<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 15 Apr 2026 17:27:32 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/vulnerability/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Anthropic Claude Mythos Will Break Vulnerability Management]]></title><description><![CDATA[Anthropic’s latest AI Model, Claude Mythos, will break the cybersecurity vulnerability management operational models. Mythos is so good at discovering and building viable exploits it is currently being]]></description><link>http://direct.ecency.com/ai/@mrosenquist/anthropic-claude-mythos-will-break-vulnerability-management</link><guid isPermaLink="true">http://direct.ecency.com/ai/@mrosenquist/anthropic-claude-mythos-will-break-vulnerability-management</guid><category><![CDATA[ai]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 10 Apr 2026 19:14:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeTcwfbUKKAkzgNpEb5wN4PcNKV5UF5aVMCJ65CVNZLAyGnVbn8ZBeWDnuF68YKzZavFFN8Y5KPapDZ1S1YWnrm4r?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[AI Shocks the Cybersecurity Market]]></title><description><![CDATA[The cybersecurity market was jolted last week after Anthropic dropped a bombshell announcement. The company’s new AI Claude model identified 500 previously unknown high-risk vulnerabilities hidden in widely]]></description><link>http://direct.ecency.com/ai/@mrosenquist/ai-shocks-the-cybersecurity-market</link><guid isPermaLink="true">http://direct.ecency.com/ai/@mrosenquist/ai-shocks-the-cybersecurity-market</guid><category><![CDATA[ai]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 25 Feb 2026 23:43:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgqyc52TdHnx88BjGJXpnzxmEnB8yNLCo37xWGfMtGtRsLqSfLAmYJTvywumjJbvLPbuHBiugh1K36qZ6Tb4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[AI Exploiting Vulnerabilities]]></title><description><![CDATA[​ AI tools are transforming the discovery of software vulnerabilities! The recent Anthropic announcement showcases the capabilities, finding over 500 high-severity vulnerabilities that evaded traditional]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/ai-exploiting-vulnerabilities</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/ai-exploiting-vulnerabilities</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 23 Feb 2026 21:20:33 GMT</pubDate></item><item><title><![CDATA[Vulnerabilidad (es/en)]]></title><description><![CDATA[Vulnerabilidad Foto de mi propiedad Hola amigos de Holus Lotus como de costumbre traigo un escrito reflexivo sobre la vulnerabilidad y porque es importante para nuestra salud mental. Sé que muchas veces]]></description><link>http://direct.ecency.com/hive-131951/@frankblack/vulnerabilidad-esen</link><guid isPermaLink="true">http://direct.ecency.com/hive-131951/@frankblack/vulnerabilidad-esen</guid><category><![CDATA[hive-131951]]></category><dc:creator><![CDATA[frankblack]]></dc:creator><pubDate>Mon, 23 Feb 2026 17:14:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/5s4dzRwnVbzGY5ssnCE4wXzkeAEXyVtgk1ApQTwHMTp6y5PvEo1yenn9ZEvn6WYTTrKaRZ536N9Rxs1CYzEWLU3ajUDNTvyhsk6exsZFZm5Wy3MAwWSCqo9TnvTAFiTNKBkd3SgrefG9xAnYfJTuwatbAPKuhLoG3P76auL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[CISO Red-Teams the AI Tools to Protect the Company]]></title><description><![CDATA[This is smart: a financial sector CISO recognizes the inherent risks of MCPs, that are used by agentic AIs, and role-plays the attackers to find vulnerabilities to protect the overall environment! Focusing]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/ciso-red-teams-the-ai-tools-to-protect-the-company</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/ciso-red-teams-the-ai-tools-to-protect-the-company</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 14 Jan 2026 04:01:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/DVAkPJXe6RxY48CySGyMgEaH7xWm9Z83SNwGpF4GNCZ5MiYZHtb8Vsydyr1TozzshM3ufWXH3oPx1U?