<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 13 Apr 2026 15:29:48 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/malwareattack/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Watch Out For This Wormable Malware Spreading Via WhatsApp]]></title><description><![CDATA[Heads up WhatsApp users! A new wormable malware campaign is in the wild that targets WhatsApp users. The malware spreads via WhatsApp supposedly to expand an adware campaign. Malware Spreading Via WhatsApp]]></description><link>http://direct.ecency.com/androidmalware/@twr/watchoutforthiswormablemalwarespreadingviawhatsapp-af5hvttpa0wm0jme9htw</link><guid isPermaLink="true">http://direct.ecency.com/androidmalware/@twr/watchoutforthiswormablemalwarespreadingviawhatsapp-af5hvttpa0wm0jme9htw</guid><category><![CDATA[androidmalware]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 27 Jan 2021 15:20:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/3HaJVw3AYyXBMfv2WPWWJdHwQGsHXsdjdPAXMmN2EtsWmfBWDxSrLzFxCGQQSTPweuTy1Z4hm9HpLnaAvi3n4F1VsxSf2mF2bofwGpN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Malvuln - A Project Dedicated To Highlighting Vulnerabilities Within Malware]]></title><description><![CDATA[Dubbed Malvuln, a new project is up and running that aims at cataloging vulnerabilities in malware code thus turning the tide on the bad guys!. About Malvuln Project Security researcher John Page (with]]></description><link>http://direct.ecency.com/bugs/@twr/malvuln-aprojectdedicatedtohighlightingvulnerabilitieswithinmalware-t8uqkecb0e3l9kazsug2</link><guid isPermaLink="true">http://direct.ecency.com/bugs/@twr/malvuln-aprojectdedicatedtohighlightingvulnerabilitieswithinmalware-t8uqkecb0e3l9kazsug2</guid><category><![CDATA[bugs]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 19 Jan 2021 14:25:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgsZzNugMsWc8TEZPbkgbExfggncdWXqvG5JDbe6v2jdWYw9wAuSHUeZgsAkgSGrfaFnLiZnAcT6t5sVycYv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Capcom Ransomware Attack Update: Vendors Confirmed Compromise Of Data]]></title><description><![CDATA[Earlier this month, the Japanese gaming firm Capcom suffered a cybersecurity incident reports hinted towards a ransomware attack. After two weeks, Capcom has confirmed that the culprit was from Ragnar]]></description><link>http://direct.ecency.com/cyberattack/@twr/capcomransomwareattackupdatevendorsconfirmedcompromiseofdata-1k4rhmjd8ux54ahwa4to</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/capcomransomwareattackupdatevendorsconfirmedcompromiseofdata-1k4rhmjd8ux54ahwa4to</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 21 Nov 2020 15:15:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/TZjG7hXReeVrGWPFDdJYx2UdTqopUBe2Lp13Qo1CsZ5M1hwXVj5L2G7TKD8oAaMZeDDXHqg46Y6RF1ftRbFcbqJx4VFuRPMgvRT3m8cW4CJgfBDA3j3K1NxWs6ton1i2M3No3f5hSr7sbC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Web Hosting Provider Managed.com Suffered REvil Ransomware Attack]]></title><description><![CDATA[As ransomware attacks are on a rise, we see a continuous increase in the victim list. The recent ransomware attack has hit the web hosting provider Managed.com. The service reportedly went down after the]]></description><link>http://direct.ecency.com/cyberattack/@twr/webhostingprovidermanagedcomsufferedrevilransomwareattack-2qf6viy5k7gq2crhectl</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/webhostingprovidermanagedcomsufferedrevilransomwareattack-2qf6viy5k7gq2crhectl</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 20 Nov 2020 15:35:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjW9xF8C5uEukYkbcUJFrB2NYTQmKsPZZjiS3BqpH8KU8y2iKe4jn6kiMRmJB8PUE6ahD4NwerjDKJiQ2985bPNHyZDtAwjQxR9PxdpzWUjzn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Beverage Giant Campari Went Offline Following Ransomware Attack]]></title><description><![CDATA[Italian beverage giant Campari turns out to be the latest victim of a cybersecurity incident. Campari has itself confirmed to have suffered a malware attack, though reports hint at the Campari incident]]></description><link>http://direct.ecency.com/cyberattack/@twr/beveragegiantcampariwentofflinefollowingransomwareattack-1pafhltudkvltwhfjmo7</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/beveragegiantcampariwentofflinefollowingransomwareattack-1pafhltudkvltwhfjmo7</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 09 Nov 2020 