<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 16 Apr 2026 22:45:41 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/vulnerabilities/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[The Spread Vector]]></title><description><![CDATA[Hi fellow Hiveians, Today I wanted to complain a little bit about more and more services. The Spread Vector Sadly, one of the things that we have not a lot of control over these days is the spread. What]]></description><link>http://direct.ecency.com/hive-147625/@cmplxty/the-spread-vector</link><guid isPermaLink="true">http://direct.ecency.com/hive-147625/@cmplxty/the-spread-vector</guid><category><![CDATA[hive-147625]]></category><dc:creator><![CDATA[cmplxty]]></dc:creator><pubDate>Sat, 14 Feb 2026 01:31:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/FUkUE5bzkAZT3HzV5tJDiU2ik81PCd4JCyhWnRcDN8XJsVFY3UNB8DCS9HcoBdSfCpUoew2odE8FKyGZrZSeZN35UNbh4omkDvqEGKvj5mvJD2ARuZHYhyTvKkxxMQhensNhq9NFmLQGUprsKa9r1hWorMv3TzV21MDG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Keeping HIVE and it's Projects safe - My Sunday dedicated to more secure Frontends on HIVE.]]></title><description><![CDATA[Many of you already know what I do on the side. I spend a good amount of my free time doing security analysis and penetration testing on web applications here in our Hive ecosystem. I do this voluntarily,]]></description><link>http://direct.ecency.com/hive-139531/@louis88/keeping-hive-and-its-projects-safe-my-sunday-dedicated-to-more-secure-frontends-on-hive</link><guid isPermaLink="true">http://direct.ecency.com/hive-139531/@louis88/keeping-hive-and-its-projects-safe-my-sunday-dedicated-to-more-secure-frontends-on-hive</guid><category><![CDATA[hive-139531]]></category><dc:creator><![CDATA[louis88]]></dc:creator><pubDate>Sun, 10 Aug 2025 15:59:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/26uUsAjKTsXCDw7zixZR182JbFKvgzJ9YwsFpTVcRaGCmsqhA1unTgpqu735dj4JeujH4TT7w2u4eQvJLPutJocbpMKnctv14wo5dQ1KgHTcxJiZ3XqbGrwyfZeY51oYcZPJ4cCjbgH9PTTtXECkbq5vsaPZdkjWNMCFmY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Endor Labs, a startup offering tools to detect vulnerabilities in AI-Generated Code, closes $93 million in funding]]></title><description><![CDATA[We may have heard on more than one occasion the term “Vibe Coding”, which has become popular in social networks. It suggests a new way of “programming”, in which the programmer is driven by the AI's ability]]></description><link>http://direct.ecency.com/hive-196902/@vikvitnik/endor-labs-a-startup-offering-tools-to-detect-vulnerabilities-in-aigenerated-code-closes-93-million-in-funding-gdy</link><guid isPermaLink="true">http://direct.ecency.com/hive-196902/@vikvitnik/endor-labs-a-startup-offering-tools-to-detect-vulnerabilities-in-aigenerated-code-closes-93-million-in-funding-gdy</guid><category><![CDATA[hive-196902]]></category><dc:creator><![CDATA[vikvitnik]]></dc:creator><pubDate>Wed, 23 Apr 2025 15:50:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/Zskj9C56UonZ32MeESG7FjGD4N6EvzmNPVhtuzSFkfJHUgivzui1J35CeRgSxbVtHnRU5FeXNea16si7CEMD8oXVZ3Gy91PSd1JYjDEByW6RZEdYYcgW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Insidious Inputs - Three Types of Common Software Vulnerabilities (Video Version)]]></title><description><![CDATA[Software #vulnerabilities are a big part of security. Learn about path traversal, cross-site scripting, and buffer overflows with this free and open-licensed #tutorial, including example code demos!]]