<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>AI security</title>
	<atom:link href="https://axisofeasy.com/tag/ai-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Sat, 28 Mar 2026 11:32:45 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>AI security</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 443: Apple Becomes The UK Government&#8217;s Favorite Compliance Officer</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer/?pk_campaign=feed&#038;pk_kwd=axisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer/?pk_campaign=feed&#038;pk_kwd=axisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 27 Mar 2026 22:00:27 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[agentic computing]]></category>
		<category><![CDATA[AI agents]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple patching]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[censorship circumvention]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[content restrictions]]></category>
		<category><![CDATA[credential harvesting]]></category>
		<category><![CDATA[Crunchyroll]]></category>
		<category><![CDATA[DarkSword]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[digital ID]]></category>
		<category><![CDATA[DNS automation]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[GCP credentials]]></category>
		<category><![CDATA[Ghostblade]]></category>
		<category><![CDATA[Ghostknife]]></category>
		<category><![CDATA[Ghostsaber]]></category>
		<category><![CDATA[GitHub leak]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[iOS 26.4]]></category>
		<category><![CDATA[iOS exploit]]></category>
		<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[LiteLLM]]></category>
		<category><![CDATA[Loblaw]]></category>
		<category><![CDATA[lockdown mode]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[MCP]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[nordvpn]]></category>
		<category><![CDATA[octoDNS]]></category>
		<category><![CDATA[Ofcom]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[OpenClaw]]></category>
		<category><![CDATA[outsourcing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Proton VPN]]></category>
		<category><![CDATA[pypi attack]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[systemd persistence]]></category>
		<category><![CDATA[Telus Digital]]></category>
		<category><![CDATA[third-party risk]]></category>
		<category><![CDATA[uk online safety act]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33524</guid>

					<description><![CDATA[Apple Becomes the UK Government's Favorite Compliance Officer,
easyDNS releases MCP server and skills for AI agents,
The Petabyte Pivot: Why Your Anime Habits are Now a Telco Tragedy... this and more in AofE  #443<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer&amp;action_name=%23AxisOfEasy%20443%3A%20Apple%20Becomes%20The%20UK%20Government%26%238217%3Bs%20Favorite%20Compliance%20Officer&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer/?pk_campaign=feed&#038;pk_kwd=axisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 433: Australia Moves To Enact Sweeping New Hate Speech And Extremism Laws</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 23:00:28 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[agentic AI]]></category>
		<category><![CDATA[AI impact]]></category>
		<category><![CDATA[AI model reconnaissance]]></category>
		<category><![CDATA[AI Red Teaming]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[AI Tooling Risks]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[antisemitism]]></category>
		<category><![CDATA[AsyncRAT]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[blockchain abuse]]></category>
		<category><![CDATA[burden of proof]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[C2 evasion]]></category>
		<category><![CDATA[Check Point Research]]></category>
		<category><![CDATA[Chinese threat actors]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cloudflare abuse]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[cyber extortion]]></category>
		<category><![CDATA[cybercrime-as-a-service]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[data breaches]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[DeadLock]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[developer layoffs]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[extremism legislation]]></category>
		<category><![CDATA[fintech security]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[generative AI abuse]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[government censorship]]></category>
		<category><![CDATA[Group-IB]]></category>
		<category><![CDATA[Hacker News]]></category>
		<category><![CDATA[hate speech laws]]></category>
		<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[law enforcement powers]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[LLM Exploits]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[micropayments]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Model Isolation Failures]]></category>
		<category><![CDATA[online speech]]></category>
		<category><![CDATA[open source software]]></category>
		<category><![CDATA[OS command injection]]></category>
		<category><![CDATA[parliament]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing campaigns]]></category>
		<category><![CDATA[Polygon]]></category>
		<category><![CDATA[Privacy & PII]]></category>
		<category><![CDATA[prohibited groups]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reclaim The Net]]></category>
		<category><![CDATA[RedVDS]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Secure AI Design]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[software sustainability]]></category>
		<category><![CDATA[SSH key theft]]></category>
		<category><![CDATA[SSRF attacks]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[supply-chain risk]]></category>
		<category><![CDATA[Tailwind CSS]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[voice cloning]]></category>
		<category><![CDATA[VoidLink]]></category>
		<category><![CDATA[Windows security patches]]></category>
		<category><![CDATA[X402 protocol]]></category>
		<category><![CDATA[zero-day vulnerabilities]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32970</guid>