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[2026 Cybersecurity prediction #2 - AI Accelerates Vulnerability Exploitation]]></title><description><![CDATA[2026 Cybersecurity prediction #2 (of the Top 10) - AI Accelerates Vulnerability Exploitation.Automated discovery and exploit generation at machine speed shrinks time-to-patch windows dramatically. This]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/2026-cybersecurity-prediction-2-ai-accelerates-vulnerability-exploitation</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/2026-cybersecurity-prediction-2-ai-accelerates-vulnerability-exploitation</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Tue, 06 Jan 2026 19:55:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrULVeHM9ZqC5BaoHUySeJaSDGPHzW9HPzgvMKbVDTi6rMfE5ptyA64a9a6vNLNXPdcbQXCryAj9yytAJBVFWZ35zVC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[ Artificial Intelligence can be fooled with poems.]]></title><description><![CDATA[Artificial Intelligence can be fooled with poems. AI The gap was in front of everyone, but no one believed it would work. The DexAI group, together with the Sapienza University of Rome, showed that dangerous]]></description><link>http://direct.ecency.com/hive-177682/@necho41/-artificial-intelligence-can-be-fooled-with-poems-bj4</link><guid isPermaLink="true">http://direct.ecency.com/hive-177682/@necho41/-artificial-intelligence-can-be-fooled-with-poems-bj4</guid><category><![CDATA[hive-177682]]></category><dc:creator><![CDATA[necho41]]></dc:creator><pubDate>Sun, 04 Jan 2026 01:56:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQGVruTmsh33MiZ3zi2D2QZ2U8rEuHBgpjgRc423LQrk6ytdbVpxnaTDBMFkrw8cbitoscERKXc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Top 10 Cybersecurity Predictions for 2026]]></title><description><![CDATA[2026 will be a transformational year for cybersecurity, fueled by Artificial Intelligence. This is the full Top 10 Cybersecurity Predictions video. By the end, you will see how the maneuvering of the threat]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/hhk4c-top-10-cybersecurity-predictions-for-2026</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/hhk4c-top-10-cybersecurity-predictions-for-2026</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 01 Jan 2026 23:50:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/5bEGgqZEHBMeGRd9g1Ftt6p1G41Xe4xr5KhP3jS4uzStYfBtn4BM9jsy9bmiEbsRwnt5bS34yGckqJUNV9qMPkCQjt32qdbK?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[ Vulnerability, Robots hijackable by voice command.]]></title><description><![CDATA[Vulnerability, Robots hijackable by voice command. Image source: The warning is clear. And if a single word were enough to transform an intelligent robot into a weapon, even when disconnected from the]]></description><link>http://direct.ecency.com/hive-196387/@necho41/-vulnerability-robots-hijackable-by-voice-command-fmj</link><guid isPermaLink="true">http://direct.ecency.com/hive-196387/@necho41/-vulnerability-robots-hijackable-by-voice-command-fmj</guid><category><![CDATA[hive-196387]]></category><dc:creator><![CDATA[necho41]]></dc:creator><pubDate>Wed, 31 Dec 2025 23:54:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/4PYjjVwJ1UdtdbE4YMxKz4ZNxrtKwLE1uzPWU4qLXk6PzobG2JaRpXuiryPubu4tCCwc19MQJ9V4HWKSGdg1NuTM3tDsuJHrc5ipxVyRnEZ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Why Stories Outperform “5 Steps” Content]]></title><description><![CDATA[Why do personal stories perform so much better than generic "how-to" lists? According to my guest, LinkedIn expert Michaela Alexis, it comes down to basic biology. We are hardwired to connect through]]></description><link>http://direct.ecency.com/hive-125125/@acgalarza/mldsbpqs</link><guid isPermaLink="true">http://direct.ecency.com/hive-125125/@acgalarza/mldsbpqs</guid><category><![CDATA[hive-125125]]></category><dc:creator><![CDATA[acgalarza]]></dc:creator><pubDate>Fri, 12 Dec 2025 21:25:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/99pyU5Ga1kwr5bsMXthzYLbcngN4W2P8NtU9TWTdHC3HaQbjuuRfKKVdjVgYRq5xyNwKDjbhQY5ruSzwdyBRX4N4N9dkHwSE6zS2YyvvpQADniLqphrQ44B1b9TqbrvC5c?