<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 27 Apr 2026 01:27:55 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/malwarecampaign/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Watch Out For This Wormable Malware Spreading Via WhatsApp]]></title><description><![CDATA[Heads up WhatsApp users! A new wormable malware campaign is in the wild that targets WhatsApp users. The malware spreads via WhatsApp supposedly to expand an adware campaign. Malware Spreading Via WhatsApp]]></description><link>http://direct.ecency.com/androidmalware/@twr/watchoutforthiswormablemalwarespreadingviawhatsapp-af5hvttpa0wm0jme9htw</link><guid isPermaLink="true">http://direct.ecency.com/androidmalware/@twr/watchoutforthiswormablemalwarespreadingviawhatsapp-af5hvttpa0wm0jme9htw</guid><category><![CDATA[androidmalware]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 27 Jan 2021 15:20:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/3HaJVw3AYyXBMfv2WPWWJdHwQGsHXsdjdPAXMmN2EtsWmfBWDxSrLzFxCGQQSTPweuTy1Z4hm9HpLnaAvi3n4F1VsxSf2mF2bofwGpN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[US UK Cybersecurity Agencies Warn Of QSnatch Malware Actively Exploiting QNAP Devices]]></title><description><![CDATA[Recently, the US and UK cybersecurity agencies have issued a joint security alert about an ongoing malware attack. The QSnatch malware is actively targeting QNAP devices and has infected thousands of them]]></description><link>http://direct.ecency.com/cyberattack/@twr/usukcybersecurityagencieswarnofqsnatchmalwareactivelyexploitingqnapdevices-0vl85lhf05</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/usukcybersecurityagencieswarnofqsnatchmalwareactivelyexploitingqnapdevices-0vl85lhf05</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 03 Aug 2020 02:40:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/3HaJVw3AYyXBMfv2WPWWJdHwQGsHXsdjdPAXMmN2EtsWmfBWDxSrLzFxCGQQSTPweuTy1Z4hm9HpLnaAvi3n4F1VsxSf2mF2bofwGpN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Microsoft Warns Users Of Excel Malware Campaign Asking Users To Solve CAPTCHA]]></title><description><![CDATA[Heads up Microsoft users! A new malware campaign is in the wild that exploits Microsoft Excel. It also requires the victim to solve a CAPTCHA for the malware to execute. Microsoft Excel Malware Campaign]]></description><link>http://direct.ecency.com/malware/@twr/microsoftwarnsusersofexcelmalwarecampaignaskinguserstosolvecaptcha-qlzk5izgzq</link><guid isPermaLink="true">http://direct.ecency.com/malware/@twr/microsoftwarnsusersofexcelmalwarecampaignaskinguserstosolvecaptcha-qlzk5izgzq</guid><category><![CDATA[malware]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 24 Jun 2020 18:30:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pL5QgN8TiSPmncCKgPK5zu2cMNAwZR5tYwFwt5JjvUJSL4VwHqGAhzFe84JZ8EFtFYCAmtqqH88qXv2pjHgjJxZFiKv8ZMibjPy8TjM8LmxedL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Microsoft Warns Of PonyFinal Ransomware Attacks Active In The Wild]]></title><description><![CDATA[Microsoft alerted all its users to stay vigilant with regard to PonyFinal ransomware attacks. Since the ransomware attacks are active in the wild, Microsoft has urged users to pay attention to its deployment.]]></description><link>http://direct.ecency.com/cyberattack/@twr/microsoftwarnsofponyfinalransomwareattacksactiveinthewild-z7kkssgm9o</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/microsoftwarnsofponyfinalransomwareattacksactiveinthewild-z7kkssgm9o</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 01 Jun 2020 03:00:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNbgWqLjvdaPqD9RmZVAY3F45qZteHQajVXsWerTgBJWnAJZPGbVp4PwXAJWohc5P95dRGKm3wKtCzXVBYGBD7B4gigN82dx3Xsy3MFZptNUDC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hackers Are Bundling Cryptominer With a Seemingly Legit Zoom Installer on Unofficial Websites]]></title><description><![CDATA[Recently, Zoom has remained present in the news world owing to numerous security issues with their app. While they managed to address most of them, they couldn’t stop the hackers from exploiting the app’s]]></description><link>http://direct.ecency.com/cryptominer/@twr/hackersarebundlingcryptominerwithaseeminglylegitzoominstalleronunofficialwebsites-mapcg8bogk</link><guid isPermaLink="true">http://direct.ecency.com/cryptominer/@twr/hackersarebundlingcryptominerwithaseeminglylegitzoominstalleronunofficialwebsites-mapcg8bogk</guid><category><![CDATA[cryptominer]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 08 Apr 2020 10:05:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUcsNv7tRtPzCvhDgVX1MFsfrds3HPqqSviGAFfDEyJcXaEEA3yuJA6Bx4cS4D2hbbhqdDfwx666WpMLERYaQgf33k?