<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 08:35:58 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/stuxnet/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[New revelations and intrigues about Stuxnet]]></title><description><![CDATA[image and article The tale of Stuxnet, the software that disrupted the Iranian nuclear program and was subsequently dubbed the first known cyberweapon, is being discussed more than 15 years later. De]]></description><link>http://direct.ecency.com/hive-122315/@wolfplayzor/new-revelations-and-intrigues-about-stuxnet</link><guid isPermaLink="true">http://direct.ecency.com/hive-122315/@wolfplayzor/new-revelations-and-intrigues-about-stuxnet</guid><category><![CDATA[hive-122315]]></category><dc:creator><![CDATA[wolfplayzor]]></dc:creator><pubDate>Wed, 17 Jan 2024 08:42:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/8DAuGnTQCLptZgjHUrRAJGcW4y1D4A5QVJJ7zjzqqKdfVHSS6NapSCCCv1ZSUKHBf4ERiZgvLzN2fLm6CMnv1aCBSq2tYZQFrTnSt5m3GefppL2Z7v4FuPEP97JnmExSExDsxCVP3PymnB17y41LGsiU9NeAxGZsn8tw7gDkYCv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Great Documentary Example of How Stealth Hacks Versus Destructive Hacks By Ralph Langner]]></title><description><![CDATA[I've highly recommended the documentary Zero Days by Alex Gibney in the past, as the interviews with cybersecurity experts and military personnel are gold. One of the people in the film that Alex interviews]]></description><link>http://direct.ecency.com/cybersecurity/@sqlinsix/great-documentary-example-of-how-stealth-hacks-versus-destructive-hacks-by-ralph-langner</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@sqlinsix/great-documentary-example-of-how-stealth-hacks-versus-destructive-hacks-by-ralph-langner</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Sun, 23 May 2021 11:18:03 GMT</pubDate></item><item><title><![CDATA[Highly Recommended: The 2 Stuxnet Campaigns By Ralph Langner]]></title><description><![CDATA[I've highly recommended the documentary Zero Days by Alex Gibney in the past, as the interviews with cybersecurity experts and military personnel are gold. Within a few hours of the film, the interviewed]]></description><link>http://direct.ecency.com/hive-163521/@sqlinsix/highly-recommended-the-2-stuxnet-campaigns-by-ralph-langner</link><guid isPermaLink="true">http://direct.ecency.com/hive-163521/@sqlinsix/highly-recommended-the-2-stuxnet-campaigns-by-ralph-langner</guid><category><![CDATA[hive-163521]]></category><dc:creator><![CDATA[sqlinsix]]></dc:creator><pubDate>Mon, 17 May 2021 11:18:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e5vYJjDbKHZENJHTqZSyqzCdYrVEC6qfb6n?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cyber Security Threats and Attacks with Kim Crawley]]></title><description><![CDATA[In this video, I sit down with IT & Cyber Security expert Kim Crawley as we discuss IT, Cyber Security threats and attacks, Information Security (InfoSec) and Operational Security (OpSec), Malware,]]></description><link>http://direct.ecency.com/cybersecurity/@dragonwolftech/cyber-security-threats-and-attacks-with-kim-crawley</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@dragonwolftech/cyber-security-threats-and-attacks-with-kim-crawley</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[dragonwolftech]]></dc:creator><pubDate>Sat, 19 Oct 2019 03:28:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e4dVz3h8LTXJiNFs8RVq4eYXmPP1Bkst6hk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cyber-Terrorism: How the US and Israel Attacked Iran—and Failed]]></title><description><![CDATA[Sabotaging another nation’s power grids, or blowing up industrial plants, are actual acts of war under international law. The term “cyber-terrorism” as used in the title, almost softens the impact of that]]></description><link>http://direct.ecency.com/cyberwar/@zeroanthro/cyber-terrorism-how-the-us-and-israel-attacked-iran-and-failed</link><guid isPermaLink="true">http://direct.ecency.com/cyberwar/@zeroanthro/cyber-terrorism-how-the-us-and-israel-attacked-iran-and-failed</guid><category><![CDATA[cyberwar]]></category><dc:creator><![CDATA[zeroanthro]]></dc:creator><pubDate>Tue, 25 Jun 2019 23:07:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iNz9pDgP7LPUNeo8aMxCim2VM7cySbJvy8VY2VQyZZpfJmYRE6J55AFTicQEipt6F6jFAVApgUe?