<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 17 Apr 2026 14:48:12 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/yehey/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[What to know about cryptocurrency and Bitcoin in the Philippines]]></title><description><![CDATA[Cryptocurrency is a digital or virtual asset designed to work as a medium of exchange. Bitcoin, the first and most well-known cryptocurrency, was created in 2009. Cryptocurrencies are decentralized, meaning]]></description><link>http://direct.ecency.com/bitcoin/@yehey/what-to-know-about-cryptocurrency-and-bitcoin-in-the-philippines</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@yehey/what-to-know-about-cryptocurrency-and-bitcoin-in-the-philippines</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Wed, 09 Nov 2022 15:18:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/5bEGgqZEHBMfEQPyFzZUJoXTMM3P78Fx9Wc1YC4iSyygfZfx6hg5TxtFjeh3Fetewo59H6AcwKfcDfnRfeFTAMERnvUv6g1t?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A day in life of Maynila local.]]></title><description><![CDATA[Assuming you would like a detailed description of a day in the life of a Maynila local: The day begins early in Maynila, with the sun rising over the cityscape at around 6am. The streets begin to fill]]></description><link>http://direct.ecency.com/travel/@yehey/a-day-in-life-of-maynila-local</link><guid isPermaLink="true">http://direct.ecency.com/travel/@yehey/a-day-in-life-of-maynila-local</guid><category><![CDATA[travel]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Thu, 13 Oct 2022 13:28:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/2923mN3pnd7PiB4j3jtRUKsfGBcxg2nZn5j8nhXsF8yQUq15YyKY2ukwrXsgxRupmpHdpy6jhDt1pKZmxs6PA5ySGjHPMwMknwT5WHcU47jC4W?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to hire a ethical hacker to penetration test your system]]></title><description><![CDATA[When looking to hire an ethical hacker, there are a few key things to consider. Firstly, you want to make sure that the ethical hacker has a good understanding of hacking methodologies and tools. Secondly,]]></description><link>http://direct.ecency.com/pentest/@yehey/how-to-hire-a-ethical-hacker-to-penetration-test-your-system</link><guid isPermaLink="true">http://direct.ecency.com/pentest/@yehey/how-to-hire-a-ethical-hacker-to-penetration-test-your-system</guid><category><![CDATA[pentest]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Tue, 11 Oct 2022 16:52:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/B69zEhWZA8UCJ1jKV5q8a1fcCbj7skbhkxM8R9MSAWrzkRv6TnRYXVPFFYxUyfdFXDzmRWxLrAD79Fb7eEA96ehSMMTuc8dKp1Y2J8Si?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How Robotics is Changing Cybersecurity]]></title><description><![CDATA[Robotics is changing the cybersecurity landscape in a number of ways. Firstly, the rapid pace of technological advancement is making it difficult for humans to keep up with the latest trends and developments]]></description><link>http://direct.ecency.com/cybersecurity/@yehey/how-robotics-is-changing-cybersecurity</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@yehey/how-robotics-is-changing-cybersecurity</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Thu, 06 Oct 2022 17:39:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/4PYjjVwJ1UdtK9g3SCsAP9dh88YmC3Jv6gYHL6t4Xre8zf9RhkS83WqtT7WbkF5cbQr7YV1WvhgTrp6ZFDSzf9wpfe1TUfBPwdsjfKiHxpv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What is Penetration Testing?]]></title><description><![CDATA[Penetration testing, also known as pen testing or ethical hacking, is the process of testing a computer system, network, or web application to find security vulnerabilities that an attacker could exploit.]]></description><link>http://direct.ecency.com/cybersecurity/@yehey/6jc9zs-what-is-penetration-testing</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@yehey/6jc9zs-what-is-penetration-testing</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Wed, 05 Oct 2022 17:55:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/4PYjjVwJ1UdtK9g3SCsAP9dh88YmC3Jv6gYHL6t4Xre8zf9RhkS83WqtT7WbkF5cbQr7YV1WvhgTrp6ZFDSzf9wpfe1N2FDiXAtkgm6F95Y?