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[PwndLocker Transforms Into ProLock Ransomware Barring Free Decryption Tools]]></title><description><![CDATA[PwndLocker ransomware recently emerged as ransomware threatening businesses with huge ransom demands. However, soon after its emergence, the cybersecurity community devised a way to break its encryption]]></description><link>http://direct.ecency.com/cyberattack/@twr/pwndlockertransformsintoprolockransomwarebarringfreedecryptiontools-ma87ywr4z2</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/pwndlockertransformsintoprolockransomwarebarringfreedecryptiontools-ma87ywr4z2</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 25 Mar 2020 01:05:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/NTy4GV6ooFRoEZZwafcCKYTexywaQ4aC7dqR3p4NAjoCobVxqv4zDXig9vxQSyoesQf8UUyYY1jiDwT5z3ureLtPeL5aP9VN2p8932nHjyt6vH1xc8afwzvQLDYNegbc2DfbPtwv1obT98mGHzV5zHfpyNpg7sb22ZeiVSL6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[PwndLocker Ransomware Aims Big With High Ransom Demands]]></title><description><![CDATA[Considering the growing money-making potential of ransomware, more and more criminals are stepping into the niche. Recently, another ransomware has surfaced online that is active in the wild. Dubbed PwndLocker]]></description><link>http://direct.ecency.com/cyberattack/@twr/pwndlockerransomwareaimsbigwithhighransomdemands-bbmsb38lfh</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/pwndlockerransomwareaimsbigwithhighransomdemands-bbmsb38lfh</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 05 Mar 2020 13:55:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP3vrQovkik6e66T8hnLhLPdqV7nVJzeRr5Sdvch7efXk337Lsrya9rEqtmuZp4XxZJBiip4Hk55phqrm2g5WShxkCHdks6mJpLYneA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[One More Threat For Organizations – The Ako Ransomware]]></title><description><![CDATA[After Sodinokibi, DeathRansom, Clop, and SNAKE, now comes the Ako ransomware. Like most others, this malware also targets businesses and aims to spread over entire networks instead of individual systems.]]></description><link>http://direct.ecency.com/cyberattack/@twr/onemorethreatfororganizationstheakoransomware-gg3tvjt2w8</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/onemorethreatfororganizationstheakoransomware-gg3tvjt2w8</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 12 Jan 2020 23:20:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP3vrQovkik6e66T8hnLhLPdqV7nVJzeRr5Sdvch7efXk337Lsrya9rEqtmuZp4XxZHeN2jiAbpZMvwS3oqdwRbj6uMj9wuiMZ55ufU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[SNAKE Ransomware – A New Threat For Businesses In Town]]></title><description><![CDATA[The departure of GandCrab has triggered the arrival of new ransomware variants in the realm of cybersecurity. Recently, researchers have spotted SNAKE ransomware that poses a serious threat to enterprise]]></description><link>http://direct.ecency.com/cyberattack/@twr/snakeransomwareanewthreatforbusinessesintown-8z5lczfs19</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@twr/snakeransomwareanewthreatforbusinessesintown-8z5lczfs19</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 12 Jan 2020 14:00:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvKvh668FyFDthV4M117w2aub16wmxRSCfcc9yeY4MF4gwzJzjVahL4L6oXD1tV3dTqV8godcKqTB74WvfvYedFp6wqdhozfjhUr3F6E?