<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 20 Apr 2026 22:57:10 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/ransomware/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Former Cybersecurity Expert Turns Criminal]]></title><description><![CDATA[Former cybersecurity ransomware negotiator turns to the dark side and into a ransomware cybercriminal. Here is another ugly lesson in “be careful who you trust, even in cybersecurity”. We have seen malicious]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/former-cybersecurity-expert-turns-criminal</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/former-cybersecurity-expert-turns-criminal</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 08 Jan 2026 03:29:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrULVeHM9ZqC5BaoHUySmXykPE7hqMjfdHcbKBzhc6AGjRVKb6c16BFGJQz6uuDyh6E84M5c7a24H6RZrccNySxU2Ln?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Building Ransomware Resilience - Webinar]]></title><description><![CDATA[I am looking forward to a stellar discussion about ransomware! The Official Cybersecurity Summit is coordinating a number of virtual expert panels to discuss various aspects of Ransomware. Join V. Carr,]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/building-ransomware-resilience-webinar</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/building-ransomware-resilience-webinar</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 23 Oct 2025 01:17:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjW3w697X4bF7kkuwgwRVAtBfnWUze2s9jHTWUuM21tTG8ShJh7T73jUAYT9XHnnhT7TQRCiGthn1iddhJbx2qWmVts1PtBzoaBFXardmJYnr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Artificial Intelligence Used in 80% of Ransomware Attacks]]></title><description><![CDATA[A new report from MIT Sloan cybersecurity research reveals that AI is leveraged in 80% of ransomware attacks. Of the 2811 ransomware cases investigated, adversaries used AI 80.8% of the time in their attacks.]]></description><link>http://direct.ecency.com/artificial/@mrosenquist/artificial-intelligence-used-in-80-of-ransomware-attacks</link><guid isPermaLink="true">http://direct.ecency.com/artificial/@mrosenquist/artificial-intelligence-used-in-80-of-ransomware-attacks</guid><category><![CDATA[artificial]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Tue, 09 Sep 2025 18:46:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk2bGrmiEeFj8B9PQrfXKe8zceQ7oENuhd1oZekpTnxtnVZBpKVf7cYGQ41uQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[UK Bans Ransomware Payments from the Public Sector]]></title><description><![CDATA[​ UK shows leadership in a proposal to ban ransomware payments for public entities like healthcare, education, government services and other national critical infrastructure! This is a great step forward]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/uk-bans-ransomware-payments-from-the-public-sector</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/uk-bans-ransomware-payments-from-the-public-sector</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 28 Jul 2025 20:24:12 GMT</pubDate></item><item><title><![CDATA[UK Proposes Ransomware Payment Ban for Public Sector]]></title><description><![CDATA[UK shows leadership in a proposal to ban ransomware payments for public entities like healthcare, education, government services and other national critical infrastructure! This is a great step forward]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/uk-proposes-ransomware-payment-ban-for-public-sector</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/uk-proposes-ransomware-payment-ban-for-public-sector</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 25 Jul 2025 20:15:57 GMT</pubDate></item><item><title><![CDATA[UK Proposes Ransomware Payment Ban for Public Sector — A Step in the Right Direction]]></title><description><![CDATA[The UK government has proposed banning public sector entities — including national healthcare, education institutions, libraries, and other government bodies — from making ransomware payments. This move]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/uk-proposes-ransomware-payment-ban-for-public-sector-a-step-in-the-right-direction</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/uk-proposes-ransomware-payment-ban-for-public-sector-a-step-in-the-right-direction</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Tue, 22 Jul 2025 19:51:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/3RTd4iuWD6NUjLpjre2J9mGbDzZVyxM68jJLUnM4vw5vgmTc5HKsKVr5ESyxbsmqTMZLjeKUHpwnE7ik4ULnRfd6pa46e8FQqVobCGSdcuPtcRFneJUmZnfYAvbZcPHfpLKk1HW4vB221uSDyk3TDUrGvZpwRY1FgtUBAPU8iBkQzA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Iran Focuses Cybercriminals on Foreign Enemies]]></title><description><![CDATA[Aggressive nation-states are increasingly leveraging cyberattacks as tools to advance their foreign policy objectives. In this case, Iran sponsored Pay2Key Ransomware-as-a-Service (RaaS) is offering an]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/iran-focuses-cybercriminals-on-foreign-enemies</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/iran-focuses-cybercriminals-on-foreign-enemies</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 09 Jul 2025 20:04:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/2923mN3pnd7PiAj8EDerJigzz8CxfEm9FsdY9jatrJUN8VAd2SukMsNT7b8sBgazv5Tny5GJKsh9RYqBAtLTyedHFLyi9hAkBvoaVXNLGaga9k?