></description><link>http://direct.ecency.com/hive-169321/@chaintuts/insidious-inputs-three-types-of-common-software-vulnerabilities-video-version</link><guid isPermaLink="true">http://direct.ecency.com/hive-169321/@chaintuts/insidious-inputs-three-types-of-common-software-vulnerabilities-video-version</guid><category><![CDATA[hive-169321]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Sun, 12 Jan 2025 20:57:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eALcGoZeRfUtJNK6KJn53TBKhqf3Y5HzWvi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Insidious Inputs - Three Common Types of Software Vulnerabilities]]></title><description><![CDATA[Curious about how attackers exploit vulnerable software, and how those vulnerabilities work? My latest free and open licensed #tutorial dives into three common software #vulnerabilities - the #coding process,]]></description><link>http://direct.ecency.com/hive-169321/@chaintuts/insidious-inputs-three-common-types-of-software-vulnerabilities</link><guid isPermaLink="true">http://direct.ecency.com/hive-169321/@chaintuts/insidious-inputs-three-common-types-of-software-vulnerabilities</guid><category><![CDATA[hive-169321]]></category><dc:creator><![CDATA[chaintuts]]></dc:creator><pubDate>Tue, 07 Jan 2025 13:42:03 GMT</pubDate></item><item><title><![CDATA[Understanding DeFi Protocol Vulnerabilities: Analyzing the Recent Harbor Hacks]]></title><description><![CDATA[DeFi doesn’t functions like traditional financial systems that depends on centralized intermediaries like banks. It supports decentralized ecosystem and functions on blockchain technology in the field]]></description><link>http://direct.ecency.com/hive-167922/@mgibson/understanding-defi-protocol-vulnerabilities-analyzing-the-recent-harbor-hacks</link><guid isPermaLink="true">http://direct.ecency.com/hive-167922/@mgibson/understanding-defi-protocol-vulnerabilities-analyzing-the-recent-harbor-hacks</guid><category><![CDATA[hive-167922]]></category><dc:creator><![CDATA[mgibson]]></dc:creator><pubDate>Tue, 22 Aug 2023 21:03:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/2ai8Wx7yRZDoVnrPeLp34wg9mSZATi1hDroFsgT8PPezXTXPamVbdsP1W49BPhj5m7EiRLxiAFLEkJjSRXT5eTqFg8YUCrbfY25g1C37DE96X9oox4xU4nR2pkLDSh5eefjR5FNtpCmxMWpCCvCpG8nMqpAFhcmDKJrzLvmsZbSrNXgCaVQGvmckg2b6uiVj1UF3r7MEHREeCNKFP8n2on5xPtwuF494pe?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[(JaiChai) "Copy and Paste at your own peril.."]]></title><description><![CDATA[*A rare, signed, higher resolution and non-watermarked version of this image is available for download at: Imitation is the sincerest form of flattery that mediocrity can pay to greatness. - Oscar Wilde.]]></description><link>http://direct.ecency.com/proofofbrain/@jaichai/jaichai-copy-and-paste-at-your-own-peril</link><guid isPermaLink="true">http://direct.ecency.com/proofofbrain/@jaichai/jaichai-copy-and-paste-at-your-own-peril</guid><category><![CDATA[proofofbrain]]></category><dc:creator><![CDATA[jaichai]]></dc:creator><pubDate>Wed, 06 Jul 2022 06:01:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/99pyU5Ga1kwqSXWA2evTexn6YzPHotJF8R85JZsErvtTWXjKx8W8xaykP7mpZtYtySNecbEBTEfNVURubuKnrBvpxHPiLe9yRNaYJRvuifaMz8Hkeh4nCY8JaJKkx7bR1w?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Recent trend on exchange hacking...]]></title><description><![CDATA[A lot of smaller exchanges have been hacked in last few years. A new trend in hacking has been to target machines used to maintain exchanges instead of trying to hack the exchange itself... A lot of exchange]]></description><link>http://direct.ecency.com/exchanges/@mtl1979/recent-trend-on-exchange-hacking</link><guid isPermaLink="true">http://direct.ecency.com/exchanges/@mtl1979/recent-trend-on-exchange-hacking</guid><category><![CDATA[exchanges]]></category><dc:creator><![CDATA[mtl1979]]></dc:creator><pubDate>Sun, 05 Jun 2022 