					<description><![CDATA[Australia Moves to Enact Sweeping New Hate Speech and Extremism Laws,
Can x402 micropayments save Open Source Software?
Claude Cowork Exfiltrates Files ... this and more in AofE  #433<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&amp;action_name=%23AxisOfEasy%20433%3A%20Australia%20Moves%20To%20Enact%20Sweeping%20New%20Hate%20Speech%20And%20Extremism%20Laws&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 433: Australia Moves To Enact Sweeping New Hate Speech And Extremism Laws</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/#comments</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 23:00:09 +0000</pubDate>
				<category><![CDATA[AI security]]></category>
		<category><![CDATA[attack analysis]]></category>
		<category><![CDATA[Australia hate speech law]]></category>
		<category><![CDATA[BEC]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[Claude Cowork]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[CVE-2025-64155]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[DeadLock]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[FortiSIEM]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[January 2026]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[micropayments]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RCE]]></category>
		<category><![CDATA[RedVDS]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[VoidLink]]></category>
		<category><![CDATA[x402]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32986</guid>

					<description><![CDATA[Australia is moving to criminalize speech based on hypothetical harm. Meanwhile, Claude Co-Work is exfiltrating your files, and six critical attack stories expose systematic infrastructure failure - this is #AxisofEasy 433<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws%2F&amp;action_name=%23AxisOfEasy%20433%3A%20Australia%20Moves%20To%20Enact%20Sweeping%20New%20Hate%20Speech%20And%20Extremism%20Laws&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 392: AI Jailbreak Exposes Critical Flaws: Researchers Use Chatbots To Generate Malware With No Coding Experience</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-392-ai-jailbreak-exposes-critical-flaws-researchers-use-chatbots-to-generate-malware-with-no-coding-experience/?pk_campaign=feed&#038;pk_kwd=axisofeasy-392-ai-jailbreak-exposes-critical-flaws-researchers-use-chatbots-to-generate-malware-with-no-coding-experience&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-392-ai-jailbreak-exposes-critical-flaws-researchers-use-chatbots-to-generate-malware-with-no-coding-experience</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-392-ai-jailbreak-exposes-critical-flaws-researchers-use-chatbots-to-generate-malware-with-no-coding-experience/?pk_campaign=feed&#038;pk_kwd=axisofeasy-392-ai-jailbreak-exposes-critical-flaws-researchers-use-chatbots-to-generate-malware-with-no-coding-experience#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 21 Mar 2025 22:00:20 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[ad fraud]]></category>
		<category><![CDATA[AI jailbreak]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[Android security]]></category>
		<category><![CDATA[API vulnerabilities]]></category>
		<category><![CDATA[APT10]]></category>
		<category><![CDATA[Bitdefender]]></category>
		<category><![CDATA[BlackBasta]]></category>
		<category><![CDATA[Cato CTRL]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[ChatGPT tool]]></category>
		<category><![CDATA[Chrome infostealer]]></category>
		<category><![CDATA[CI/CD secrets]]></category>
		<category><![CDATA[Content Provider Abuse]]></category>
		<category><![CDATA[cryptocurrency miners]]></category>
		<category><![CDATA[CVE-2024-27564]]></category>
		<category><![CDATA[CVE-2024-55591]]></category>
		<category><![CDATA[CVE-2025-30066]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[DeepSeek]]></category>
		<category><![CDATA[edge-network vulnerability]]></category>
		<category><![CDATA[financial sector]]></category>
		<category><![CDATA[Fortinet firewall]]></category>
		<category><![CDATA[GenAI]]></category>
		<category><![CDATA[GitHub Action]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[government sector]]></category>
		<category><![CDATA[IAS Threat Lab]]></category>
		<category><![CDATA[jailbreak bypass]]></category>
		<category><![CDATA[LockBit]]></category>
		<category><![CDATA[Malicious Apps]]></category>
		<category><![CDATA[malware generation]]></category>
		<category><![CDATA[Microsoft Copilot]]></category>
		<category><![CDATA[MirrorFace]]></category>
		<category><![CDATA[Mora_001]]></category>
		<category><![CDATA[PAT compromise]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PHP vulnerability]]></category>
		<category><![CDATA[ransomware tactics]]></category>
		<category><![CDATA[RAT deployment]]></category>
		<category><![CDATA[Russian protection]]></category>
		<category><![CDATA[SSRF vulnerability]]></category>
		<category><![CDATA[state-sponsored attacks]]></category>
		<category><![CDATA[SuperBlack ransomware]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[tj-actions]]></category>
		<category><![CDATA[VenomRAT]]></category>
		<category><![CDATA[Veriti]]></category>
		<category><![CDATA[virtual hard disk malware]]></category>
		<category><![CDATA[Windows shortcut vulnerability]]></category>
		<category><![CDATA[zero-knowledge threat]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31275</guid>