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Aussie Ransomware Victims Now Forced to Confess Payments]]></title><description><![CDATA[Following legislation enacted last Friday, Australian victims of ransomware attacks are now legally required to declare any payments made to cyber criminals. The new mandate is not universal but targets]]></description><link>http://direct.ecency.com/pivx/@pivx/aussie-ransomware-victims-now-forced-to-confess-payments</link><guid isPermaLink="true">http://direct.ecency.com/pivx/@pivx/aussie-ransomware-victims-now-forced-to-confess-payments</guid><category><![CDATA[pivx]]></category><dc:creator><![CDATA[pivx]]></dc:creator><pubDate>Thu, 12 Jun 2025 18:01:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/k75bsZMwYNu2L3iBMXq5y7xeiy1isFJsZxnMZSXuXEsxe4ee1cUkGyPkWzS28fPixwhawnyarNkyGGZuxMj8pCaLbh9sfJSn3LL9FReKQ5rJ1Jdvv2gwgrNXZH9cDtcqLNymWe7R14eHiaCeimZZY8wPjsXsFpRYA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hacking the Hardware Brains of Computers is the Ultimate Cyberattack]]></title><description><![CDATA[Compromising the hardware layer, especially the CPU, is the Holy Grail of cyberattacks. Recent work by Christiaan Beek, a leading cybersecurity researcher at Rapid7, into developing a ransomware]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/hacking-the-hardware-brains-of-computers-is-the-ultimate-cyberattack</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/hacking-the-hardware-brains-of-computers-is-the-ultimate-cyberattack</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 14 May 2025 17:13:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/sML2JBPsdAyGmXCw438G5dsbSTzx9j4mFnVcgCfxaxrcgEWfXvaCJ3ojMxGmpkrA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Ransomware Attack Ends a 150 Year Company]]></title><description><![CDATA[Knights of Old, a 150-year-old UK company, is gone – due to a cyberattack! This terribly unfortunate event is a good example of how cybersecurity matters to every company that depends on digital technology]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/ransomware-attack-ends-a-150-year-company</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/ransomware-attack-ends-a-150-year-company</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 05 Mar 2025 20:17:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/4qEixipsxSf1NbWKfaQP3ZTkK1QAnQz71dJLuWu1v9s4TBEJ5zFELTN9XmHwJtRhti?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Ransomware is Down but Not Out]]></title><description><![CDATA[Ransomware payments are down according to Chainalysis, but it may be a little too early to celebrate. The good news is that victims are realizing that paying the ransom only encourages more attacks and]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/ransomware-is-down-but-not-out</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/ransomware-is-down-but-not-out</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 07 Feb 2025 20:52:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/2Qhhdda6QnbesHNx9w7nXXtHLu32MEzCdTvpnK5XUzqmCaoRLjwhL58SmAtRuBRodLyabKRA7XaTkPRT7vQn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Are Leaders Ready to Break the Ransomware Cycle]]></title><description><![CDATA[It is good to see US government leaders realize that ransomware is a growing existential threat to our country, at the hands of our adversaries. A top US national cybersecurity advisor stated in a recent]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/are-leaders-ready-to-break-the-ransomware-cycle</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/are-leaders-ready-to-break-the-ransomware-cycle</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 21 Oct 2024 21:16:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBqwQ9YUnw4kSYp4ZTDkj42mjGXqLyV4TPmNnWXKyRpqiuURnTvdsBLWEBJwCLxiRQPDKh6BdEhGxyVbXNW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Deconstructing Ransomware Series]]></title><description><![CDATA[​ Ransomware attacks are vicious, expensive, impactful, and becoming commonplace. So, let's take a look at what Ransomware is, how attacks typically unfold, and what potential victims can do to improve]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/deconstructing-ransomware-series</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/deconstructing-ransomware-series</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 17 Oct 2024 18:30:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eLQFMtHGYv6AGEVx8r5ynKtGt4gMwaF6Nxv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Ransomware Explained  - How to Reduce Exposure]]></title><description><![CDATA[Ransomware is one of the most devastating challenges in cybersecurity today. The attacks are vicious, expensive, impactful, and becoming commonplace. Over the years I have predicted its rise, discussed]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/ransomware-explained-how-to-reduce-exposure</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/ransomware-explained-how-to-reduce-exposure</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Tue, 01 Oct 2024 02:34:00 GMT</pubDate></item><item><title><![CDATA[The Evolving Landscape of Crypto Security]]></title><description><![CDATA[The crypto security landscape is undergoing some pretty interesting changes as we move further into 2024. You know, it's kind of a cat-and-mouse game where the hackers and security experts up their game]]></description><link>http://direct.ecency.com/hive-167922/@thedreamer01/the-evolving-landscape-of-crypto-security-9bq</link><guid isPermaLink="true">http://direct.ecency.com/hive-167922/@thedreamer01/the-evolving-landscape-of-crypto-security-9bq</guid><category><![CDATA[hive-167922]]></category><dc:creator><![CDATA[thedreamer01]]></dc:creator><pubDate>Thu, 15 Aug 2024 15:17:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/9vWp6aU4y8kx94BZeEDj88BS4kQKTnLDwXZNgZMNutnXAQd4FNSMNq5ZPjBfbvHHEJJW5uYCzf3qqxd3tHXBoLMcuLAPmmNok5xbW7qawgkLgpYHPafXjsZQWf6zt4MfxasUq1jamy3GyM2Wr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Ransomware Shield: Protecting Your Digital Assets]]></title><description><![CDATA[In an increasingly digital world, the protection of your digital assets has never been more critical. Ransomware, a type of malicious software designed to block access to a computer system until a sum]]></description><link>http://direct.ecency.com/ransomware/@zamoranico654/the-ransomware-shield-protecting-your</link><guid isPermaLink="true">http://direct.ecency.com/ransomware/@zamoranico654/the-ransomware-shield-protecting-your</guid><category><![CDATA[ransomware]]></category><dc:creator><![CDATA[zamoranico654]]></dc:creator><pubDate>Wed, 22 May 2024 07:04:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pJD9LKQ1BG3BAmr5TYaANmrJEBZ9YM9DBGTEABBY26ASJrVuZyp4vrG5R7Ck3tCzYXVhtu6gKPvc2XnV8fFzMSvpi6e4kyocnvBhWA7kpY7qfC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Ransomware: To Pay or Not to Pay?]]></title><description><![CDATA[The Cybersecurity Vault — episode 32, with guest Ian Thornton Trump. In this episode, we discuss one of the most divisive and contentious topics in cybersecurity — should victims of ransomware be allowed]]></description><link>http://direct.ecency.com/podcast/@mrosenquist/ransomware-to-pay-or-not-to-pay</link><guid isPermaLink="true">http://direct.ecency.com/podcast/@mrosenquist/ransomware-to-pay-or-not-to-pay</guid><category><![CDATA[podcast]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 02 May 2024 19:41:21 GMT</pubDate></item><item><title><![CDATA[How to Prevent Ransomware Attacks]]></title><description><![CDATA[Ransomware attacks have surged in frequency and sophistication, posing a serious threat to individuals and organizations worldwide. These malicious attacks encrypt a victim's data and demand a ransom for]]></description><link>http://direct.ecency.com/ransomware/@alextray/how-to-prevent-ransomware-attacks</link><guid isPermaLink="true">http://direct.ecency.com/ransomware/@alextray/how-to-prevent-ransomware-attacks</guid><category><![CDATA[ransomware]]></category><dc:creator><![CDATA[alextray]]></dc:creator><pubDate>Tue, 23 Apr 2024 17:05:42 GMT</pubDate></item><item><title><![CDATA[Task Force Gives Terrible Advice About Ransomware]]></title><description><![CDATA[I couldn’t help myself, I had to rant about this! A ‘security research’ group is recommending against banning ransomware payments, which would eradicate these attacks from occurring, and instead want money]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/task-force-gives-terrible-advice-about-ransomware</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/task-force-gives-terrible-advice-about-ransomware</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 15 Apr 2024 18:04:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e9XfcUJGNQdLJuV1UoAKDHiN9CUig1TP1mY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Digital Dilemmas: Legal and Social Landscape of Ransom Payments]]></title><description><![CDATA[Digital extortion, such as #ransomware, has aggressively grown to near epidemic levels. The sentiment of regulators and consumers is changing and impacting how businesses look at #cybersecurity options,]]></description><link>http://direct.ecency.com/technology/@mrosenquist/digital-dilemmas-legal-and-social-landscape-of-ransom-payments</link><guid isPermaLink="true">http://direct.ecency.com/technology/@mrosenquist/digital-dilemmas-legal-and-social-landscape-of-ransom-payments</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 18 Mar 2024 21:32:30 GMT</pubDate></item></channel></rss>