<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>APT</title>
	<atom:link href="https://axisofeasy.com/tag/apt/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 24 Oct 2025 17:41:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>APT</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 423: Amazon Web Services Outage Disrupts Major Online Platforms</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms/?pk_campaign=feed&#038;pk_kwd=axisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms/?pk_campaign=feed&#038;pk_kwd=axisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 24 Oct 2025 22:00:38 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Alexa]]></category>
		<category><![CDATA[algorithmic risk models]]></category>
		<category><![CDATA[Amazon Web Services]]></category>
		<category><![CDATA[Amnesty International]]></category>
		<category><![CDATA[Anti-Money Laundering]]></category>
		<category><![CDATA[Apple security alert]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[AWS outage]]></category>
		<category><![CDATA[Bill C-2]]></category>
		<category><![CDATA[Bill C-8]]></category>
		<category><![CDATA[Bill C-9]]></category>
		<category><![CDATA[Bitter APT]]></category>
		<category><![CDATA[BMO]]></category>
		<category><![CDATA[Citizen Lab]]></category>
		<category><![CDATA[cloud infrastructure]]></category>
		<category><![CDATA[customer rights]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity law]]></category>
		<category><![CDATA[debanking]]></category>
		<category><![CDATA[digital dependency]]></category>
		<category><![CDATA[DNS failure]]></category>
		<category><![CDATA[Epic Games]]></category>
		<category><![CDATA[fake news]]></category>
		<category><![CDATA[financial surveillance]]></category>
		<category><![CDATA[Fortnite]]></category>
		<category><![CDATA[Freedom of Speech]]></category>
		<category><![CDATA[Google Ads scams]]></category>
		<category><![CDATA[L3Harris]]></category>
		<category><![CDATA[malware campaign]]></category>
		<category><![CDATA[mercenary surveillance]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[MuddyWater]]></category>
		<category><![CDATA[NSO Group]]></category>
		<category><![CDATA[online hate]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[Perplexity]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[RBC]]></category>
		<category><![CDATA[risk controls]]></category>
		<category><![CDATA[Scotiabank]]></category>
		<category><![CDATA[service disruption]]></category>
		<category><![CDATA[SIM box fraud]]></category>
		<category><![CDATA[Snapchat]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[spyware litigation]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[system resilience]]></category>
		<category><![CDATA[TD Bank]]></category>
		<category><![CDATA[Trenchant]]></category>
		<category><![CDATA[Ukraine aid]]></category>
		<category><![CDATA[US-EAST-1]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[zero-day exploits]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32516</guid>

					<description><![CDATA[Amazon Web Services Outage Disrupts Major Online Platforms,
Banks End Client Relationships Without Explanation Amid Rising Risk Controls,
Freedom Under Fire? New Bills, New Problems... this and more in AofE  #423<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms&amp;action_name=%23AxisOfEasy%20423%3A%20Amazon%20Web%20Services%20Outage%20Disrupts%20Major%20Online%20Platforms&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms/?pk_campaign=feed&#038;pk_kwd=axisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 420: RedNovember&#8217;s Global Cyber-Espionage Blitz</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-420-rednovembers-global-cyber-espionage-blitz</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 03 Oct 2025 22:00:48 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[1.2 million passengers]]></category>
		<category><![CDATA[1500 organizations]]></category>
		<category><![CDATA[ACSC]]></category>
		<category><![CDATA[Africa]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[arbitrary code execution]]></category>
		<category><![CDATA[ArcaneDoor]]></category>
		<category><![CDATA[ASA]]></category>
		<category><![CDATA[authentication bypass]]></category>
		<category><![CDATA[aviation]]></category>
		<category><![CDATA[banking trojan]]></category>
		<category><![CDATA[BCC]]></category>
		<category><![CDATA[Bill C-36]]></category>
		<category><![CDATA[Bill C-8]]></category>
		<category><![CDATA[Bill C-9]]></category>
		<category><![CDATA[Bitcoin Treasury]]></category>
		<category><![CDATA[C-2]]></category>
		<category><![CDATA[C-26]]></category>
		<category><![CDATA[C-8]]></category>