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Redefining Cyber Hygiene in a World of Continuous Threats]]></title><description><![CDATA[Managing cyber risks and system vulnerabilities in the face of rising threats, is becoming more challenging. Join me and Robert Leong, Senior Director of Product Management, HCL BigFix at HCLSoftware,]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/redefining-cyber-hygiene-in-a-world-of-continuous-threats</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/redefining-cyber-hygiene-in-a-world-of-continuous-threats</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 29 Oct 2025 06:08:21 GMT</pubDate></item><item><title><![CDATA[Pickpocketing your crypto wallets ]]></title><description><![CDATA[I can’t say I’ve ever seen an attack on crypto, on digital sovereignty itself, of this magnitude. It blows my mind to imagine how many people may have been robbed in just a few hours. The problem with]]></description><link>http://direct.ecency.com/hive-186392/@meno/pickpocketing-your-crypto-wallets</link><guid isPermaLink="true">http://direct.ecency.com/hive-186392/@meno/pickpocketing-your-crypto-wallets</guid><category><![CDATA[hive-186392]]></category><dc:creator><![CDATA[meno]]></dc:creator><pubDate>Tue, 09 Sep 2025 14:25:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/k75bsZMwYNu2L3iBMXq5y7xeiy1isFJsZxnMZSXuXEsxe4ee1cUkGyPeqsBDeyoNhYP6hqLShaHmbwZfAAjiKFELMXsFYY9kYsEQY71Y1Rp4GiXb2HYmSeduE7H2rNyV12N1okLMpiJ8BL79JDcZmLXN8W6Ri4saW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Understanding Human Error in Cybersecurity]]></title><description><![CDATA[In the realm of cybersecurity, human error accounts for 75% of breaches, yet it's not just about "stupid humans." Recent insights reveal that 10% of users contribute to 73% of risk, while over]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/understanding-human-error-in-cybersecurity</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/understanding-human-error-in-cybersecurity</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 04 Sep 2025 23:31:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45dtDY1M1UogLnAVUFY76Wei3qY3v3ou3ZCD4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Incarnadine]]></title><description><![CDATA[Incarnadine This post is a preview of something bigger and a larger project that I endeavor to do. Music plays such a huge role in my life, and I want to consider why. As a result, I am analysing my favourite]]></description><link>http://direct.ecency.com/hive-170744/@holoz0r/incarnadine</link><guid isPermaLink="true">http://direct.ecency.com/hive-170744/@holoz0r/incarnadine</guid><category><![CDATA[hive-170744]]></category><dc:creator><![CDATA[holoz0r]]></dc:creator><pubDate>Wed, 27 Aug 2025 14:54:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/26uUsAjKTsXCDw7zixZR182JbFKvgzJ9YwsFpTVcRaGCmsqhA1unTgpqhwpbL1z7d759zr6P7MPhA2eEonzqbyrsor18yd2VTSFVx2F2NYxAAExZ3brbZA4YYP8iBwiQ8tCr4NFFmnpD6eT8HMpxDxjeCaqfgrX6zJhvk6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[NO DATES WANTS WIFE! CALL IN SHOW]]></title><description><![CDATA[In this conversation, Stefan speaks with Bob, who struggles with emotional openness and vulnerability due to a traumatic childhood in a violent household. Despite a year of therapy, Bob finds it difficult]]></description><link>http://direct.ecency.com/reason/@stefan.molyneux/no-dates-wants-wife-call-in-show</link><guid isPermaLink="true">http://direct.ecency.com/reason/@stefan.molyneux/no-dates-wants-wife-call-in-show</guid><category><![CDATA[reason]]></category><dc:creator><![CDATA[stefan.molyneux]]></dc:creator><pubDate>Mon, 21 Jul 2025 15:30:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/32FTXiZsHoAWFxzgF7aevFQV6E69FQteY5wxrfE5ksSAG9wha5rCdakrrqHSeCdRbsf6cUAfzRCCFYtP7fdw59Lw6qRwFLHqcJbza1b9HaEbdq6ozr4AGN2phtubXxERTtevz7HjnzunDKDx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[ENG] [ESP] El cuerpo y la vulnerabilidad emocional | Body and emotional vulnerability 🧠]]></title><description><![CDATA[Para ver la versión en español, haz clic aquí Hey there, Hive!