00:13:15 GMT</pubDate></item><item><title><![CDATA[32 Known Exploited Vulnerabilities added to the Catalog]]></title><description><![CDATA[CISA has added 32 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious]]></description><link>http://direct.ecency.com/cybersecurity/@yehey/32-known-exploited-vulnerabilities-added-to-the-catalog</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@yehey/32-known-exploited-vulnerabilities-added-to-the-catalog</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Tue, 29 Mar 2022 02:59:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBrGg5m7VJdLJL1Vg7qDG9UReSiAGnjnAFvMb1dHp8TdDo9KKVwxffasmtyvnJN4kmKrRaq4GGyq8BYW9DQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Hacker News Critical Security Flaws Reported in Moxa MXview Network Management Software]]></title><description><![CDATA[Multiple critical vulnerabilities have been discovered in Moxa MXview web-based industrial network management #software, some of which could be exploited by an unauthenticated attacker to execute remote]]></description><link>http://direct.ecency.com/critical/@robert-ideas/hacker-news-critical-security-flaws</link><guid isPermaLink="true">http://direct.ecency.com/critical/@robert-ideas/hacker-news-critical-security-flaws</guid><category><![CDATA[critical]]></category><dc:creator><![CDATA[robert-ideas]]></dc:creator><pubDate>Fri, 11 Mar 2022 20:27:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/9vWp6aU4y8kx949aDJ3YMzVLdPdgysaSmkB2s8acY5UMPNTumuG3JwaK4p55TSUhy2tXqnAh5QEnCcaiHDPPP3W1qZBSpSJyP1BdnZZMD5wia2Gp8pnFzS19uRpo6mEVFMZ3WvdiDX712RegE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[IT AUDITS ARE NOT THE ULTIMATE ANSWER]]></title><description><![CDATA[So I had a question regarding audits making one secure. The question related to my article and post here Security Testing for Your SMB: What You Need to Know. I will stick to my arena of experience in]]></description><link>http://direct.ecency.com/hive-163521/@joerhino/it-audits-are-not-the-ultimate-answer</link><guid isPermaLink="true">http://direct.ecency.com/hive-163521/@joerhino/it-audits-are-not-the-ultimate-answer</guid><category><![CDATA[hive-163521]]></category><dc:creator><![CDATA[joerhino]]></dc:creator><pubDate>Mon, 18 Oct 2021 12:49:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/4HFqJv9qRjVecs4xkhd5EvhidWEEBnn9tCVDBkBhQpUFvab78MhbU1VtZSKwF4zyoF64vdVERXnKzq8BgJHVsneznzCKHqdvL4JSyPQDBZ92jqZTMHWZjbiY7bF994g2c6Y9Fx6HFB2CW2dyaQnb6ntRLJSM5NTKDUA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Security Testing for Your SMB: What You Need to Know]]></title><description><![CDATA[Everyone wants to keep their IT in tip-top form. Your business technology aids in both profitability and efficiency. You do not want to be messing with downtime. You also want to avoid violating any industry]]></description><link>http://direct.ecency.com/hive-196387/@joerhino/securitytestingforyoursmbwhatyouneedtoknow-j9mfxcp6jmlm3y9hpsng</link><guid isPermaLink="true">http://direct.ecency.com/hive-196387/@joerhino/securitytestingforyoursmbwhatyouneedtoknow-j9mfxcp6jmlm3y9hpsng</guid><category><![CDATA[hive-196387]]></category><dc:creator><![CDATA[joerhino]]></dc:creator><pubDate>Sun, 17 Oct 2021 08:39:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/5s4dzRwnVbzGY5ssnCE4wXzkeAEXyVtgk1ApQTwHMTp6y5PvEo1yennAQMBNGtBVAxkcS5W89pnZE7k5FTAvEfjo6RL6U2GpqYqV51dh7GABvQxyzVSSLKFpDpnyhF3Wnw4DsqaVVhq6tcV4LTW43bfd86Yy926N5wt1bF4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Analysis of a Phishing Kit (that targets Chase Bank)]]></title><description><![CDATA[Emsisoft has released a decryptor for the SynAck Ransomware, allowing victims to decrypt