					<description><![CDATA[AI Jailbreak Exposes Critical Flaws: Researchers Use Chatbots to Generate Malware with No Coding Experience,
Google Play Malware Campaign Exposes 60 Million Users to Ads and Phishing Attacks,
Threat Actors Exploit SSRF Vulnerability in Third-Party ChatGPT Tool, Targeting Financial and Government Sectors... this and more in AofE  #392<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-392-ai-jailbreak-exposes-critical-flaws-researchers-use-chatbots-to-generate-malware-with-no-coding-experience%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-392-ai-jailbreak-exposes-critical-flaws-researchers-use-chatbots-to-generate-malware-with-no-coding-experience&amp;action_name=%23AxisOfEasy%20392%3A%20AI%20Jailbreak%20Exposes%20Critical%20Flaws%3A%20Researchers%20Use%20Chatbots%20To%20Generate%20Malware%20With%20No%20Coding%20Experience&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-392-ai-jailbreak-exposes-critical-flaws-researchers-use-chatbots-to-generate-malware-with-no-coding-experience/?pk_campaign=feed&#038;pk_kwd=axisofeasy-392-ai-jailbreak-exposes-critical-flaws-researchers-use-chatbots-to-generate-malware-with-no-coding-experience/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 389: What Did You Get Done Last Week?</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-389-what-did-you-get-done-last-week/?pk_campaign=feed&#038;pk_kwd=axisofeasy-389-what-did-you-get-done-last-week&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-389-what-did-you-get-done-last-week</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-389-what-did-you-get-done-last-week/?pk_campaign=feed&#038;pk_kwd=axisofeasy-389-what-did-you-get-done-last-week#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 28 Feb 2025 23:00:56 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[AI censorship]]></category>
		<category><![CDATA[AI governance]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Asana]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[bullet journaling]]></category>
		<category><![CDATA[bureaucracy]]></category>
		<category><![CDATA[busywork]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chrystia Freeland]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity threats]]></category>
		<category><![CDATA[daily wins]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[digital privacy]]></category>
		<category><![CDATA[digital trust]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[efficiency]]></category>
		<category><![CDATA[election interference]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[gaming]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[goal setting]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[index cards]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Journalists]]></category>
		<category><![CDATA[Justin Trudeau]]></category>
		<category><![CDATA[leadership]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[LockBit]]></category>
		<category><![CDATA[Mark Jeftovic]]></category>
		<category><![CDATA[Omnifocus]]></category>
		<category><![CDATA[OmniGPT]]></category>
		<category><![CDATA[online scams]]></category>
		<category><![CDATA[Paragon]]></category>
		<category><![CDATA[personal development]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PlayStation Network]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[productivity]]></category>
		<category><![CDATA[project management]]></category>
		<category><![CDATA[PSN outage]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RAT malware]]></category>
		<category><![CDATA[sanctions]]></category>
		<category><![CDATA[self-improvement]]></category>
		<category><![CDATA[self-reflection]]></category>
		<category><![CDATA[SITE]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Sony]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[task tracking]]></category>
		<category><![CDATA[technology risks]]></category>
		<category><![CDATA[threat landscape]]></category>
		<category><![CDATA[time management]]></category>
		<category><![CDATA[U.K. government]]></category>
		<category><![CDATA[work habits]]></category>
		<category><![CDATA[work-from-home scams]]></category>
		<category><![CDATA[Zservers]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31143</guid>

					<description><![CDATA[What Did You Get Done Last Week? (From the desk of Mark Jeftovic, easyDNS CEO),
AI-Powered Phishing Scams: How Cybercriminals Use Deepfakes and Stolen Credentials to Hijack Accounts,
Private GitHub Repos Still Accessible via Microsoft Copilot, Security Firm Warns ... this and more in AofE  #389<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-389-what-did-you-get-done-last-week%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-389-what-did-you-get-done-last-week&amp;action_name=%23AxisOfEasy%20389%3A%20What%20Did%20You%20Get%20Done%20Last%20Week%3F&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-389-what-did-you-get-done-last-week/?pk_campaign=feed&#038;pk_kwd=axisofeasy-389-what-did-you-get-done-last-week/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
	</channel>
</rss>