✨ Joining today's topic for daily challenges for thinking, I will answer the following question from my perspective as a psychologist (academically]]></description><link>http://direct.ecency.com/hive-186119/@mandysmoon/eng-esp-el-cuerpo-y-la-vulnerabilidad-emocional-body-and-emotional-vulnerability--3g2</link><guid isPermaLink="true">http://direct.ecency.com/hive-186119/@mandysmoon/eng-esp-el-cuerpo-y-la-vulnerabilidad-emocional-body-and-emotional-vulnerability--3g2</guid><category><![CDATA[hive-186119]]></category><dc:creator><![CDATA[mandysmoon]]></dc:creator><pubDate>Tue, 08 Jul 2025 22:19:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/2dk2RRM2dZ8gKjXsrozapsD83FxL3Xbyyi5LFttAhrXxr16mCe4arfLHwFmXWRzxGyNsMqDvrL4a2qMJCkYNenyoRpZobh52a6PR4U58DqF32tFUiXCh1iYuXZHd6jdNiPq8tvCb8iPMSSG8ZERMCejw81DHCnsPFZfXjAxCku?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Haiku and the Wisdom of Less]]></title><description><![CDATA[Hi everyone here, I’m really impressed by traditional haikus—I mean the ones that include a seasonal word (kigo) and a cutting word (kireji). I don’t know Japanese, and therefore I miss a lot—I miss everything]]></description><link>http://direct.ecency.com/hive-126152/@arnoldjean/haiku-and-the-wisdom-of</link><guid isPermaLink="true">http://direct.ecency.com/hive-126152/@arnoldjean/haiku-and-the-wisdom-of</guid><category><![CDATA[hive-126152]]></category><dc:creator><![CDATA[arnoldjean]]></dc:creator><pubDate>Fri, 06 Jun 2025 20:54:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/3DLAmCsuTe3bf3YJfXXmyAh7VWik7LRgWLXMEsfcXigLh1LZUsbB8oaRmKYKrDjscdTam4oEyafGkGKVcCsQR5k4BmZJNuAD81aSSdTzJQxiyXk3Yx9sZBvxjnWvtqRQPEGGn1wcucgz9kkzWHc6861a5iHkcxn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[NEW PREVIEW FOR SUPPORTERS - NO DATES WANTS WIFE! CALL IN SHOW]]></title><description><![CDATA[Subscribers get early previews for shows! In this conversation, Stefan speaks with Bob, who struggles with emotional openness and vulnerability due to a traumatic childhood in a violent household. Despite]]></description><link>http://direct.ecency.com/reason/@stefan.molyneux/new-preview-for-supporters-no-dates-wants-wife-call-in-show</link><guid isPermaLink="true">http://direct.ecency.com/reason/@stefan.molyneux/new-preview-for-supporters-no-dates-wants-wife-call-in-show</guid><category><![CDATA[reason]]></category><dc:creator><![CDATA[stefan.molyneux]]></dc:creator><pubDate>Mon, 05 May 2025 16:28:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/54TLbcUcnRm4Bw8fmw3Y3ebiYW61dkW16qTycFmLY3WgV3A1mBkvKmZGHH9X5vVn7tMkqEHA6xLEFpF2uYyPUjFecr8ub9Nhuf8PATjUwM99vhvesgSbiPj4xCrGMerFR63pDnC46?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Last Minute Save for the CVE Program]]></title><description><![CDATA[I am very glad that the Common Vulnerabilities and Exposures (CVE) program was re-funded by the US Government, specifically CISA (Cybersecurity and Infrastructure Security Agency), but this last-minute]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/last-minute-save-for-the-cve-program</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/last-minute-save-for-the-cve-program</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 17 Apr 2025 22:57:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeTcwfbUKKAkzgNpEb5uEvGoRyVHLTUMW89Mfjhm4uXyK8EWdr3X4uZzopDGXC6UhnAVTQi1MBH9Q3njYpCUMVdCS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Common Vulnerabilities and Exposures Database - CVE  Program at risk]]></title><description><![CDATA[I’ve been reporting security issues for many years, especially in apps and frontends on the Hive blockchain. One key tool I always rely on is the CVE program – the Common Vulnerabilities and Exposures]]></description><link>http://direct.ecency.com/cve/@louis88/the-common-vulnerabilities-and-exposures-database-cve-program-at-risk</link><guid isPermaLink="true">http://direct.ecency.com/cve/@louis88/the-common-vulnerabilities-and-exposures-database-cve-program-at-risk</guid><category><![CDATA[cve]]></category><dc:creator><![CDATA[louis88]]></dc:creator><pubDate>Wed, 16 Apr 2025 19:27:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/4HFqJv9qRjVecs4xkhd5EvhidWEEBnn9tCVDBkBhQpUFvab78MhbU1Vtr3r7USDHfoJrnWMppzVGThFJFqMkTtUb6jmMocyYWqyEFv1vpme6Y3PJAiCSVnjXdSGfqkS2XxDJ8PQt36harwWiNKbiFwtCVhgoqgPAYDk?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>