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What is Malware and How to Remove it]]></title><description><![CDATA[Malware is a type of software that is designed to damage or disable computers and computer systems. Malware is often spread through email attachments or by downloading infected files from the internet.]]></description><link>http://direct.ecency.com/malware/@yehey/what-is-malware-and-how-to-remove-it</link><guid isPermaLink="true">http://direct.ecency.com/malware/@yehey/what-is-malware-and-how-to-remove-it</guid><category><![CDATA[malware]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Mon, 03 Oct 2022 14:42:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/4PYjjVwJ1UdtK9g3SCsAP9dh88YmC3Jv6gYHL6t4Xre8zf9RhkS83WqtT7WbkF5cbQr7YV1WvhgTrp6ZFDSzf9wpfe1N1znM4Qz773P1p8N?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Bitcoin, Ethereum, and the Future of Cryptocurrency]]></title><description><![CDATA[The rise of Bitcoin and Ethereum has led to a renewed interest in cryptocurrency. Cryptocurrency is a type of digital asset that uses cryptography to secure its transactions and to control the creation]]></description><link>http://direct.ecency.com/bitcoin/@yehey/bitcoin-ethereum-and-the-future-of-cryptocurrency</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@yehey/bitcoin-ethereum-and-the-future-of-cryptocurrency</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Thu, 29 Sep 2022 03:20:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgtUBW1hdvoNBUuBZf9o7rQ3nGUfvgspKrrVs7mBD1vWsUfifgjUAytqJ6Xfgiisa2WS2wSokWHgN2CZm8Ni?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Robotics in the Cybersecurity Industry]]></title><description><![CDATA[Robotics in the cybersecurity industry is an exciting and growing field. Robotics can be used in a number of ways to help secure networks and data, as well as to respond to and investigate incidents. There]]></description><link>http://direct.ecency.com/robotics/@yehey/robotics-in-the-cybersecurity-industry</link><guid isPermaLink="true">http://direct.ecency.com/robotics/@yehey/robotics-in-the-cybersecurity-industry</guid><category><![CDATA[robotics]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Tue, 20 Sep 2022 14:03:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgtUBW1hdvoNBUuBZf9o7rQ3nGUfvgspKrrVs7mBD1vWsUfifgjUAytqJ6Xfgiisa2WS7HddXqXR9kciDS94?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What is Penetration Testing?]]></title><description><![CDATA[Penetration testing, also known as pen testing or ethical hacking, is the process of testing a computer system, network or web application to find vulnerabilities that could be exploited by malicious actors.]]></description><link>http://direct.ecency.com/blog/@yehey/what-is-penetration-testing</link><guid isPermaLink="true">http://direct.ecency.com/blog/@yehey/what-is-penetration-testing</guid><category><![CDATA[blog]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Tue, 20 Sep 2022 13:52:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgtUBW1hdvoNBUuBZf9o7rQ3nGUfvgspKrrVs7mBD1vWsUfifgjUAytqJ6Xfgiisa2WS2vCqbKDPBhHqfGdt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to recognize phishing emails and protect yourself from them]]></title><description><![CDATA[What is phishing? Phishing is a type of online fraud where criminals send fake emails or set up fake websites that mimic legitimate ones in order to trick people into giving them personal information such]]></description><link>http://direct.ecency.com/cybersecurity/@yehey/4whhem-how-to-recognize-phishing-emails-and-protect-yourself-from-them</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@yehey/4whhem-how-to-recognize-phishing-emails-and-protect-yourself-from-them</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Mon, 15 Aug 2022 00:51:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgtUBW1hdvoNBUuBZf9o7rQ3nGUfvgspKrrVs7mBD1vWsUfiXr59vm8SvwWmU6D4EiXjD8yxAGoigThrHVyx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The most popular tourist attractions in the Philippines.]]