		<category><![CDATA[C-9]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Canadian Bitcoin Conference]]></category>
		<category><![CDATA[Canadian Bitcoin Podcast]]></category>
		<category><![CDATA[Canadian Human Rights Act]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[Central Asia]]></category>
		<category><![CDATA[Charter of Rights and Freedoms]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Cisco ASA]]></category>
		<category><![CDATA[Citizen Lab]]></category>
		<category><![CDATA[Cobalt Strike]]></category>
		<category><![CDATA[command-and-control]]></category>
		<category><![CDATA[Criminal Code]]></category>
		<category><![CDATA[CVE-2025-20333]]></category>
		<category><![CDATA[CVE-2025-20362]]></category>
		<category><![CDATA[cyber campaign]]></category>
		<category><![CDATA[cyber defense]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[developer data]]></category>
		<category><![CDATA[Digital Safety Commission]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[F5 BIG-IP]]></category>
		<category><![CDATA[fake recruiters]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[FTD]]></category>
		<category><![CDATA[genocide]]></category>
		<category><![CDATA[geopolitics]]></category>
		<category><![CDATA[harmful online content]]></category>
		<category><![CDATA[hate speech]]></category>
		<category><![CDATA[IDs]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Indian Cyber Crime Coordination Centre]]></category>
		<category><![CDATA[Insikt Group]]></category>
		<category><![CDATA[IT Act 2000]]></category>
		<category><![CDATA[Ivanti Connect Secure]]></category>
		<category><![CDATA[Joey Temprile]]></category>
		<category><![CDATA[Justice M Nagaprasanna]]></category>
		<category><![CDATA[Karnataka High Court]]></category>
		<category><![CDATA[Klopatra]]></category>
		<category><![CDATA[LESLIELOADER]]></category>
		<category><![CDATA[Line Dancer]]></category>
		<category><![CDATA[Line Runner]]></category>
		<category><![CDATA[loyalty programs]]></category>
		<category><![CDATA[Mark Jeftovic]]></category>
		<category><![CDATA[MCP server]]></category>
		<category><![CDATA[Melanie Joly]]></category>
		<category><![CDATA[Ministry of Home Affairs]]></category>
		<category><![CDATA[mitigation]]></category>
		<category><![CDATA[Montreal]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[Net-Star malware]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[online misuse]]></category>
		<category><![CDATA[Outlook Web Access]]></category>
		<category><![CDATA[Panama]]></category>
		<category><![CDATA[Pantegana]]></category>
		<category><![CDATA[passports]]></category>
		<category><![CDATA[peace bonds]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[Phantom Taurus]]></category>
		<category><![CDATA[phone hijacking]]></category>
		<category><![CDATA[PoC exploits]]></category>
		<category><![CDATA[Qantas]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Recorded Future]]></category>
		<category><![CDATA[RedNovember]]></category>
		<category><![CDATA[Rialto Theatre]]></category>
		<category><![CDATA[ROM manipulation]]></category>
		<category><![CDATA[Sahyog portal]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[Sean Fraser]]></category>
		<category><![CDATA[secrets]]></category>
		<category><![CDATA[Section 69A]]></category>
		<category><![CDATA[Secure Firewall]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[SparkRAT]]></category>
		<category><![CDATA[spearphishing]]></category>
		<category><![CDATA[state-sponsored]]></category>
		<category><![CDATA[Steven Guilbeault]]></category>
		<category><![CDATA[Storm-1849]]></category>
		<category><![CDATA[Storm-2077]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[surveillance bills]]></category>
		<category><![CDATA[TAG-100]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[transportation networks]]></category>
		<category><![CDATA[twitter]]></category>
		<category><![CDATA[U.S. defense contractors]]></category>
		<category><![CDATA[UAT4356]]></category>
		<category><![CDATA[VNC]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[WestJet]]></category>
		<category><![CDATA[women’s safety]]></category>
		<category><![CDATA[X Corp]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32373</guid>

					<description><![CDATA[... this and more in AofE  #420<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-420-rednovembers-global-cyber-espionage-blitz%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-420-rednovembers-global-cyber-espionage-blitz&amp;action_name=%23AxisOfEasy%20420%3A%20RedNovember%26%238217%3Bs%20Global%20Cyber-Espionage%20Blitz&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 417: Nepal Goes Offline, Then Up In Flames</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-417-nepal-goes-offline-then-up-in-flames</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 12 Sep 2025 22:00:20 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[Adobe]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[Ascension]]></category>