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[IRS Issues Alert For Phishing Scam Targeting Taxpayers]]></title><description><![CDATA[Phishing scams are not always aimed at stealing users’ credentials. Rather the attackers also phish users to deliver malware and execute more malicious payloads. Recently, the IRS has also issued a similar]]></description><link>http://direct.ecency.com/emailphishing/@twr/irsissuesalertforphishingscamtargetingtaxpayers-gc37s2zj4x</link><guid isPermaLink="true">http://direct.ecency.com/emailphishing/@twr/irsissuesalertforphishingscamtargetingtaxpayers-gc37s2zj4x</guid><category><![CDATA[emailphishing]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 27 Aug 2019 02:20:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/23KQwnti57stzCcFhWj7wg3tnqxkPok8chkAcLG9M8v5Xxzbtm74fA9Rx2S6iSbj2oGxS3o2DpSfESnLyvKMJrRnhZJPXvn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[IRS Issues Alert For Phishing Scam Targeting Taxpayers]]></title><description><![CDATA[Phishing scams are not always aimed at stealing users’ credentials. Rather the attackers also phish users to deliver malware and execute more malicious payloads. Recently, the IRS has also issued a similar]]></description><link>http://direct.ecency.com/emailphishing/@twr/irsissuesalertforphishingscamtargetingtaxpayers-lxi52xta8v</link><guid isPermaLink="true">http://direct.ecency.com/emailphishing/@twr/irsissuesalertforphishingscamtargetingtaxpayers-lxi52xta8v</guid><category><![CDATA[emailphishing]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 27 Aug 2019 00:25:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/23KQwnti57stzCcFhWj7wg3tnqxkPok8chkAcLG9M8v5Xxzbtm74fA9Rx2S6iSbj2oGxS3o2DpSfESnLyvKMJrRnhZJPXvn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[IRS Issues Alert For Phishing Scam Targeting Taxpayers]]></title><description><![CDATA[Phishing scams are not always aimed at stealing users’ credentials. Rather the attackers also phish users to deliver malware and execute more malicious payloads. Recently, the IRS has also issued a similar]]></description><link>http://direct.ecency.com/emailphishing/@twr/irsissuesalertforphishingscamtargetingtaxpayers-e2vb65cdai</link><guid isPermaLink="true">http://direct.ecency.com/emailphishing/@twr/irsissuesalertforphishingscamtargetingtaxpayers-e2vb65cdai</guid><category><![CDATA[emailphishing]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 27 Aug 2019 00:05:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/23KQwnti57stzCcFhWj7wg3tnqxkPok8chkAcLG9M8v5Xxzbtm74fA9Rx2S6iSbj2oGxS3o2DpSfESnLyvKMJrRnhZJPXvn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hackers Can Manipulate Twitter Cards To Phish Twitter Users]]></title><description><![CDATA[Twitter seems to suffer a crucial design flaw that threat actors can exploit to target users. As discovered, the Twitter Cards feature seems vulnerable to manual manipulation by hackers. Exploiting the]]></description><link>http://direct.ecency.com/fakenews/@twr/hackerscanmanipulatetwittercardstophishtwitterusers-z3270uasiv</link><guid isPermaLink="true">http://direct.ecency.com/fakenews/@twr/hackerscanmanipulatetwittercardstophishtwitterusers-z3270uasiv</guid><category><![CDATA[fakenews]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 22 Jul 2019 19:18:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/FxX5caie56yp72JVBmabqxoDo76EPWpwGgxpRNBJvgJNr1WPN4BFYkBo9x1xo4XKpc7afbLpwwvemwM4MxmbpT9qETUBrM6wSK84yx33Hxgv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hackers Exploit Malware Attacks Through Twitter Memes]]></title><description><![CDATA[When it is about memes, people usually download them right away on their devices to share further. Posting memes on Facebook and Twitter has become something of a trend today. But, did you ever wonder]]></description><link>http://direct.ecency.com/maliciousimage/@twr/hackersexploitmalwareattacksthroughtwittermemes-lhwiwrgso8</link><guid isPermaLink="true">http://direct.ecency.com/maliciousimage/@twr/hackersexploitmalwareattacksthroughtwittermemes-lhwiwrgso8</guid><category><![CDATA[maliciousimage]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 20 Dec 2018 22:33:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/54TLbcUcnRm4Lx9pBqYcBiBEm1uDXVKX6bsDKbXpesrDicfmLBJByirNUDPPSk9fykPPzMViSXE6f6inbofrUuHNKwLh6rZTKSMsemoAzLR9HYS4cFGfaUyqLssauB3dXBEyAT8Ge?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>