></title><description><![CDATA[The most popular tourist attractions in the Philippines. The beaches of Boracay The Banaue Rice Terraces The Chocolate Hills Taal Volcano Mayon Volcano Apo Reef Puerto Galera Tubbataha Reef Chimney Beach]]></description><link>http://direct.ecency.com/travel/@yehey/the-most-popular-tourist-attractions-in-the-philippines</link><guid isPermaLink="true">http://direct.ecency.com/travel/@yehey/the-most-popular-tourist-attractions-in-the-philippines</guid><category><![CDATA[travel]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Wed, 10 Aug 2022 14:33:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/MG5aEqKFcQiBkAGPKB4KXaMRJoTWa32zQZfXNfqPwgVC5DCvCAXUi1fE3FKAQNZxQUsyuTRzWTAVvc8MXRSyH8APgVuekvknJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to recognize phishing emails and protect yourself from them]]></title><description><![CDATA[What is phishing? Phishing is a type of online fraud where criminals send fake emails or set up fake websites that mimic legitimate ones in order to trick people into giving them personal information such]]></description><link>http://direct.ecency.com/phishing/@yehey/how-to-recognize-phishing-emails-and-protect-yourself-from-them</link><guid isPermaLink="true">http://direct.ecency.com/phishing/@yehey/how-to-recognize-phishing-emails-and-protect-yourself-from-them</guid><category><![CDATA[phishing]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Tue, 09 Aug 2022 14:24:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgtUBW1hdvoNBUuBZf9o7rQ3nGUfvgspKrrVs7mBD1vWsUfiXr59vm8SvwWmU6D4EiXjD8yxAGoigThrHVyx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[CLLEX supporting agricultural productivity now 96% completed.]]></title><description><![CDATA[The Department of Public Works and Highways (DPWH) is inching closer to delivering the entire 30-kilometer Central Luzon Link Expressway (CLLEX) Project which is 96 percent overall complete to date. Source:]]></description><link>http://direct.ecency.com/agriculture/@yehey/cllex-supporting-agricultural-productivity-now-96-completed</link><guid isPermaLink="true">http://direct.ecency.com/agriculture/@yehey/cllex-supporting-agricultural-productivity-now-96-completed</guid><category><![CDATA[agriculture]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Thu, 04 Aug 2022 14:28:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/gPCasciUWmF8XZHLFzR1SqEcRvDNjyHU8qnhNSt1wPz9QieabXuCVJYrLkhagCHATeNCrGhU7WwpJMjoPMfEjkGUYGk8MM181AE7Sr4DF7Qo9bt7oZERPNwiLxftRuM4TAPW6HsEwzu5LxbF8z?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Fast tracks road network to a better Marawi]]></title><description><![CDATA[A road network improvement project of the Department of Public Works and Highways (DPWH) will pave the way to a revitalized economy for the Islamic City of Marawi in Lanao Del Sur. Source: In his report]]></description><link>http://direct.ecency.com/philippines/@yehey/fast-tracks-road-network-to-a-better-marawi</link><guid isPermaLink="true">http://direct.ecency.com/philippines/@yehey/fast-tracks-road-network-to-a-better-marawi</guid><category><![CDATA[philippines]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Wed, 03 Aug 2022 13:58:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/3zpz8WQe4SNHNDsV61AQxy1u5NyscxfRgmcLhBfEB96TE7gpsHRPPhvTanBtCkrcH5oq2NgYmo5SZZN7xWkfjbTo1Su4aSxyWSLv6jGTWL15zWfei6CvJP4jEGrRPQRLV2qYmmzEQ9vjJFiPDLg6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Microsoft Defender Experts for Hunting]]></title><description><![CDATA[Microsoft Defender Experts for Hunting now generally available Announced in May, Defender Experts for Hunting provides businesses that already have Security Operation Centers (SOCs) but are also willing]]></description><link>http://direct.ecency.com/cybersecurity/@yehey/microsoft-defender-experts-for-hunting</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@yehey/microsoft-defender-experts-for-hunting</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Tue, 02 Aug 2022 18:55:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgtUBW1hdvoNBUuBZf9o7rQ3nGUfvgspKrrVs7mBD1vWfrcY1j9M78eijkshNTYe6MbcAiSyHGzPJmv4Gaez?