<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 14 Apr 2026 22:46:45 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/networksecurity/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Your Essential Guide: Key Sample Questions for CompTIA Security+ SY0-601 with Certstime]]></title><description><![CDATA[** CompTIA Security+ Exam Overview on Certstime** The CompTIA Security+ exam, offered by Certstime, is a globally recognized certification designed for IT professionals seeking to validate their knowledge]]></description><link>http://direct.ecency.com/comptiasecurityplus/@allen59/your-essential-guide-key-sample-questions-for-comptia-security-sy0-601-with-certstime</link><guid isPermaLink="true">http://direct.ecency.com/comptiasecurityplus/@allen59/your-essential-guide-key-sample-questions-for-comptia-security-sy0-601-with-certstime</guid><category><![CDATA[comptiasecurityplus]]></category><dc:creator><![CDATA[allen59]]></dc:creator><pubDate>Fri, 11 Oct 2024 10:25:03 GMT</pubDate></item><item><title><![CDATA[Hacking: Tama Ba o Mali?  [TAG | ENG]]]></title><description><![CDATA[Pagbati sa mga kapwa ko Hivers! Kamusta kayo ngayon? Nawa’y mabuti ang lagay nyo. from Philipp Katzenberger. Edited through Canva. Sa mga prompt na inorganisa ni @tpkidkai para sa ikaapat na buwan ng Hunyo,]]></description><link>http://direct.ecency.com/hive-199493/@cli4d/hacking-tama-ba-o-mali-tag-or-eng</link><guid isPermaLink="true">http://direct.ecency.com/hive-199493/@cli4d/hacking-tama-ba-o-mali-tag-or-eng</guid><category><![CDATA[hive-199493]]></category><dc:creator><![CDATA[cli4d]]></dc:creator><pubDate>Thu, 27 Jun 2024 09:00:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/4HFqJv9qRjVecs4xkhd5EvhidWEEBnn9tCVDBkBhQpUFvab78MhbU1VsZCoLQPybFaXVrfg8htP3xQj7BVSKLiXY9kDsL8e53eUYW8FVaZtQw4wBuZoEoFXdLQ2XAqecSEZ3pBxzTJ513t1RmT2mDU89PZ2FEBdCVP4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[6 Critical Steps to Protect Against Ransomware Attacks]]></title><description><![CDATA[Ransomware attacks have become one of the most daunting cyber threats facing organizations today. These attacks encrypt an organization's data, holding it hostage until a ransom is paid. The consequences]]></description><link>http://direct.ecency.com/cybersecurity/@prattybayola/6-critical-steps-to-protect</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@prattybayola/6-critical-steps-to-protect</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[prattybayola]]></dc:creator><pubDate>Fri, 17 May 2024 00:58:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy5czPNg6acYWUoo1sAiV6GNzi6xcqDZUsEysPV1hyfNm1UC6T8ztwSSiNiqf4zJZCpaHYxf1Rx2piwtdYUZvymFrBK88XvrcYxAAek1LstKRoT8bZTpJE1LVt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cyber Security Awarness Training For Business  ]]></title><description><![CDATA[When it comes to cyber security, employees are often the weakest link. Without an understanding of how to identify and respond to common threats, your employees are easy targets to exploit. However it]]></description><link>http://direct.ecency.com/cybersecurity/@phriendlyphishau/cyber-security-awarness-training-for</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@phriendlyphishau/cyber-security-awarness-training-for</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[phriendlyphishau]]></dc:creator><pubDate>Wed, 15 May 2024 01:36:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/3RTd4iuWD6NUjnoD8Yrh1Cy7awRojZWHzB7mii5CjDwpwwnq91fgEiSJ3vq49SWdxGaESpx8h1ciZxxa8N3eoqJmmipr9bEhYrm9vFma1CwE48nQ2wgQ3qmN3nXrAqqpfcnmthEwYpk359xyE2Z1FNyHt7FjZQVLjkVUZEgRtJHmUi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Phishing Awareness Training Solutions And Simulations]]></title><description><![CDATA[Condition your employees to resist cyber criminals. With world-class phishing awareness & simulation training and mock attacks, they’ll less likely fall for a dodgy line that could entangle your business]]></description><link>http://direct.ecency.com/cybersecurity/@phriendlyphishau/phishing-awareness-training-solutions-and</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@phriendlyphishau/phishing-awareness-training-solutions-and</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[phriendlyphishau]]></dc:creator><pubDate>Tue, 