<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 16:08:56 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/turla/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Puppet Strings - Dirty Secret for Windows Ring 0 Code Execution]]></title><description><![CDATA[This is an adaptation for Steemit of Zerosum0x0. if you want to have it in HTML format you can see it here. Update July 3, 2017: FuzzySec has also previously written some info about this. Ever since I]]></description><link>http://direct.ecency.com/wannacry/@securitynews/puppet-strings-dirty-secret-for-windows-ring-0-code-execution</link><guid isPermaLink="true">http://direct.ecency.com/wannacry/@securitynews/puppet-strings-dirty-secret-for-windows-ring-0-code-execution</guid><category><![CDATA[wannacry]]></category><dc:creator><![CDATA[securitynews]]></dc:creator><pubDate>Fri, 13 Apr 2018 18:29:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/LcTxR7u1XKacLcGJL91mjTxm8XdQpmAMPJCjoc8VHnV6p7NgWciknQj81bRYxXeXCKKnLRXgLgzLehTFWepN6Qy8nrvtjUCWKuxYxEDEf6DZ6U1mhTAXEQkofUf9wV1ZvdGNgkvB51icnaMJsjoxhzD2s?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>