 2023 17:23:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/26uUsAjKTsXCDw7zixZR182JbFKvgzJ9YwsFpTVcRaGCmsqhA1unTgprEW11cKd3ZSQ1YBym7h7c6JQdJzQNJxXgj6RPevTHmdkv2k2znkEqgKondzgdmQNDpQPhPW36kMxB5wdFxKf1VGpxTm8GghuZ3UukeU2p7otSvA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[AIGEN] Official OpenAI's GPT4: Warning to All Hive StakeHolders and witnesses. Quantum Blockchain Innovation Stack;Part 2:]]></title><description><![CDATA[Quantum-Resistant Cryptography a. Post-quantum cryptography algorithms Post-quantum cryptography refers to cryptographic algorithms designed to be secure against attacks from both classical and quantum]]></description><link>http://direct.ecency.com/hive/@gray00/aigen-official-openai-s-gpt4-warning-to-all-hive-stakeholders-and-witnesses-quantum-blockchain-innovation-stack-part-2</link><guid isPermaLink="true">http://direct.ecency.com/hive/@gray00/aigen-official-openai-s-gpt4-warning-to-all-hive-stakeholders-and-witnesses-quantum-blockchain-innovation-stack-part-2</guid><category><![CDATA[hive]]></category><dc:creator><![CDATA[gray00]]></dc:creator><pubDate>Wed, 15 Mar 2023 17:21:33 GMT</pubDate></item><item><title><![CDATA[Crucial conversations: Overcoming the 5 Areas Where CISOs Tend to Struggle]]></title><description><![CDATA[I had a great conversation with Marco Ciappelli and Sean Martin from ITSPmagazine Podcast discussing the mistakes and hard-learned lessons in cybersecurity! They are such characters! A fun and informative]]></description><link>http://direct.ecency.com/hive-163521/@mrosenquist/crucial-conversations-overcoming-the-5-areas-where-cisos-tend-to-struggle</link><guid isPermaLink="true">http://direct.ecency.com/hive-163521/@mrosenquist/crucial-conversations-overcoming-the-5-areas-where-cisos-tend-to-struggle</guid><category><![CDATA[hive-163521]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 02 Mar 2023 19:30:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP31Vf2v2bYzp1RwwTWa6rgBg4sCSDscKxYk1fBcTjvovC9isX9g1Y3JY4FDJXRonmCSvrxQYiC11BLpiBzXGPP7qppGPJCKfeShkz2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Top 5 cyber security breaches of the last 10 year’s]]></title><description><![CDATA[Well folks, it's that time of year again. Time to reflect on the past decade and take a look at the top 5 cybersecurity breaches that had us all on the edge of our seats. And boy, did we have some doozies]]></description><link>http://direct.ecency.com/infosec/@doifeellucky/the-top-5-cyber-security-breaches-of-the-last-10-years</link><guid isPermaLink="true">http://direct.ecency.com/infosec/@doifeellucky/the-top-5-cyber-security-breaches-of-the-last-10-years</guid><category><![CDATA[infosec]]></category><dc:creator><![CDATA[doifeellucky]]></dc:creator><pubDate>Mon, 16 Jan 2023 20:33:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/YpihifdXP4WNbGMdjw7e3DuhJWBvCw4SfuLZsrnJYHEpsqZFkiGGNCQ1C8D9NbnfU8xnMxU3bXA7XxFHLEWY1qbktAvJLNLK6NMVh3sZC1inYJgJWuKrzLjTFduUqqhwv8hbLJzAAz8UX6MxEn1yeRLBJAMWoyVMGZnFgt2xfnpE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Lastpass hack, a password manager disaster…]]></title><description><![CDATA[Source ![source Pixabay What a shitshow… We’re used to drop wise information publication when it comes to infosec glitches. But I must admit I had other expectations from a firm specializing in one of]]></description><link>http://direct.ecency.com/security/@doifeellucky/lastpass-hack-a-password-manager-disaster</link><guid isPermaLink="true">http://direct.ecency.com/security/@doifeellucky/lastpass-hack-a-password-manager-disaster</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[doifeellucky]]></dc:creator><pubDate>Tue, 10 Jan 2023 08:23:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/3RTd4iuWD6NUeJEn5AVrJUoyatFqBqfcCJi1N7UixR4g2KPKN7w8NpZJXr6pbxLYYnn9DDVpNTN4SFYuFCvtptKhsAm1md5nV6DgZmsq3uAxDobJq9khE67kQ5oGetqThFRwCFCaG4FZ8L11ZKTih97V9HgDuzNGkKkq3QZ25a9cia?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Building Minimalist Productivity Setup]]></title><description><![CDATA[A somewhat minimalist approach to technology Recently, I've been sharing a lot about data and OPSEC (Operation Security). In layman terms, OPSEC basically helps to secure yourself from potential threats.]]></description><link>http://direct.ecency.com/hive-194848/@macchiata/building-minimalist-productivity-setup</link><guid isPermaLink="true">http://direct.ecency.com/hive-194848/@macchiata/building-minimalist-productivity-setup</guid><category><![CDATA[hive-194848]]></category><dc:creator><![CDATA[macchiata]]></dc:creator><pubDate>Sun, 25 Sep 2022 15:27:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/FUkUE5bzkAZT3HzV5tJDiU2ik81PCd4JCyhWnRcDN8XJsVFY3UNB8DCYS8qcNG2wK1Q39JPVXtqKTHxspMXesy3Bg3qUqEtjGq7DnrN2XnV1ZFhn9VBTM9epX65ecs3FjEQtgw5Ev4rzRzgfScUKBCSk6wWPvT1XYsH8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Do you care about your data?]]></title><description><![CDATA[Data is the new currency. And if a product is free, you are the product; A phrase coined by a world-famous American sculptor and video artist Richard Serra in 1973. These days, that phrase is everywhere]]></description><link>http://direct.ecency.com/hive-196233/@macchiata/do-you-care-about-your-data</link><guid isPermaLink="true">http://direct.ecency.com/hive-196233/@macchiata/do-you-care-about-your-data</guid><category><![CDATA[hive-196233]]></category><dc:creator><![CDATA[macchiata]]></dc:creator><pubDate>Fri, 23 Sep 2022 12:51:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/26uUsAjKTsXCDw7zixZR182JbFKvgzJ9YwsFpTVcRaGCmsqhA1unTgpqwjwbZ6qMYiUkgWyQujWsMotyPJZ2HTvtXCjoYSc1zrn2A5SFQT1rxcu2dHYKJoEPHwC9BhD3JYJsUfE18AG1xc4da3yAD5fhJ8yAZMqcaZWcZt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cyber security : a necessary tool for modern-day business]]></title><description><![CDATA[Advancement in information and communication technology has adversely affects the operation and process of businesses, education, military etc. These domains now thrive in the cyber space as opposed to]]></description><link>http://direct.ecency.com/hive-145844/@lukaz364/cyber-security-a-necessary-tool-for-modern-day-business</link><guid isPermaLink="true">http://direct.ecency.com/hive-145844/@lukaz364/cyber-security-a-necessary-tool-for-modern-day-business</guid><category><![CDATA[hive-145844]]></category><dc:creator><![CDATA[lukaz364]]></dc:creator><pubDate>Sun, 26 Jun 2022 19:00:09 GMT</pubDate></item></channel></rss>