		<category><![CDATA[Asia]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[BitLocker]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[Bugcrowd]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[chalk]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chitwan]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[color-convert]]></category>
		<category><![CDATA[Commerce]]></category>
		<category><![CDATA[connectivity]]></category>
		<category><![CDATA[corruption]]></category>
		<category><![CDATA[crypto-clipper]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[dependencies]]></category>
		<category><![CDATA[DES]]></category>
		<category><![CDATA[Detection]]></category>
		<category><![CDATA[Drift]]></category>
		<category><![CDATA[EggStreme]]></category>
		<category><![CDATA[embassies]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[error-ex]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[Ethereum]]></category>
		<category><![CDATA[Etherscan]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[fileless malware]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Gulf]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[IMEWE]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[Jaguar Land Rover]]></category>
		<category><![CDATA[Janakpur]]></category>
		<category><![CDATA[Jeddah]]></category>
		<category><![CDATA[K.P. Sharma Oli]]></category>
		<category><![CDATA[Kathmandu]]></category>
		<category><![CDATA[Kerberoasting]]></category>
		<category><![CDATA[Kerberos]]></category>
		<category><![CDATA[latency]]></category>
		<category><![CDATA[lockfiles]]></category>
		<category><![CDATA[Magento]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mandiant]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[migration]]></category>
		<category><![CDATA[negligence]]></category>
		<category><![CDATA[nepal]]></category>
		<category><![CDATA[NetBlocks]]></category>
		<category><![CDATA[Node.js]]></category>
		<category><![CDATA[Npm]]></category>
		<category><![CDATA[OAuth]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[outages]]></category>
		<category><![CDATA[package.json]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Palo Alto Networks]]></category>
		<category><![CDATA[parliament]]></category>
		<category><![CDATA[patches.]]></category>
		<category><![CDATA[Philippines]]></category>
		<category><![CDATA[Proofpoint]]></category>
		<category><![CDATA[protests]]></category>
		<category><![CDATA[qix]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RC4]]></category>
		<category><![CDATA[red sea]]></category>
		<category><![CDATA[repair]]></category>
		<category><![CDATA[riot police]]></category>
		<category><![CDATA[Ron Wyden]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salesloft]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[SEA-ME-WE-4]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[SMB]]></category>
		<category><![CDATA[Snowflake]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[strip-ansi]]></category>
		<category><![CDATA[students]]></category>
		<category><![CDATA[submarine cables]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[Tenable]]></category>
		<category><![CDATA[tokens]]></category>
		<category><![CDATA[trust]]></category>
		<category><![CDATA[UNC6395]]></category>
		<category><![CDATA[unemployment]]></category>
		<category><![CDATA[US lawmakers]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[WeChat]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[Windows Server 2025]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32257</guid>

					<description><![CDATA[ Nepal Goes Offline, Then Up in Flames,
Wyden Targets Microsoft Over RC4 Use in Ransomware-Fueled Healthcare Breach,
Salesloft Breach Exposes OAuth Supply Chain Weakness Across Major Tech Platforms...this and more in AofE  #417<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-417-nepal-goes-offline-then-up-in-flames%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-417-nepal-goes-offline-then-up-in-flames&amp;action_name=%23AxisOfEasy%20417%3A%20Nepal%20Goes%20Offline%2C%20Then%20Up%20In%20Flames&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 413: Lenovo Webcams Turn Into Hacking Tools In Shocking New Discovery</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery/?pk_campaign=feed&#038;pk_kwd=axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery/?pk_campaign=feed&#038;pk_kwd=axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 15 Aug 2025 22:00:00 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[and concepts: Lenovo]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[aviation]]></category>