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[stuxnet]]></title><description><![CDATA[Stuxnet is the worm software that the US and Israel use to deal with Iran's nuclear activities. In June 2010, the virus, which was found to be an asset, affected Iran's nuclear facilities in Buşehir and]]></description><link>http://direct.ecency.com/hede-io/@diamondcase/stuxnet</link><guid isPermaLink="true">http://direct.ecency.com/hede-io/@diamondcase/stuxnet</guid><category><![CDATA[hede-io]]></category><dc:creator><![CDATA[diamondcase]]></dc:creator><pubDate>Sun, 17 Jun 2018 09:16:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/mXkfdToSwHxyVySZqG2nA2Sa8hEdc1D34f5rduL1bL9jEQG2X5YPh2KXxZFR14AbjRHWqRJ8LhHrHN6RSwb4meLWbE8jVLz1Jiwohv4Le?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[stuxnet]]></title><description><![CDATA[bu virüsün bulaşması için bir dosyayı açmanıza, herhangi bir şeye tıklamanıza bile gerek yoktu. virüsü yerleştirmek için usb belleğin takılması yeterliydi. geriye kalan her şeyi kendisi hallediyordu. güvenlik]]></description><link>http://direct.ecency.com/hede-io/@anglachelm/stuxnet</link><guid isPermaLink="true">http://direct.ecency.com/hede-io/@anglachelm/stuxnet</guid><category><![CDATA[hede-io]]></category><dc:creator><![CDATA[anglachelm]]></dc:creator><pubDate>Fri, 11 May 2018 00:54:30 GMT</pubDate></item><item><title><![CDATA[[Doku] Zero Days - Der Stuxnet-Wurm]]></title><description><![CDATA[2010 machen Sicherheitsexperten eine unheimliche Entdeckung. Ein hochkomplexer Computerwurm namens STUXNET verbreitet sich mit noch nie gesehener Aggressivität auf der ganzen Welt. Was die Forscher noch]]></description><link>http://direct.ecency.com/stuxnet/@jmpout/13q1gnu4</link><guid isPermaLink="true">http://direct.ecency.com/stuxnet/@jmpout/13q1gnu4</guid><category><![CDATA[stuxnet]]></category><dc:creator><![CDATA[jmpout]]></dc:creator><pubDate>Sun, 11 Feb 2018 17:11:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/MvwLKznkcWQJLMWP9dsdgd1AA5C9ivpnzpm8MtucF?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Iran soll ausgefeilte Angriffssoftware entwickeln]]></title><description><![CDATA[Zudem flogen ein kapitaler Geheimdiensttrojaner und hochgefährliche Angriffssoftware auf, die - wie „Stuxnet“ 2010 - auf industrielle Steuerungssysteme (SCADA) zielt. Damals wurden iranische Uranzentrifugen]]></description><link>http://direct.ecency.com/deutsch/@jeyf123/iran-soll-ausgefeilte-angriffssoftware-entwickeln</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@jeyf123/iran-soll-ausgefeilte-angriffssoftware-entwickeln</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[jeyf123]]></dc:creator><pubDate>Sun, 21 Jan 2018 22:19:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLyAJMrzqHfWLT7YbdgoprDQGwdeDRwrHwrjVnbQ7XSV3hzLzNWoGCvMNENmuSAWHy9PJP7u3L1fuDDDGRF5znR1REKuWUZSZXK4fF2W8MWHg3XLULfyFEmQ1GA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[‘Stuxnet II’ digital weapon can crash electricity grids and cripple economies!]]></title><description><![CDATA[If you are unaware of Stuxnet heres a video that describes its capabilities to turn code into a weapon. Tech experts have discovered a "new threat" described as the most dangerous since Stuxnet,]]></description><link>http://direct.ecency.com/stuxnet/@buhispro/stuxnet-ii-digital-weapon-can-crash-electricity-grids-and-cripple-economies</link><guid isPermaLink="true">http://direct.ecency.com/stuxnet/@buhispro/stuxnet-ii-digital-weapon-can-crash-electricity-grids-and-cripple-economies</guid><category><![CDATA[stuxnet]]></category><dc:creator><![CDATA[buhispro]]></dc:creator><pubDate>Sun, 22 Oct 2017 01:50:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/54TLbcUcnRm4iYtFdzVNy1kt3F2tvRShXkTnWxjMqWs9VMZMrpkNFhHWRvBjzKHQK71VX8jYD4GxNxjc81DMWATC5kuLKHKf94LxokRonC9r6V6T3JXYJPFydZCGSgu7bnc4wgDr6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Stuxnet - robak, który miał powstrzymać Iran]]></title><description><![CDATA[It turns