15:15:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/X37EMQ9WSwsNuKMjTPzqrTVdzWyJsSYQeeW5hs5MpYqS57uqhf2fWjowfP4xA9pj7uL2wPbA6WCX3UupgRnugyLrYXPTHG99J2XR8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Capcom Disclosed Cyberattack – Ransomware Involvement Suspected]]></title><description><![CDATA[Japanese game developer Capcom has suffered a cyberattack, potentially losing data to attackers. The firm has possibly fallen prey to the Ragnar Locker ransomware. Capcom Suffered Cyberattack Reportedly,]]></description><link>http://direct.ecency.com/cyberattack/@twr/capcomdisclosedcyberattackransomwareinvolvementsuspected-4ew9xost6vad020blhq0</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/capcomdisclosedcyberattackransomwareinvolvementsuspected-4ew9xost6vad020blhq0</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 07 Nov 2020 14:10:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/TZjG7hXReeVrGWPFDdJYx2UdTqopUBe2Lp13Qo1CsZ5M1hwXVj5L2G7TKD8oAaMZeDDXHqg46Y6RF1ftRbFcbqJx4VFuRPMgvRT3m8cW4CJgfBDA3j3K1NxWs6ton1i2M3No3f5hSr7sbC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Canadian Firm Canpar Express Becomes Ransomware Attack Victim]]></title><description><![CDATA[A Canadian shipping company, Canpar, has emerged as the latest prey to a ransomware attack. The incident caused huge business disruption. Canpar Suffered Ransomware Attack Reportedly, the Canadian shipping]]></description><link>http://direct.ecency.com/cyberattack/@twr/canadianfirmcanparexpressbecomesransomwareattackvictim-sv9o2qdjdt</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/canadianfirmcanparexpressbecomesransomwareattackvictim-sv9o2qdjdt</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 01 Sep 2020 11:20:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig8o3SwLx3HQZ8RLLUH7PcPxYo1ZxDPJ1xa2hLvm1wJtWGMpEghR9gJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[US UK Cybersecurity Agencies Warn Of QSnatch Malware Actively Exploiting QNAP Devices]]></title><description><![CDATA[Recently, the US and UK cybersecurity agencies have issued a joint security alert about an ongoing malware attack. The QSnatch malware is actively targeting QNAP devices and has infected thousands of them]]></description><link>http://direct.ecency.com/cyberattack/@twr/usukcybersecurityagencieswarnofqsnatchmalwareactivelyexploitingqnapdevices-0vl85lhf05</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/usukcybersecurityagencieswarnofqsnatchmalwareactivelyexploitingqnapdevices-0vl85lhf05</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 03 Aug 2020 02:40:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/3HaJVw3AYyXBMfv2WPWWJdHwQGsHXsdjdPAXMmN2EtsWmfBWDxSrLzFxCGQQSTPweuTy1Z4hm9HpLnaAvi3n4F1VsxSf2mF2bofwGpN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Try2Cry Ransomware Targets Windows Systems As It Spreads Via USB Flash Drives]]></title><description><![CDATA[Heads up Windows users! Be careful while connecting random USB flash drives to your Windows PCs as the new Try2Cry ransomware is around. The ransomware bears wormable capabilities to spread laterally via]]></description><link>http://direct.ecency.com/cyberattack/@twr/try2cryransomwaretargetswindowssystemsasitspreadsviausbflashdrives-676a8rurtp</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/try2cryransomwaretargetswindowssystemsasitspreadsviausbflashdrives-676a8rurtp</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 07 Jul 2020 20:10:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/MG5aEqKFcQi8KqD2wHMZMi2fpbjkaL86Q4MBEhpiajpZfymNq2i5rAYcVK7tbzsmV8SfsBhRceReDTmBgrTC3XQCYu39t8TNv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Microsoft Warns Users Of Excel Malware Campaign Asking Users To Solve CAPTCHA]]></title><description><![CDATA[Heads up Microsoft users! A new malware campaign is in the wild that exploits Microsoft Excel. It also requires the victim to solve a CAPTCHA for the malware to execute. Microsoft Excel Malware Campaign]]></description><link>http://direct.ecency.com/malware/@twr/microsoftwarnsusersofexcelmalwarecampaignaskinguserstosolvecaptcha-qlzk5izgzq</link><guid isPermaLink="true">http://direct.ecency.com/malware/@twr/microsoftwarnsusersofexcelmalwarecampaignaskinguserstosolvecaptcha-qlzk5izgzq</guid><category><![CDATA[malware]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 24 Jun 2020 18:30:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pL5QgN8TiSPmncCKgPK5zu2cMNAwZR5tYwFwt5JjvUJSL4VwHqGAhzFe84JZ8EFtFYCAmtqqH88qXv2pjHgjJxZFiKv8ZMibjPy8TjM8LmxedL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Microsoft Warns Of PonyFinal Ransomware Attacks Active In The Wild]]></title><description><![CDATA[Microsoft alerted all its users to stay vigilant with regard to PonyFinal ransomware attacks. Since the ransomware attacks are active in the wild, Microsoft has urged users to pay attention to its deployment.]]