05 Mar 2024 03:45:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/3DLAmCsuTe3bf3YJfXXmyAh7VWik7LRgWLXMEsfcXc6Lx5uGRkFs7Cuw2ekRNDfN89geFbVesGYJHVXjrNEBjW7qEjmcqNtuVpEHdJRENwFbmVf4dKmvewWHdt1Je2tWXg7BS2UAJoU422zL43KHRSkNKRXngJi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Leading Cyber Security Awareness Training Solutions]]></title><description><![CDATA[Embracing the digital landscape—the new frontier of security Security Awareness Training has been a cornerstone of business long before the advent of the internet. Before the digital era, this training]]></description><link>http://direct.ecency.com/security/@phriendlyphishau/leading-cyber-security-awareness-training</link><guid isPermaLink="true">http://direct.ecency.com/security/@phriendlyphishau/leading-cyber-security-awareness-training</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[phriendlyphishau]]></dc:creator><pubDate>Wed, 28 Feb 2024 05:31:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/EEEoA8oLaAxs8S8ssXoCRuZNYW19BmgwNHqyuksyt1sKfDLzMuFDAbGUYrSyTKNm3BvnX9saNLJgz8ka9V1omrG2MZR8x4ocfUyT1P3a4YBt5oSocmkFV73GYW2MofDdLM8P53fp6sS9qW7Xg4CFH?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Phishing Simulation And Security Awareness Training]]></title><description><![CDATA[Phishing simulation & cybersecurity awareness training, designed by Australians, digitally delivered for the ANZ region. Reduce the likelihood of data spills or phishing fallout impacting your]]></description><link>http://direct.ecency.com/hive-167922/@phriendlyphish/phishing-simulation-and-security-awareness-training</link><guid isPermaLink="true">http://direct.ecency.com/hive-167922/@phriendlyphish/phishing-simulation-and-security-awareness-training</guid><category><![CDATA[hive-167922]]></category><dc:creator><![CDATA[phriendlyphish]]></dc:creator><pubDate>Fri, 12 Jan 2024 14:56:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/2bP4pJr4wVimqCWjYimXJe2cnCgnBgeQZ2CTyDKA31Q?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[SecPoint Portable Penetrator]]></title><description><![CDATA[CLICK HERE ?? Be sure to subscribe to SecPoint's YouTube channel, watch some of the previous videos and Playlists, and look us up on Facebook, Twitter, and Instagram. Email: info@secpoint.com Video Sites:]]></description><link>http://direct.ecency.com/dlive/@secpoint/0af322f9-a19b-11e8-8d21-0242ac110003</link><guid isPermaLink="true">http://direct.ecency.com/dlive/@secpoint/0af322f9-a19b-11e8-8d21-0242ac110003</guid><category><![CDATA[dlive]]></category><dc:creator><![CDATA[secpoint]]></dc:creator><pubDate>Thu, 16 Aug 2018 21:27:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/KWcVEiwEzuiCuSt3rCYguvZ98x2mj34d8unYS62r9SzBz71ZNEX7K3MgvTiBUARjiJn3UohDerh2MwdoXo?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Privacy and security]]></title><description><![CDATA[The following is simply my perspective from what I have seen and experienced over the years. This article in the is not a new norm but a misstep held by the media, congress and law enforcement for decades.]]></description><link>http://direct.ecency.com/security/@twirlspin/privacy-and-security</link><guid isPermaLink="true">http://direct.ecency.com/security/@twirlspin/privacy-and-security</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[twirlspin]]></dc:creator><pubDate>Sat, 04 Aug 2018 20:24:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e8HqDg7KYVMsF4iSiyps3zzSLAxUpujaRVg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Network Security Industry 2018 Global Market Size, Growth, Trend, Share and Forecast Analysis to 2025]]></title><description><![CDATA[This Report enables the buyer of the report to gain a telescopic view of the competitive landscape and plan the strategies accordingly. Network Security Market Research Report provides a professional and]]></description><link>http://direct.ecency.com/networksecurity/@jhonbane/network-security-industry-2018-global-market-size-growth-trend-share-and-forecast-analysis-to-2025</link><guid isPermaLink="true">http://direct.ecency.com/networksecurity/@jhonbane/network-security-industry-2018-global-market-size-growth-trend-share-and-forecast-analysis-to-2025</guid><category><![CDATA[networksecurity]]></category><dc:creator><![CDATA[jhonbane]]></dc:creator><pubDate>Fri, 