their encrypted files for free. The SynAck ransomware gang launched its operation in 2017 but rebranded as the El_Cometa]]></description><link>http://direct.ecency.com/cybersecurity/@yehey/analysis-of-a-phishing-kit-that-targets-chase-bank</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@yehey/analysis-of-a-phishing-kit-that-targets-chase-bank</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Fri, 03 Sep 2021 12:40:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/4PYjjVwJ1UdtK9g3SCsAP9dh88YmC3Jv6gYHL6t4Xre8zf9RhkS83WqtT7WbkF5cbQquvRpzomseELNN4aNu2VXgJhtLgCosk1gXimsyDvN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Open Source CyberSecurity News - Hacking a Capsule Hotel]]></title><description><![CDATA[Black Hat 2021, “Hacking a Capsule Hotel – Ghost in the Bedrooms,” by Supa A series of vulnerabilities in internet of things (IoT) devices often found in connected hotel rooms allowed a researcher to take]]></description><link>http://direct.ecency.com/cybersecurity/@yehey/open-source-cybersecurity-news-hacking-a-capsule-hotel</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@yehey/open-source-cybersecurity-news-hacking-a-capsule-hotel</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Fri, 06 Aug 2021 02:40:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/4PYjjVwJ1UdtKAq2WyhzTEQamG912QZLtsfCJ4QLATh55ugLg6FEuyweVWGwVjiYwBfDBdRqPYUFJorH27cSV3veY3Vsr4Fnq3dTpdWh9kz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[WhatsApp Bug (Or Maybe A Feature) Leaks Users Numbers In Google Search]]></title><description><![CDATA[While WhatsApp is becoming popular for online businesses, especially amidst the global lockdown due to COVID-19, a glitch has raised privacy concerns. Reportedly, a WhatsApp bug exists in the ‘Click to]]></description><link>http://direct.ecency.com/bug/@twr/whatsappbugormaybeafeatureleaksusersnumbersingooglesearch-ytpk7ze2dr</link><guid isPermaLink="true">http://direct.ecency.com/bug/@twr/whatsappbugormaybeafeatureleaksusersnumbersingooglesearch-ytpk7ze2dr</guid><category><![CDATA[bug]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 14 Jun 2020 15:00:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/W5LtFUPm6g74PZrFnfR5MF4Wk1AKp8CVSVz4LSigFZBtwAVsKk3wJtX1mEKiTVZVswkfspvhUayLfEFdoXNynkS8t4q91o3EnSTxCRRj9dSeVGVJ9uCzyZRwgHamXTpbiq6EMDB7mezkB5Pcg7opp8m76MHVY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[2-19-2020_We_6.35pm_Information Security Risks Access Controls Mitigation Threats Warehouse Hierarchy Sources]]></title><description><![CDATA[2-19-2020_We_6.35pm_Information Security Risks Controls Warehouse Hierarchy Sources Streamyard participate streamyard.com/m3i3sr9rh5 View www.youtube.com/watch?v=WRJtjU2DT-0]]></description><link>http://direct.ecency.com/infosec/@thepsychco/2-19-2020we6-35pminformation-security-risks-access-controls-mitigation-threats-warehouse-hierarchy-sources</link><guid isPermaLink="true">http://direct.ecency.com/infosec/@thepsychco/2-19-2020we6-35pminformation-security-risks-access-controls-mitigation-threats-warehouse-hierarchy-sources</guid><category><![CDATA[infosec]]></category><dc:creator><![CDATA[thepsychco]]></dc:creator><pubDate>Tue, 18 Feb 2020 22:13:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eB7HJJVYoRMYyr1devLDyN7C9fGSuSWSHnW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Millions of patient data records could be easily accessible in the internet!]]></title><description><![CDATA[IMG SRC Not very surprising to many in the InfoSec business but maybe an "eye opener" to the masses that this has made mainstream headlines in one of the most popular tv news shows in Germany.]]