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Windows, Adobe Zero-Days Used to Deploy Subzero Malware]]></title><description><![CDATA[Attacks With Subzero Surveillance Malware Microsoft reported Subzero attacks against Microsoft customers in Austria, the United Kingdom, and Panama. The targeted entities are law firms, banks, and strategic]]></description><link>http://direct.ecency.com/cybersecurity/@yehey/windows-adobe-zero-days-used-to-deploy-subzero-malware</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@yehey/windows-adobe-zero-days-used-to-deploy-subzero-malware</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Thu, 28 Jul 2022 18:12:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgtUBW1hdvoNBUuBZf9o7rQ3nGUfvgspKrrVs7mBD1vWsUfiQ1QqgYN4ZnVsFThEuQZ2RYUNq75iPbpDiZXL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices]]></title><description><![CDATA[CISA, the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) have released a joint Cybersecurity Advisory (CSA) to provide information on ways in which People’s Republic of China]]></description><link>http://direct.ecency.com/cybersecurity/@yehey/people-s-republic-of-china-state-sponsored-cyber-actors-exploit-network-providers-and-devices</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@yehey/people-s-republic-of-china-state-sponsored-cyber-actors-exploit-network-providers-and-devices</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Thu, 09 Jun 2022 02:54:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/mXkfdToSwHy2r6DnaxKSQhwQNCGuM1SAu1HqjZsC4zoftgyM7DVL9aHBuE3tV7V16QMy55ZGLsv4Wtm8WrEzgm96be9sQdMuxQqLpA846?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure]]></title><description><![CDATA[The cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom have released a joint Cybersecurity Advisory (CSA) to warn organizations that Russia’s invasion]]></description><link>http://direct.ecency.com/cybersecurity/@yehey/russian-state-sponsored-and-criminal-cyber-threats-to-critical-infrastructure</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@yehey/russian-state-sponsored-and-criminal-cyber-threats-to-critical-infrastructure</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Thu, 21 Apr 2022 03:23:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgtUBW1hdvoNBUuBZf9o7rQ3nGUfvgspKrrVs7mBD1vWsUfhzVRtwt4uUKTAba9nuUcuxE34zJtCUNw2E8NJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Department of State Rewards for Justice Program earn up to $10 Million]]></title><description><![CDATA[This joint Cybersecurity Advisory (CSA)—coauthored by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Energy (DOE)—provides]]></description><link>http://direct.ecency.com/cybersecurity/@yehey/department-of-state-rewards-for-justice-program-earn-up-to-usd10-million</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@yehey/department-of-state-rewards-for-justice-program-earn-up-to-usd10-million</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Wed, 30 Mar 2022 02:39:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBrGg5m7VJdLJL1Vg7qDG9UReSiAGnjnAFvMb1dHp8TdDo9KKVwxffasmtyvnJN4kmKrRqVXPn5MzQGCxiS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[32 Known Exploited Vulnerabilities added to the Catalog]]></title><description><![CDATA[CISA has added 32 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious]]></description><link>http://direct.ecency.com/cybersecurity/@yehey/32-known-exploited-vulnerabilities-added-to-the-catalog</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@yehey/32-known-exploited-vulnerabilities-added-to-the-catalog</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[yehey]]></dc:creator><pubDate>Tue, 29 Mar 2022 02:59:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBrGg5m7VJdLJL1Vg7qDG9UReSiAGnjnAFvMb1dHp8TdDo9KKVwxffasmtyvnJN4kmKrRaq4GGyq8BYW9DQ?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>