<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Spyware Techie &#187; Spread</title>
	<atom:link href="https://spyware-techie.com/tag/spread/feed" rel="self" type="application/rss+xml" />
	<link>https://spyware-techie.com</link>
	<description>A techie’s take on Spyware.</description>
	<lastBuildDate>Mon, 28 Dec 2020 09:27:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5</generator>
		<item>
		<title>FreeHosting APT PowerSploit Poison Ivy Continues to Spread</title>
		<link>https://spyware-techie.com/freehosting-apt-powersploit-poison-ivy-continues-to-spread</link>
		<comments>https://spyware-techie.com/freehosting-apt-powersploit-poison-ivy-continues-to-spread#comments</comments>
		<pubDate>Wed, 28 Nov 2018 13:34:25 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[FreeHosting]]></category>
		<category><![CDATA[Poison Ivy]]></category>
		<category><![CDATA[PowerSploit]]></category>
		<category><![CDATA[Spread]]></category>

		<guid isPermaLink="false">https://spyware-techie.com/?p=218424</guid>
		<description><![CDATA[FreeHosting APT PowerSploit Poison Ivy is a mouthful indeed. The “APT” part in the name stands for Advanced Persistent Threat. The “PowerSploit” points to Microsoft PowerShell scripts that are used for the attack. Finally, “Poison Ivy” represents a highly researched, &#8230; <a href="https://spyware-techie.com/freehosting-apt-powersploit-poison-ivy-continues-to-spread">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/freehosting-apt-powersploit-poison-ivy-continues-to-spread/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Jbifrost Is Back Phishing Emails Spread A Version Of Adwind Rat</title>
		<link>https://spyware-techie.com/jbifrost-is-back-phishing-emails-spread-a-version-of-adwind-rat</link>
		<comments>https://spyware-techie.com/jbifrost-is-back-phishing-emails-spread-a-version-of-adwind-rat#comments</comments>
		<pubDate>Mon, 09 Apr 2018 06:59:33 +0000</pubDate>
		<dc:creator>Scott</dc:creator>
				<category><![CDATA[Security News]]></category>
		<category><![CDATA[Adwind Rat]]></category>
		<category><![CDATA[Emails]]></category>
		<category><![CDATA[Jbifrost]]></category>
		<category><![CDATA[Spread]]></category>

		<guid isPermaLink="false">http://www.spyware-techie.com/?p=211121</guid>
		<description><![CDATA[Over the last few months we have seen several cases of Remote Access Trojan (RAT) infections, and here we would like to cover at least two cases that stood out for us. The first case is about the Adwind RAT &#8230; <a href="https://spyware-techie.com/jbifrost-is-back-phishing-emails-spread-a-version-of-adwind-rat">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>https://spyware-techie.com/jbifrost-is-back-phishing-emails-spread-a-version-of-adwind-rat/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