out there is always an idiot around who doesn’t think much about the thumb drive in their hand. Tymi słowami, pochodzącymi z artykułu Davida Sangera z NY Times, rozpoczynam ten wpis, a które idealnie]]></description><link>http://direct.ecency.com/polish/@geekweb/stuxnet-robak-ktory-mial-powstrzymac-iran</link><guid isPermaLink="true">http://direct.ecency.com/polish/@geekweb/stuxnet-robak-ktory-mial-powstrzymac-iran</guid><category><![CDATA[polish]]></category><dc:creator><![CDATA[geekweb]]></dc:creator><pubDate>Sat, 07 Oct 2017 21:47:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pQYiuVvgYiUBP16WHGGN7UNn1BCdGdPy8rpWejrgGsK8pRXAFo472FWQAW7DgHE5cnMez6s9N2rFpD32PBDuxbhbUymp5PwmszddGV7P4kwpQN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Zero Days Real or Not!]]></title><link>http://direct.ecency.com/stuxnet/@imine4coin/zero-days-real-or-not-2017815t17350883z</link><guid isPermaLink="true">http://direct.ecency.com/stuxnet/@imine4coin/zero-days-real-or-not-2017815t17350883z</guid><category><![CDATA[stuxnet]]></category><dc:creator><![CDATA[imine4coin]]></dc:creator><pubDate>Tue, 15 Aug 2017 22:35:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e2HQWisQNJZnjUphwVvNnZm1UgYg8HvFEDU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Technion, Talpiot, Unit 8200, Stuxnet & Kill Switch Diplomacy]]></title><description><![CDATA[Jeremy Rothe-Kushel is a guerrilla journalist, Independent documentarian, political analyst, peace activist, False Flag Weekly News co-anchor and radio show producer. Jeremy talks about the rise of the]]></description><link>http://direct.ecency.com/talpiot/@hamzadragon/technion-talpiot-unit-8200-stuxnet-and-kill-switch-diplomacy</link><guid isPermaLink="true">http://direct.ecency.com/talpiot/@hamzadragon/technion-talpiot-unit-8200-stuxnet-and-kill-switch-diplomacy</guid><category><![CDATA[talpiot]]></category><dc:creator><![CDATA[hamzadragon]]></dc:creator><pubDate>Sat, 22 Jul 2017 21:11:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eFutZ86tUQdrbLzQ3tKiRvC8RvuuFHccvkE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Move Over Stuxnet 'Industroyer' Is Here]]></title><description><![CDATA[Article... "Dubbed "Industroyer" or "CrashOverRide," the grid-sabotaging malware was likely to be used in the December 2016 cyber attack against Ukrainian electric utility Ukrenergo,]]></description><link>http://direct.ecency.com/hack/@lvl/move-over-stuxnet-industroyer-is-here</link><guid isPermaLink="true">http://direct.ecency.com/hack/@lvl/move-over-stuxnet-industroyer-is-here</guid><category><![CDATA[hack]]></category><dc:creator><![CDATA[lvl]]></dc:creator><pubDate>Tue, 13 Jun 2017 06:35:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/Gr7d242AAPKTPGKKfJAWMbTomcXet1TAuqBVY8kY9vrYg9c4iLBWJKqgdSn4YdQKrnvcWHdaGSj2s5bYG3w36HLvQrJvzBj4kVzPpBCcNuNHHd1QXiwnKVgFJJhDD3eLojbGjrmdy9QLTNnTz33Td3QZqjj8BgVzYiTp97BSoRDMznQGv8v?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Operation Olympic Games Is The Neo-Con Threat On Technology]]></title><description><![CDATA[If you have paid attention lately, you have heard the Neo-Cons talking about Russian Hacking and some comments regarding threats to the electrical grid. What I want you to understand is that they (The]]></description><link>http://direct.ecency.com/stuxnet/@wavechronicle/operation-olympic-games-is-the-neo-con-threat-on-technology</link><guid isPermaLink="true">http://direct.ecency.com/stuxnet/@wavechronicle/operation-olympic-games-is-the-neo-con-threat-on-technology</guid><category><![CDATA[stuxnet]]></category><dc:creator><![CDATA[wavechronicle]]></dc:creator><pubDate>Tue, 17 Jan 2017 12:48:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4FeQn68FwTyyhna26SQ7XdUfvbLqEXSsQa147e4C5yYU3dscc4TTXBeupZCdgrvxFTKst6ddkxsc9DUWrK4LYFmWMX65C1u8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[STUXNET]]></title><link>http://direct.ecency.com/stuxnet/@shah/stuxnet</link><guid isPermaLink="true">http://direct.ecency.com/stuxnet/@shah/stuxnet</guid><category><![CDATA[stuxnet]]></category><dc:creator><![CDATA[shah]]></dc:creator><pubDate>Thu, 14 Jul 2016 04:42:21 GMT</pubDate></item></channel></rss>