27 Apr 2018 10:50:00 GMT</pubDate></item><item><title><![CDATA[Major Progress of Network Security Tools Market n Global Industry: Market Overview & Competitive Research 2018]]></title><description><![CDATA[Researchmoz added Most up-to-date research on "Global Network Security Tools Market Research Report 2018" to its huge collection of research reports. In this report, the global Network Security]]></description><link>http://direct.ecency.com/networksecurity/@kapilalone/major-progress-of-network-security-tools-market-n-global-industry-market-overview-and-competitive-research-2018</link><guid isPermaLink="true">http://direct.ecency.com/networksecurity/@kapilalone/major-progress-of-network-security-tools-market-n-global-industry-market-overview-and-competitive-research-2018</guid><category><![CDATA[networksecurity]]></category><dc:creator><![CDATA[kapilalone]]></dc:creator><pubDate>Fri, 20 Apr 2018 07:00:42 GMT</pubDate></item><item><title><![CDATA[[The Library] Three Weeks in Review]]></title><description><![CDATA[Three Weeks of Open-Source Intelligence It's been 21 days since my first post on this blog and it's grown a lot. I went from 0 followers to almost 90, from a couple views per post to a few dozen. I've]]></description><link>http://direct.ecency.com/news/@odinthelibrarian/the-library-three-weeks-in-review</link><guid isPermaLink="true">http://direct.ecency.com/news/@odinthelibrarian/the-library-three-weeks-in-review</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[odinthelibrarian]]></dc:creator><pubDate>Sat, 22 Jul 2017 15:24:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/62PdCoV9UZmJCNhY9Y5mCoRq5EEvxzNvLrbPPw6W1eKHnUydTCSpaHN7DxuJPcN1Jk2vtwz6jUBSBaMWowB451hDhN7zz5FATzzspJZbd3YTmkz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[The Library] Wanna Cry? It's Probably Because of the Lazarus Group]]></title><description><![CDATA[Source Not many hacking groups can say they made nation states across the globe WannaCry. That's just what the Lazarus Group did, a group of hackers that operate with increasing skill in cyberspace. The]]></description><link>http://direct.ecency.com/news/@odinthelibrarian/the-library-wanna-cry-it-s-probably-because-of-the-lazarus-group</link><guid isPermaLink="true">http://direct.ecency.com/news/@odinthelibrarian/the-library-wanna-cry-it-s-probably-because-of-the-lazarus-group</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[odinthelibrarian]]></dc:creator><pubDate>Fri, 21 Jul 2017 22:07:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/5ShzsKnKF7vprwsizkuLpiaSzohPLiMryz3HShC8AMuBUpNCt3x1a2JTTv87bXpzEyQGZSVju5cg8ZUc14CrNgJRdtxBATnDgrsk6KY51zoQDRHjkcG7wnmKLvFK3pf8tXct5iRXPbZD5Nh3Rupzb9Tc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[The Library] Exclusive Interview with CWA's DerpLaughing]]></title><description><![CDATA[A Short, Exclusive Interview with CWA's DerpLaughing Derp's Twitter Raw Paste of our conversation  Original post on CWA You may have read my report on the infamous hacking/social engineering crew]]></description><link>http://direct.ecency.com/news/@odinthelibrarian/the-library-exclusive-interview-with-cwa-s-derplaughing</link><guid isPermaLink="true">http://direct.ecency.com/news/@odinthelibrarian/the-library-exclusive-interview-with-cwa-s-derplaughing</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[odinthelibrarian]]></dc:creator><pubDate>Wed, 19 Jul 2017 00:20:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/B69zEhWZA8UDEcu6zcdoR9dYPT4YCXXMyEVrWffqhVErcRdwkozfZZFN3ZYZASp8yECoHYRD76t6SFmnBpYSRnGHiVccJReeSEm7YGHt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[Opinion] Anonymous in Disarray: Their Greatest Enemy is Themselves]]></title><description><![CDATA[  [Opinion] Anonymous in Disarray: Their Greatest Enemy is Themselves    Today’s piece is going to be an opinion piece. The only things I can comment on have been things I’ve observed, and]]></description><link>http://direct.ecency.com/news/@odinthelibrarian/opinion-anonymous-in-disarray-their-greatest-enemy-is-themselves</link><guid isPermaLink="true">http://direct.ecency.com/news/@odinthelibrarian/opinion-anonymous-in-disarray-their-greatest-enemy-is-themselves</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[odinthelibrarian]]></dc:creator><pubDate>Tue, 18 Jul 2017 18:10:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/NTy4GV6ooFRoEzHQC7yT8PJEyG4swYZqdnP5hSgcrebXQ7wVfccP3AK4RWVKkScFPbRoRbc8pHZTfXKFpm8jBe24LhVwJEKwLBnamJBoX11RN9t8NuazsuaYaC3uttZnS1uCNHWHPJ1Z51621HT1uNc2pAt2rZU2QZyf3ojA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[The Library] The Ruskies Behind the Hack of the America's Democracy]]></title><description><![CDATA[If you've been following anything in the news over the last eight to ten months, you've probably noticed that our friends in the Kremlin are a pretty controversial bunch.  