></description><link>http://direct.ecency.com/cyberattack/@twr/microsoftwarnsofponyfinalransomwareattacksactiveinthewild-z7kkssgm9o</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/microsoftwarnsofponyfinalransomwareattacksactiveinthewild-z7kkssgm9o</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 01 Jun 2020 03:00:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNbgWqLjvdaPqD9RmZVAY3F45qZteHQajVXsWerTgBJWnAJZPGbVp4PwXAJWohc5P95dRGKm3wKtCzXVBYGBD7B4gigN82dx3Xsy3MFZptNUDC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Pitney Bowes Suffered Second Ransomware Attack Within A Year]]></title><description><![CDATA[As the world is in a standstill and people are relying more on delivery services, the threat actors are targeting this niche now. However, the recent victim, Pitney Bowes, isn’t a new one. Rather this]]></description><link>http://direct.ecency.com/customer/@twr/pitneybowessufferedsecondransomwareattackwithinayear-uqfswmh20w</link><guid isPermaLink="true">http://direct.ecency.com/customer/@twr/pitneybowessufferedsecondransomwareattackwithinayear-uqfswmh20w</guid><category><![CDATA[customer]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 17 May 2020 18:15:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUcsNv7tRtPzCvhDgVX1MFsfrds3HPqqSviGAFfDEyJcXaEEA3yuJA6Bx4cS3wqmmrkYjWqJCiX78e8ShRset4S1Ae?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[POWER-SUPPLaY Attack Steals Data From Power Supplies Of Air-Gapped Systems]]></title><description><![CDATA[Once again, a cybersecurity threat has surfaced online for air-gapped systems. This time, it is the POWER-SUPPLaY Attack that exploits the power supply of the target devices to steal data. Researchers]]></description><link>http://direct.ecency.com/air-gappedmalware/@twr/power-supplayattackstealsdatafrompowersuppliesofair-gappedsystems-lgg3zzvfr7</link><guid isPermaLink="true">http://direct.ecency.com/air-gappedmalware/@twr/power-supplayattackstealsdatafrompowersuppliesofair-gappedsystems-lgg3zzvfr7</guid><category><![CDATA[air-gappedmalware]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 11 May 2020 00:00:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgsZzNugMsWc8TEZPbkgbExfggncdWXqvG5JDbe6v2jdWYw9wAuSHUeZgsAkgRjz9JsJtx1uJSLktfe4V8Wi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hackers Are Bundling Cryptominer With a Seemingly Legit Zoom Installer on Unofficial Websites]]></title><description><![CDATA[Recently, Zoom has remained present in the news world owing to numerous security issues with their app. While they managed to address most of them, they couldn’t stop the hackers from exploiting the app’s]]></description><link>http://direct.ecency.com/cryptominer/@twr/hackersarebundlingcryptominerwithaseeminglylegitzoominstalleronunofficialwebsites-mapcg8bogk</link><guid isPermaLink="true">http://direct.ecency.com/cryptominer/@twr/hackersarebundlingcryptominerwithaseeminglylegitzoominstalleronunofficialwebsites-mapcg8bogk</guid><category><![CDATA[cryptominer]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 08 Apr 2020 10:05:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUcsNv7tRtPzCvhDgVX1MFsfrds3HPqqSviGAFfDEyJcXaEEA3yuJA6Bx4cS4D2hbbhqdDfwx666WpMLERYaQgf33k?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[PwndLocker Transforms Into ProLock Ransomware Barring Free Decryption Tools]]></title><description><![CDATA[PwndLocker ransomware recently emerged as ransomware threatening businesses with huge ransom demands. However, soon after its emergence, the cybersecurity community devised a way to break its encryption]]></description><link>http://direct.ecency.com/cyberattack/@twr/pwndlockertransformsintoprolockransomwarebarringfreedecryptiontools-ma87ywr4z2</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/pwndlockertransformsintoprolockransomwarebarringfreedecryptiontools-ma87ywr4z2</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 25 Mar 2020 