<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sat, 25 Apr 2026 10:32:21 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/trojans/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Remote Access Trojans spread through Microsoft Azure, AWS cloud service abuse]]></title><description><![CDATA[A Brief History of the Cybersecurity Profession Cybersecurity careers are in high demand, but a closer look at the timeline of network technology and the Internet reveals that this has virtually always]]></description><link>http://direct.ecency.com/cybersecurity/@yehey/remote-access-trojans-spread-through-microsoft-azure-aws-cloud-service-abuse</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@yehey/remote-access-trojans-spread-through-microsoft-azure-aws-cloud-service-abuse</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Thu, 13 Jan 2022 18:35:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgtUBW1hdvoNBUuBZf9o7rQ3nGUfvgspKrrVs7mBD1vWsUfhaySxDDmkNrQTwgcLuYgobSGMfpSjf3XbZ118?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[USC AD Lynn Swann shades Pac-12 with strength-of-schedule comments]]></title><description><![CDATA[There is a lot of talk about whether the Pac-12 is as good as some of the other Power-Five conferences in college football. Trojans athletic director Lynn Swann thinks something needs to be done to balance]]></description><link>http://direct.ecency.com/usc/@heytc/uscadlynnswannshadespac-12withstrength-of-schedulecomments-oplnf43qgp</link><guid isPermaLink="true">http://direct.ecency.com/usc/@heytc/uscadlynnswannshadespac-12withstrength-of-schedulecomments-oplnf43qgp</guid><category><![CDATA[usc]]></category><dc:creator><![CDATA[heytc]]></dc:creator><pubDate>Mon, 19 Feb 2018 21:04:06 GMT</pubDate></item><item><title><![CDATA[Free Online viruses, worms, trojans, and all kinds of malware scanner for both URL and files]]></title><description><![CDATA[VirusTotal is a website created by the Spanish security company Hispasec Sistemas. Launched in June 2004, it was acquired by Google Inc. in September 2012. Here you can scan all sorts of files for viruses,]]></description><link>http://direct.ecency.com/virus/@mm2k/free-online-viruses-worms-trojans-and-all-kinds-of-malware-scanner-for-both-url-and-files</link><guid isPermaLink="true">http://direct.ecency.com/virus/@mm2k/free-online-viruses-worms-trojans-and-all-kinds-of-malware-scanner-for-both-url-and-files</guid><category><![CDATA[virus]]></category><dc:creator><![CDATA[mm2k]]></dc:creator><pubDate>Mon, 29 Jan 2018 12:30:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pQYiuVvgYiUBP16WHGGN7UNn1BCdGe59bAi7J2yxNxLRArKMPp3qpURz8YnLDAap4rKU4uwedRhkNnJkJfQoEt8Vdox7xsPoNSVpxRh6JxzYpn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Criminals Distribute Banking Trojans Through Facebook’s CDN Servers]]></title><description><![CDATA[t is well-known that a lot of malware attacks can be distributed through social media. Clicking nefarious link or opening attachments sent through a direct message are two somewhat common attack vectors.]]></description><link>http://direct.ecency.com/banking/@driscollco/criminals-distribute-banking-trojans-through-facebook-s-cdn-servers</link><guid isPermaLink="true">http://direct.ecency.com/banking/@driscollco/criminals-distribute-banking-trojans-through-facebook-s-cdn-servers</guid><category><![CDATA[banking]]></category><dc:creator><![CDATA[driscollco]]></dc:creator><pubDate>Mon, 11 Sep 2017 13:07:03 GMT</pubDate></item><item><title><![CDATA[LEARN ETHICAL HACKING PART 5 : introduction to malware and trojans]]></title><description><![CDATA[hi peeps welcome back again for the ethical hacking tutorial, so in this tutorial we will be learning about malware and trojans and in the next video ill show how to set environment to begine the hacking]]></description><link>http://direct.ecency.com/malware/@sjpsteemit/learn-ethical-hacking-part-5-introduction-to-malware-and-trojans</link><guid isPermaLink="true">http://direct.ecency.com/malware/@sjpsteemit/learn-ethical-hacking-part-5-introduction-to-malware-and-trojans</guid><category><![CDATA[malware]]></category><dc:creator><![CDATA[sjpsteemit]]></dc:creator><pubDate>Thu, 07 Sep 2017 01:44:24 GMT</pubDate></item><item><title><![CDATA[Mobile Trojans Now Can Target Apps That Requires Card Payments]]></title><description><![CDATA[The mobile banking trojan which has recently been upgraded by having an additional ramsomware features to capture sensitive data and create a lock-down with the user files simultaneous has had another]]></description><link>http://direct.ecency.com/mobiles/@christo-xploit/mobile-trojans-now-can-target-apps-that-requires-card-payments</link><guid isPermaLink="true">http://direct.ecency.com/mobiles/@christo-xploit/mobile-trojans-now-can-target-apps-that-requires-card-payments</guid><category><![CDATA[mobiles]]></category><dc:creator><![CDATA[christo-xploit]]></dc:creator><pubDate>Sat, 19 Aug 2017 11:58:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/EEEoA8oLaAxvDZG9qYrsSvDqYeABF1GqkXYm2VenDdT455e3JenkT5XqjfiNqq4L5ow5KFt2cQrJPcFQR2A7DfjJheqXzzPSfkxhJjhu1DqmMvpvrsNPkeaR2jZKKfx34zcw7UCtyo4ksbfz26zLW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Experts linked WannaCry with the government of North Korea]]></title><description><![CDATA[The virus attack of WannaCry is gradually coming to naught, and antivirus companies, as well as specialists of various interested services, have the opportunity to study the worm and draw preliminary]]></description><link>http://direct.ecency.com/wannacry/@ialex/experts-linked-wannacry-with-the-government-of-north-korea</link><guid isPermaLink="true">http://direct.ecency.com/wannacry/@ialex/experts-linked-wannacry-with-the-government-of-north-korea</guid><category><![CDATA[wannacry]]></category><dc:creator><![CDATA[ialex]]></dc:creator><pubDate>Tue, 16 May 2017 14:43:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/8hHVpauQQYxf1UwfxCXZHx8X8d8ZgswjxiK3UMNcDBExZq9UgGNM9HmfNyL?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>