		<category><![CDATA[BadUSB]]></category>
		<category><![CDATA[BYOVD]]></category>
		<category><![CDATA[capturing the most important entities]]></category>
		<category><![CDATA[Charon ransomware]]></category>
		<category><![CDATA[Connex Credit Union]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data brokers]]></category>
		<category><![CDATA[DEF CON 33]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[DLL sideloading]]></category>
		<category><![CDATA[Donald Trump]]></category>
		<category><![CDATA[Earth Baxia]]></category>
		<category><![CDATA[Eclypsium]]></category>
		<category><![CDATA[EDR evasion]]></category>
		<category><![CDATA[Efimer trojan]]></category>
		<category><![CDATA[European Media Freedom Act]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[fake legal emails]]></category>
		<category><![CDATA[firmware]]></category>
		<category><![CDATA[hardware hacking]]></category>
		<category><![CDATA[Here’s the comma-separated tag cloud generated from your provided articles]]></category>
		<category><![CDATA[Interlock Group]]></category>
		<category><![CDATA[journalism]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Manpower]]></category>
		<category><![CDATA[media ownership]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[NodeSnake]]></category>
		<category><![CDATA[operational technology]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[press freedom]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[ransomware attack]]></category>
		<category><![CDATA[ransomware trends]]></category>
		<category><![CDATA[RCE vulnerability]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[sealed records]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[SigmaStar]]></category>
		<category><![CDATA[stolen data]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[topics]]></category>
		<category><![CDATA[torrents]]></category>
		<category><![CDATA[Ukraine war]]></category>
		<category><![CDATA[Ursula von der Leyen]]></category>
		<category><![CDATA[US federal courts]]></category>
		<category><![CDATA[Vladimir Putin]]></category>
		<category><![CDATA[webcams]]></category>
		<category><![CDATA[WinRAR vulnerability]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32052</guid>

					<description><![CDATA[Lenovo Webcams Turn into Hacking Tools in Shocking New Discovery,
EU Law Meant to Protect Press Gives Governments Power to Arrest Journalists,
Charon Ransomware Targets Middle East Aviation Using Advanced APT Tradecraft ...this and more in AofE  #413<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery&amp;action_name=%23AxisOfEasy%20413%3A%20Lenovo%20Webcams%20Turn%20Into%20Hacking%20Tools%20In%20Shocking%20New%20Discovery&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery/?pk_campaign=feed&#038;pk_kwd=axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 296: RedLine Stealer MaaS Latest Example Of Hackers Exploiting Generative AI Technologies As AI Platforms Gain Popularity</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-296-redline-stealer-maas-latest-example-of-hackers-exploiting-generative-ai-technologies-as-ai-platforms-gain-popularity/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-296-redline-stealer-maas-latest-example-of-hackers-exploiting-generative-ai-technologies-as-ai-platforms-gain-popularity</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-296-redline-stealer-maas-latest-example-of-hackers-exploiting-generative-ai-technologies-as-ai-platforms-gain-popularity/#respond</comments>
		
		<dc:creator><![CDATA[ryan]]></dc:creator>
		<pubDate>Fri, 05 May 2023 16:33:37 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Akiri]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[Brett Callow]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[EARN IT]]></category>
		<category><![CDATA[Embsisoft]]></category>
		<category><![CDATA[Evasive Panda]]></category>
		<category><![CDATA[IoCs]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[KrebsOnSecurity]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[LuoYo]]></category>
		<category><![CDATA[MaaS]]></category>
		<category><![CDATA[MgBot]]></category>
		<category><![CDATA[Paul Thacker]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RedLine]]></category>
		<category><![CDATA[RedLine Stealer]]></category>
		<category><![CDATA[Salesforce Community]]></category>
		<category><![CDATA[Sen. Chuck Grassley]]></category>
		<category><![CDATA[Tucker Carlson]]></category>
		<category><![CDATA[UPtycs]]></category>
		<category><![CDATA[Veriti]]></category>
		<category><![CDATA[Vermont Scott Carbee]]></category>
		<category><![CDATA[WHO]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=27736</guid>