></description><link>http://direct.ecency.com/infosec/@doifeellucky/millions-of-patient-data-records-could-be-easily-accessible-in-the-internet</link><guid isPermaLink="true">http://direct.ecency.com/infosec/@doifeellucky/millions-of-patient-data-records-could-be-easily-accessible-in-the-internet</guid><category><![CDATA[infosec]]></category><dc:creator><![CDATA[doifeellucky]]></dc:creator><pubDate>Mon, 10 Feb 2020 12:39:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/X37EMQ9WSwsLaUVnWj5v4rfuehQsoVtukrb5zwdXbo5aA1Ad39Ag3xeAuev33LExpRqyBByfthe5CQgD7v4ZNo5poPTDgFphXzP8r?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[in part via threatpost.com: How to Secure Critical Infrastructure When Patching Isn’t Possible... by me... what you can learn from that!]]></title><description><![CDATA[Author: Threatpost Mission-critical systems can’t just be switched off to apply security updates — so patching can take weeks if not years. By Amir Levintal, Infosec Insider Cyberattacks are on the rise]]></description><link>http://direct.ecency.com/infosec/@doifeellucky/in-part-via-threatpost-com-how-to-secure-critical-infrastructure-when-patching-isn-t-possible-by-me-what-you-can-learn-from-that</link><guid isPermaLink="true">http://direct.ecency.com/infosec/@doifeellucky/in-part-via-threatpost-com-how-to-secure-critical-infrastructure-when-patching-isn-t-possible-by-me-what-you-can-learn-from-that</guid><category><![CDATA[infosec]]></category><dc:creator><![CDATA[doifeellucky]]></dc:creator><pubDate>Tue, 12 Nov 2019 02:00:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/X37EMQ9WSwsLaUVnWj5v4rfuehQsoVtukrb5zwdXbo5aA1Ad39Ag3xeAuev33LExpRqyBByfthe5ChtiFVTwDeZCfGaJtcydoYUXQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[via threatpost.com: Understanding the Ripple Effect: Large Enterprise Data Breaches Threaten Everyone]]></title><description><![CDATA[Author: Tara Seals Fallout from giants at the top is one of the largest drivers of cyber-impacts on everyday people and companies. Big businesses are constantly under attack, and that affects everyone]]></description><link>http://direct.ecency.com/breach/@doifeellucky/via-threatpost-com-understanding-the-ripple-effect-large-enterprise-data-breaches-threaten-everyone</link><guid isPermaLink="true">http://direct.ecency.com/breach/@doifeellucky/via-threatpost-com-understanding-the-ripple-effect-large-enterprise-data-breaches-threaten-everyone</guid><category><![CDATA[breach]]></category><dc:creator><![CDATA[doifeellucky]]></dc:creator><pubDate>Sat, 09 Nov 2019 21:44:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/X37EMQ9WSwsLaUVnWj5v4rfuehQsoVtukrb5zwdXbo5aA1Ad39Ag3xeAuev33LExpRqyBByfthe5BCvyYsGn4rq4K22b1jbroybyp?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[via threatpost.com: Pwn2Own Expands Into Industrial Control Systems Hacking]]></title><description><![CDATA[Author: Lindsey O'Donnell White-hat hackers will now have the chance to win $20,000 for sniffing out remote code-execution flaws in industrial control systems. Industrial control systems (ICS) used to]]></description><link>http://direct.ecency.com/infosec/@doifeellucky/via-threatpost-com-pwn2own-expands-into-industrial-control-systems-hacking</link><guid isPermaLink="true">http://direct.ecency.com/infosec/@doifeellucky/via-threatpost-com-pwn2own-expands-into-industrial-control-systems-hacking</guid><category><![CDATA[infosec]]></category><dc:creator><![CDATA[doifeellucky]]></dc:creator><pubDate>Tue, 29 Oct 2019 08:02:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/X37EMQ9WSwsLaUVnWj5v4rfuehQsoVtukrb5zwdXbo5aA1Ad39Ag3xeAuev33LExpRqyBByfthe5D7dvNVavFMVrzEq7idK1uujae?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>