<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>BlackMeta</title>
	<atom:link href="https://axisofeasy.com/tag/blackmeta/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Thu, 17 Oct 2024 14:14:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>BlackMeta</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 371: Malicious Chrome Extensions Exploit Google’s New Security Model</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model/?pk_campaign=feed&#038;pk_kwd=axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model/?pk_campaign=feed&#038;pk_kwd=axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 11 Oct 2024 22:00:24 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI Evolution]]></category>
		<category><![CDATA[Algorithm Addiction]]></category>
		<category><![CDATA[archival site]]></category>
		<category><![CDATA[bcrypt]]></category>
		<category><![CDATA[BlackMeta]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[Brewster Kahle]]></category>
		<category><![CDATA[Browser Extensions]]></category>
		<category><![CDATA[Cheat Scripts]]></category>
		<category><![CDATA[Child Exploitation]]></category>
		<category><![CDATA[Customer Data Breach]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[DDoS attack]]></category>
		<category><![CDATA[Digital Safety]]></category>
		<category><![CDATA[email addresses]]></category>
		<category><![CDATA[Endpoint Security]]></category>
		<category><![CDATA[Gamers]]></category>
		<category><![CDATA[Geoffrey Hinton]]></category>
		<category><![CDATA[Google Manifest V3]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hacktivist group]]></category>
		<category><![CDATA[hashed passwords]]></category>
		<category><![CDATA[Have I Been Pwned]]></category>
		<category><![CDATA[Infostealers]]></category>
		<category><![CDATA[Internet Archive]]></category>
		<category><![CDATA[JavaScript alert]]></category>
		<category><![CDATA[Lua Scripts]]></category>
		<category><![CDATA[Malicious Chrome Extensions]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mental Health Risks]]></category>
		<category><![CDATA[MoneyGram]]></category>
		<category><![CDATA[Nobel Prize]]></category>
		<category><![CDATA[password managers]]></category>
		<category><![CDATA[Phishing Sites]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Security Model]]></category>
		<category><![CDATA[sensitive data]]></category>
		<category><![CDATA[SquareX]]></category>
		<category><![CDATA[stolen database]]></category>
		<category><![CDATA[systems scrubbing]]></category>
		<category><![CDATA[Tech Regulation]]></category>
		<category><![CDATA[TikTok Lawsuit]]></category>
		<category><![CDATA[user concerns]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=30459</guid>

					<description><![CDATA[Malicious Chrome Extensions Exploit Google’s New Security Model,
Gamers Targeted by Fake Cheat Scripts Spreading Malware,
States Sue TikTok Over Alleged Child Exploitation and Mental Health Risks ... this and more in AofE  #371<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model&amp;action_name=%23AxisOfEasy%20371%3A%20Malicious%20Chrome%20Extensions%20Exploit%20Google%E2%80%99s%20New%20Security%20Model&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model/?pk_campaign=feed&#038;pk_kwd=axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