					<description><![CDATA[RedLine stealer MaaS latest example of hackers exploiting generative AI technologies as AI platforms gain popularity<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-296-redline-stealer-maas-latest-example-of-hackers-exploiting-generative-ai-technologies-as-ai-platforms-gain-popularity%2F&amp;action_name=%23AxisOfEasy%20296%3A%20RedLine%20Stealer%20MaaS%20Latest%20Example%20Of%20Hackers%20Exploiting%20Generative%20AI%20Technologies%20As%20AI%20Platforms%20Gain%20Popularity&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-296-redline-stealer-maas-latest-example-of-hackers-exploiting-generative-ai-technologies-as-ai-platforms-gain-popularity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 296: RedLine Stealer MaaS Latest Example Of Hackers Exploiting Generative AI Technologies As AI Platforms Gain Popularity</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-296-redline-stealer-maas-latest-example-of-hackers-exploiting-generative-ai-technologies-as-ai-platforms-gain-popularity/?pk_campaign=feed&#038;pk_kwd=axisofeasy-296-redline-stealer-maas-latest-example-of-hackers-exploiting-generative-ai-technologies-as-ai-platforms-gain-popularity&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-296-redline-stealer-maas-latest-example-of-hackers-exploiting-generative-ai-technologies-as-ai-platforms-gain-popularity</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-296-redline-stealer-maas-latest-example-of-hackers-exploiting-generative-ai-technologies-as-ai-platforms-gain-popularity/?pk_campaign=feed&#038;pk_kwd=axisofeasy-296-redline-stealer-maas-latest-example-of-hackers-exploiting-generative-ai-technologies-as-ai-platforms-gain-popularity#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 02 May 2023 22:00:00 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Akiri]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[Brett Callow]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[EARN IT]]></category>
		<category><![CDATA[Embsisoft]]></category>
		<category><![CDATA[Evasive Panda]]></category>
		<category><![CDATA[IoCs]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[KrebsOnSecurity]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[LuoYo]]></category>
		<category><![CDATA[MaaS]]></category>
		<category><![CDATA[MgBot]]></category>
		<category><![CDATA[Paul Thacker]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RedLine]]></category>
		<category><![CDATA[RedLine Stealer]]></category>
		<category><![CDATA[Salesforce Community]]></category>
		<category><![CDATA[Sen. Chuck Grassley]]></category>
		<category><![CDATA[Tucker Carlson]]></category>
		<category><![CDATA[UPtycs]]></category>
		<category><![CDATA[Veriti]]></category>
		<category><![CDATA[Vermont Scott Carbee]]></category>
		<category><![CDATA[WHO]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=27711</guid>

					<description><![CDATA[RedLine stealer MaaS latest example of hackers exploiting generative AI technologies as AI platforms gain popularity,
Multiple salesforce websites have disclosed personal information,
Paul Thacker defends Tucker Carlson, says WHO stealth-edited vaccine information to censor Tucker ... this and more in AofE  #296<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-296-redline-stealer-maas-latest-example-of-hackers-exploiting-generative-ai-technologies-as-ai-platforms-gain-popularity%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-296-redline-stealer-maas-latest-example-of-hackers-exploiting-generative-ai-technologies-as-ai-platforms-gain-popularity&amp;action_name=%23AxisOfEasy%20296%3A%20RedLine%20Stealer%20MaaS%20Latest%20Example%20Of%20Hackers%20Exploiting%20Generative%20AI%20Technologies%20As%20AI%20Platforms%20Gain%20Popularity&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-296-redline-stealer-maas-latest-example-of-hackers-exploiting-generative-ai-technologies-as-ai-platforms-gain-popularity/?pk_campaign=feed&#038;pk_kwd=axisofeasy-296-redline-stealer-maas-latest-example-of-hackers-exploiting-generative-ai-technologies-as-ai-platforms-gain-popularity/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 255: CRTC Chair Ian Scott Confirms Bill C-11 Can Be Used To Pressure Internet Platforms To Manipulate Algorithms</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/?pk_campaign=feed&#038;pk_kwd=axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/?pk_campaign=feed&#038;pk_kwd=axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 19 Jul 2022 22:00:41 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[Ashutosh Rana]]></category>
		<category><![CDATA[Bill C-11]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[freedom]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[H0lyGh0st]]></category>