Today, I present a story]]></description><link>http://direct.ecency.com/news/@odinthelibrarian/the-library-the-ruskies-behind-the-hack-of-the-america-s-democracy</link><guid isPermaLink="true">http://direct.ecency.com/news/@odinthelibrarian/the-library-the-ruskies-behind-the-hack-of-the-america-s-democracy</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[odinthelibrarian]]></dc:creator><pubDate>Mon, 17 Jul 2017 21:23:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/mXkfdToSwHyB6JhoXEHDGwe6ojCtY6dA1S2wpJEgyTfxz9M3sSWwNu5FeJ5UcdVNMyEJ2oENQc6gTuNCWPRUSekwkBJG2eMMKSbfZHTGS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[The Library] Did Someone Hack CBSNews and Army.mil?]]></title><description><![CDATA[Hey Guys, Odin's Back. Sorry about the downtime, I've been busy with work and research in other domains. Last night I was contacted by my associate A of Anonymous offshoot AlphabetSec who said that someone]]></description><link>http://direct.ecency.com/news/@odinthelibrarian/the-library-did-someone-hack-cbsnews-and-army-mil</link><guid isPermaLink="true">http://direct.ecency.com/news/@odinthelibrarian/the-library-did-someone-hack-cbsnews-and-army-mil</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[odinthelibrarian]]></dc:creator><pubDate>Wed, 12 Jul 2017 17:37:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/9vWp6aU4y8kyksq79taJ72wuVUVcXEcpDtMxwQvMKkwPYByFZSPRsWcTxPenzdEYooVnLSNZNcDSJTBMS7JmzeHifC71dWnjtRTrCEf9TZQXtrRTVeWSDsoytALY35UPXnyht5KLFVJo71d9g?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Finally I've Completed a short Course...UDEMY]]></title><description><![CDATA[Finally I have just completed  Hacking Academy: Monitoring Transmitted Data on UDEMY here's the course description......]]></description><link>http://direct.ecency.com/udemy/@suraj/finally-i-ve-completed-a-short-course-udemy</link><guid isPermaLink="true">http://direct.ecency.com/udemy/@suraj/finally-i-ve-completed-a-short-course-udemy</guid><category><![CDATA[udemy]]></category><dc:creator><![CDATA[suraj]]></dc:creator><pubDate>Sun, 09 Jul 2017 06:32:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/4i88GgaV8qiGEw1xifwYz2xp7RJEnNpBZq7dn2K5zsVMnshAnKm6GEzvJ4MTBzzeXji3o2Bx9E5LzYDsrzk52NTNpR1uFvXneYxxsq5CHtiPGEWX624cU7JzFG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[#Linux/Unix How to kill a TCP connection using netstat]]></title><description><![CDATA[Original Article alternative best google ranked article]]></description><link>http://direct.ecency.com/linux/@oneshot/linux-unix-how-to-kill-a-tcp-connection-using-netstat</link><guid isPermaLink="true">http://direct.ecency.com/linux/@oneshot/linux-unix-how-to-kill-a-tcp-connection-using-netstat</guid><category><![CDATA[linux]]></category><dc:creator><![CDATA[oneshot]]></dc:creator><pubDate>Fri, 28 Apr 2017 08:01:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/BRWJ2XuBRXQxQtwjkpK59RMNMgNesBNgUBQsG9Y9BsgjUCU6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[9 Cyber Security Questions Every Executive Should Ask]]></title><description><![CDATA[According to 2015 Cost of Cyber Crime, recently released by The Ponemon Institute, the minimum cost of cyber crime to a company was $1.9M while the maximum cost was as much as $65M. As news of major cyber]]></description><link>http://direct.ecency.com/security/@hannoekdahl/9-cyber-security-questions-every-executive-should-ask</link><guid isPermaLink="true">http://direct.ecency.com/security/@hannoekdahl/9-cyber-security-questions-every-executive-should-ask</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[hannoekdahl]]></dc:creator><pubDate>Mon, 22 Aug 2016 19:26:24 GMT</pubDate></item></channel></rss>