<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 24 Apr 2026 13:54:47 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/ransome/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Hackers give Johannesburg government 3 days to pay over $30K in Bitcoin]]></title><description><![CDATA[A group of cybercriminals calling themselves the “Shadow Kill Hackers” has reportedly attacked the City of Johannesburg (South Africa) administration website — and is threatening to upload the stolen data]]></description><link>http://direct.ecency.com/bitcoin/@muhammad007/hackers-give-johannesburg-government-3-days-to-pay-over-30k-in-bitcoin-rbexc0ww</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@muhammad007/hackers-give-johannesburg-government-3-days-to-pay-over-30k-in-bitcoin-rbexc0ww</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[muhammad007]]></dc:creator><pubDate>Mon, 28 Oct 2019 13:50:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjVtYhc8EyUCS1n2TpsbpKuDhBkZTQTi2NsGVP3cuDYfbsXixUJGUxEgkwUQrbjPMh51kSgBzrMum3Xea9SQpe7XXPWMs3TjCEAmih7SGwbU2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hackers demand ransom in bitcoin after illegally accessing systems of Old Delhi traders]]></title><description><![CDATA[The hackers, who are believed to be from either from Nigeria or Pakistan encrypted files on the computers of the businessmen consisting key documents, a report in Hindustan Times stated. The hackers then,]]></description><link>http://direct.ecency.com/news/@amitraj/hackers-demand-ransom-in-bitcoin-after-illegally-accessing-systems-of-old-delhi-traders</link><guid isPermaLink="true">http://direct.ecency.com/news/@amitraj/hackers-demand-ransom-in-bitcoin-after-illegally-accessing-systems-of-old-delhi-traders</guid><category><![CDATA[news]]></category><dc:creator><![CDATA[amitraj]]></dc:creator><pubDate>Fri, 12 Jan 2018 18:49:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/2r8F9rTBenJR3iqPxDrevHK3vDeQGnHc8Wj8C8negTDV31LFQU3UK8JCJuvKdXBEvn7NPkePq9wk4RURPv6SH9VzvXC6GXxez4AbAoR5MhopsoVton542f1A69vuqawT4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[US Blames Bitcoin Ransomware Attack Wannacry North korea]]></title><description><![CDATA[Wannacry infiltrated Windows computers, encrypted data and demanded ransom in bitcoin to return control of the files. It is estimated to have hit over 300,000 computers in 150 countries around the world,]]></description><link>http://direct.ecency.com/ransome/@amitraj/us-blames-bitcoin-ransomware-attack-wannacry-north-korea</link><guid isPermaLink="true">http://direct.ecency.com/ransome/@amitraj/us-blames-bitcoin-ransomware-attack-wannacry-north-korea</guid><category><![CDATA[ransome]]></category><dc:creator><![CDATA[amitraj]]></dc:creator><pubDate>Tue, 19 Dec 2017 15:07:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/54TLbcUcnRm4iYtFdzVNy1kt3F2tvRShXkTnWxjMpLEKHcLgwVMRV4mQNBYk4cPaHv6BYHfj1CpJMh4p2DP485a2qgkKnHrU1MLBfbPyH9q4XXH2tSAjWGhYkcdvwDJo4oniCsD6v?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Ransom of 20 BTC? Kidnapper's demand to release the kidnapped.]]></title><description><![CDATA[We all know that the tech behind BTC. But with something great comes something that always proves to be a con. In India, a recent case suggests that a man was kidnapped and the demand for his release was]]></description><link>http://direct.ecency.com/bitcoin/@manishmike10/ransom-of-20-btc-kidnapper-s-demand-to-release-the-kidnapped</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@manishmike10/ransom-of-20-btc-kidnapper-s-demand-to-release-the-kidnapped</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[manishmike10]]></dc:creator><pubDate>Sun, 26 Nov 2017 15:06:15 GMT</pubDate></item><item><title><![CDATA[Azer CryptoMix Ransomware Variant Operates Offline]]></title><description><![CDATA[There are many different types of cryptocurrency ransomware in circulation. Most of the existing strains often see variants of their own codebase surface. CryptoMix ransomware has been popular over the]]></description><link>http://direct.ecency.com/crypto/@shpetim/azer-cryptomix-ransomware-variant-operates-offline</link><guid isPermaLink="true">http://direct.ecency.com/crypto/@shpetim/azer-cryptomix-ransomware-variant-operates-offline</guid><category><![CDATA[crypto]]></category><dc:creator><![CDATA[shpetim]]></dc:creator><pubDate>Mon, 10 Jul 2017 06:21:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/6VvuHGsoU2QD2aHbJiivbVZV6nAA4BJrX2xi1Ybu35Af6WmEYZqyjf2YmX3y1gCuySNMTTh15ZcKVKQ4Q9BiWfTat2MQZKBPvLMz11KSyZ6oTYnZnirRQu9Ve7GXne?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[코인거래 시 보안 필수사항(Security requirements for crypto currency)]]></title><description><![CDATA[안녕하세요 @coinyawong 입니다. If you do crypto currency(bitcoin, eth...) transaction, you should tighten security. 만약 여러분이 비트코인이나 이더리움 또는 ico 코인을 거래한다면 보안에 많은 신경을 쓰셔야 합니다. Back up all the important material related]]></description><link>http://direct.ecency.com/bitcoin/@coinyawong/security-requirements-for-crypto-currency</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@coinyawong/security-requirements-for-crypto-currency</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[coinyawong]]></dc:creator><pubDate>Sun, 02 Jul 2017 11:42:57 GMT</pubDate></item><item><title><![CDATA[Executioner Ransomware is a Fine Example of Sloppy Coding]]></title><description><![CDATA[In the world of ransomware, we often see new types of malware which are not performing the way one would expect. In the case of Executioner ransomware, this becomes all the more apparent. Despite looking]]></description><link>http://direct.ecency.com/ransome/@yyuvane/executioner-ransomware-is-a-fine-example-of-sloppy-coding</link><guid isPermaLink="true">http://direct.ecency.com/ransome/@yyuvane/executioner-ransomware-is-a-fine-example-of-sloppy-coding</guid><category><![CDATA[ransome]]></category><dc:creator><![CDATA[yyuvane]]></dc:creator><pubDate>Wed, 21 Jun 2017 04:14:45 GMT</pubDate></item></channel></rss>