		<category><![CDATA[Ian Scott]]></category>
		<category><![CDATA[MSTIC]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[open-source apps]]></category>
		<category><![CDATA[PayPal]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[state surveillance]]></category>
		<category><![CDATA[VCU]]></category>
		<category><![CDATA[whistleblower]]></category>
		<category><![CDATA[wikileaks]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=26166</guid>

					<description><![CDATA[CRTC Chair Ian Scott Confirms Bill C-11 Can Be Used To Pressure Internet Platforms to Manipulate Algorithms,
The Chinese surveillance state encounters resistance from the public,
Federal agencies warned healthcare organisations about North Korean ransomware attacks ... this and more in AofE  #255<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms&amp;action_name=%23AxisOfEasy%20255%3A%20CRTC%20Chair%20Ian%20Scott%20Confirms%20Bill%20C-11%20Can%20Be%20Used%20To%20Pressure%20Internet%20Platforms%20To%20Manipulate%20Algorithms&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/?pk_campaign=feed&#038;pk_kwd=axisofeasy-255-crtc-chair-ian-scott-confirms-bill-c-11-can-be-used-to-pressure-internet-platforms-to-manipulate-algorithms/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 254: Apple Debuts Lockdown Mode to Prevent State-Sponsored Spying</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying/?pk_campaign=feed&#038;pk_kwd=axisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying/?pk_campaign=feed&#038;pk_kwd=axisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 12 Jul 2022 22:00:41 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[Bill C-11]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Cruise]]></category>
		<category><![CDATA[EDF]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[lockdown]]></category>
		<category><![CDATA[Outage]]></category>
		<category><![CDATA[pandemic]]></category>
		<category><![CDATA[ransomeware]]></category>
		<category><![CDATA[Rogers]]></category>
		<category><![CDATA[Rogers outage]]></category>
		<category><![CDATA[Rolls Royce]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=26132</guid>

					<description><![CDATA[Apple Debuts Lockdown Mode to Prevent State-Sponsored Spying,
Canada wide Rogers outage,
Canada is censoring us and bill c-11 will make it worse ... this and more in AofE  #254<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying&amp;action_name=%23AxisOfEasy%20254%3A%20Apple%20Debuts%20Lockdown%20Mode%20to%20Prevent%20State-Sponsored%20Spying&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying/?pk_campaign=feed&#038;pk_kwd=axisofeasy-254-apple-debuts-lockdown-mode-to-prevent-state-sponsored-spying/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 243: Shanghai Residents Find Creative Ways To Challenge Chinese Censorship</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-243-shanghai-residents-find-creative-ways-to-challenge-chinese-censorship/?pk_campaign=feed&#038;pk_kwd=axisofeasy-243-shanghai-residents-find-creative-ways-to-challenge-chinese-censorship&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-243-shanghai-residents-find-creative-ways-to-challenge-chinese-censorship</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-243-shanghai-residents-find-creative-ways-to-challenge-chinese-censorship/?pk_campaign=feed&#038;pk_kwd=axisofeasy-243-shanghai-residents-find-creative-ways-to-challenge-chinese-censorship#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 26 Apr 2022 22:00:40 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Lazarus]]></category>
		<category><![CDATA[NSO]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[Shanghai]]></category>
		<category><![CDATA[twitter]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=25669</guid>

					<description><![CDATA[NSO Group seeks sovereign immunity from the US Supreme Court,
GitHub announces two security vulnerabilities in its local versions,
Shanghai residents find creative ways to challenge Chinese censorship ...  this and more in AofE #243<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-243-shanghai-residents-find-creative-ways-to-challenge-chinese-censorship%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-243-shanghai-residents-find-creative-ways-to-challenge-chinese-censorship&amp;action_name=%23AxisOfEasy%20243%3A%20Shanghai%20Residents%20Find%20Creative%20Ways%20To%20Challenge%20Chinese%20Censorship&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-243-shanghai-residents-find-creative-ways-to-challenge-chinese-censorship/?pk_campaign=feed&#038;pk_kwd=axisofeasy-243-shanghai-residents-find-creative-ways-to-challenge-chinese-censorship/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
	</channel>
</rss>