01:05:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/NTy4GV6ooFRoEZZwafcCKYTexywaQ4aC7dqR3p4NAjoCobVxqv4zDXig9vxQSyoesQf8UUyYY1jiDwT5z3ureLtPeL5aP9VN2p8932nHjyt6vH1xc8afwzvQLDYNegbc2DfbPtwv1obT98mGHzV5zHfpyNpg7sb22ZeiVSL6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[PwndLocker Ransomware Aims Big With High Ransom Demands]]></title><description><![CDATA[Considering the growing money-making potential of ransomware, more and more criminals are stepping into the niche. Recently, another ransomware has surfaced online that is active in the wild. Dubbed PwndLocker]]></description><link>http://direct.ecency.com/cyberattack/@twr/pwndlockerransomwareaimsbigwithhighransomdemands-bbmsb38lfh</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/pwndlockerransomwareaimsbigwithhighransomdemands-bbmsb38lfh</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 05 Mar 2020 13:55:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP3vrQovkik6e66T8hnLhLPdqV7nVJzeRr5Sdvch7efXk337Lsrya9rEqtmuZp4XxZJBiip4Hk55phqrm2g5WShxkCHdks6mJpLYneA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[BRIGHTNESS Attack Can Takeover Air-Gapped Systems To Steal Data]]></title><description><![CDATA[Researchers have devised a new strategy to target air-gapped systems. Dubbed BRIGHTNESS, the attack method exploits the screen brightness settings in air-gapped systems to pilfer sensitive data. BRIGHTNESS]]></description><link>http://direct.ecency.com/air-gappedmalware/@twr/brightnessattackcantakeoverair-gappedsystemstostealdata-pj62wdywyi</link><guid isPermaLink="true">http://direct.ecency.com/air-gappedmalware/@twr/brightnessattackcantakeoverair-gappedsystemstostealdata-pj62wdywyi</guid><category><![CDATA[air-gappedmalware]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 11 Feb 2020 17:00:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/B69zEhWZA8UCiEm3eiMELoBm7j2wyGV99aq2zeonUKwxQ7XMzBj6oDizcizJTMWGEJa2DSXLuqbDi4gFuvDNGMWsg334yezr74hBKUBg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[New York Airport Paid Ransomware Demand After Suffering Sodinokibi Attack]]></title><description><![CDATA[The GandCrab’s replacement Sodinokibi has been into the news a lot recently. The evil (or REvil) ransomware has hit numerous high-profile targets. And now, the latest Sodinikobi attack has affected systems]]></description><link>http://direct.ecency.com/albanyinternationalairport/@twr/newyorkairportpaidransomwaredemandaftersufferingsodinokibiattack-1wh66h1mxz</link><guid isPermaLink="true">http://direct.ecency.com/albanyinternationalairport/@twr/newyorkairportpaidransomwaredemandaftersufferingsodinokibiattack-1wh66h1mxz</guid><category><![CDATA[albanyinternationalairport]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 13 Jan 2020 17:05:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy6zvChRH7j9QCxXa7kn1JGAzPjCpQux5DQVYAwJRDprBEfycXTwQJG6DTXyqAeBEX6vwaHbe2dDeV4kHCwbrVjxSbk1FXv5qZisfk1Hv6u5DUDzQsD9TqurrA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[One More Threat For Organizations – The Ako Ransomware]]></title><description><![CDATA[After Sodinokibi, DeathRansom, Clop, and SNAKE, now comes the Ako ransomware. Like most others, this malware also targets businesses and aims to spread over entire networks instead of individual systems.]]></description><link>http://direct.ecency.com/cyberattack/@twr/onemorethreatfororganizationstheakoransomware-gg3tvjt2w8</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/onemorethreatfororganizationstheakoransomware-gg3tvjt2w8</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 12 Jan 2020 23:20:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP3vrQovkik6e66T8hnLhLPdqV7nVJzeRr5Sdvch7efXk337Lsrya9rEqtmuZp4XxZHeN2jiAbpZMvwS3oqdwRbj6uMj9wuiMZ55ufU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[SNAKE Ransomware – A New Threat For Businesses In Town]]></title><description><![CDATA[The departure of GandCrab has triggered the arrival of new ransomware variants in the realm of cybersecurity. Recently, researchers have spotted SNAKE ransomware that poses a serious threat to enterprise]]></description><link>http://direct.ecency.com/cyberattack/@twr/snakeransomwareanewthreatforbusinessesintown-8z5lczfs19</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/snakeransomwareanewthreatforbusinessesintown-8z5lczfs19</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 12 Jan 2020 14:00:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvKvh668FyFDthV4M117w2aub16wmxRSCfcc9yeY4MF4gwzJzjVahL4L6oXD1tV3dTqV8godcKqTB74WvfvYedFp6wqdhozfjhUr3F6E?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>