<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>chalk</title>
	<atom:link href="https://axisofeasy.com/tag/chalk/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 19 Sep 2025 11:57:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>chalk</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 418: DHS Misconfiguration Exposes Surveillance Data To Thousands Of Unauthorized Users</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/?pk_campaign=feed&#038;pk_kwd=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/?pk_campaign=feed&#038;pk_kwd=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 22:00:26 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Acronis TikTok]]></category>
		<category><![CDATA[AI-generated images]]></category>
		<category><![CDATA[AI-powered scripts]]></category>
		<category><![CDATA[Alexander McQueen]]></category>
		<category><![CDATA[algorithm control]]></category>
		<category><![CDATA[American First Finance]]></category>
		<category><![CDATA[Andreessen Horowitz]]></category>
		<category><![CDATA[anomaly detection]]></category>
		<category><![CDATA[antivirus evasion TA558]]></category>
		<category><![CDATA[Balenciaga]]></category>
		<category><![CDATA[bitcoin ransom]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[browsers]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[Cartier]]></category>
		<category><![CDATA[chalk]]></category>
		<category><![CDATA[Chinese hacking]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[ClickFix]]></category>
		<category><![CDATA[cloud apps]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[credentials theft]]></category>
		<category><![CDATA[crypto hijacking]]></category>
		<category><![CDATA[Crypto Wallets]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[customer impact]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exposure]]></category>
		<category><![CDATA[data sovereignty]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[debug]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[disruption]]></category>
		<category><![CDATA[divestment deadline]]></category>
		<category><![CDATA[duckdb]]></category>
		<category><![CDATA[ecosystem fragility FileFix]]></category>
		<category><![CDATA[email compromise Raven Stealer]]></category>
		<category><![CDATA[email leaks]]></category>
		<category><![CDATA[export controls]]></category>
		<category><![CDATA[Facebook phishing]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[FOIA]]></category>
		<category><![CDATA[foreign cyber operations]]></category>
		<category><![CDATA[fusion centers]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[General Atlantic]]></category>
		<category><![CDATA[Gucci]]></category>
		<category><![CDATA[hardware keys]]></category>
		<category><![CDATA[high-end cyberattacks]]></category>
		<category><![CDATA[Homeland Security]]></category>
		<category><![CDATA[hospitality sector TA415]]></category>
		<category><![CDATA[hotels]]></category>
		<category><![CDATA[HSIN-Intel]]></category>
		<category><![CDATA[impersonation]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[javascript]]></category>
		<category><![CDATA[KKR]]></category>
		<category><![CDATA[lawmaker phishing FinWise Bank]]></category>
		<category><![CDATA[Lazarus Group]]></category>
		<category><![CDATA[legislation Kering]]></category>
		<category><![CDATA[local law enforcement]]></category>
		<category><![CDATA[Louis Vuitton]]></category>
		<category><![CDATA[luxury brands]]></category>
		<category><![CDATA[malicious packages]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Maven Central]]></category>
		<category><![CDATA[messaging platforms]]></category>
		<category><![CDATA[misconfiguration]]></category>
		<category><![CDATA[mr. d0x]]></category>
		<category><![CDATA[multi-language]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[NCTC]]></category>
		<category><![CDATA[npm support impersonation]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[Oracle]]></category>
		<category><![CDATA[oversight]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[payment data]]></category>
		<category><![CDATA[personally identifiable information]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing campaign]]></category>
		<category><![CDATA[phishing-as-a-service]]></category>
		<category><![CDATA[policy debate Microsoft]]></category>
		<category><![CDATA[PowerShell injection]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Protecting Americans from Foreign Adversary Controlled Applications Act]]></category>
		<category><![CDATA[protest surveillance]]></category>
		<category><![CDATA[PyPI]]></category>
		<category><![CDATA[RaccoonO365]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[recommendation system]]></category>
		<category><![CDATA[registries]]></category>
		<category><![CDATA[RubyGems]]></category>
		<category><![CDATA[Salesforce credentials]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[secondary scams]]></category>
		<category><![CDATA[Shiny Hunters]]></category>
		<category><![CDATA[Silver Lake]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Spain]]></category>
		<category><![CDATA[StealC infostealer]]></category>
		<category><![CDATA[steganography]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Susquehanna]]></category>
		<category><![CDATA[Telegram]]></category>
		<category><![CDATA[thousands of organizations]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[two-factor authentication npm]]></category>
		<category><![CDATA[U.S. consortium]]></category>
		<category><![CDATA[U.S. organizations]]></category>
		<category><![CDATA[U.S. ownership]]></category>
		<category><![CDATA[U.S.-China relations]]></category>
		<category><![CDATA[UK NCSC]]></category>
		<category><![CDATA[unauthorized access]]></category>
		<category><![CDATA[UNC6040]]></category>
		<category><![CDATA[VPNs]]></category>
		<category><![CDATA[VS Code backdoor]]></category>
		<category><![CDATA[Windows Explorer exploit]]></category>
		<category><![CDATA[zero-day response]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32305</guid>

					<description><![CDATA[DHS Misconfiguration Exposes Surveillance Data to Thousands of Unauthorized Users,
Kering Suffers Data Breach Targeting Luxury Shoppers Amid Surge in High-End Cyberattacks,
Phishing Breach Exposes Fragility of the JavaScript Ecosystem...this and more in AofE  #418<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users&amp;action_name=%23AxisOfEasy%20418%3A%20DHS%20Misconfiguration%20Exposes%20Surveillance%20Data%20To%20Thousands%20Of%20Unauthorized%20Users&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/?pk_campaign=feed&#038;pk_kwd=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 417: Nepal Goes Offline, Then Up In Flames</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-417-nepal-goes-offline-then-up-in-flames</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 12 Sep 2025 22:00:20 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[Adobe]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[Ascension]]></category>
		<category><![CDATA[Asia]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[BitLocker]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[Bugcrowd]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[chalk]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chitwan]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[color-convert]]></category>
		<category><![CDATA[Commerce]]></category>
		<category><![CDATA[connectivity]]></category>
		<category><![CDATA[corruption]]></category>
		<category><![CDATA[crypto-clipper]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[dependencies]]></category>
		<category><![CDATA[DES]]></category>
		<category><![CDATA[Detection]]></category>
		<category><![CDATA[Drift]]></category>
		<category><![CDATA[EggStreme]]></category>
		<category><![CDATA[embassies]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[error-ex]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[Ethereum]]></category>
		<category><![CDATA[Etherscan]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[fileless malware]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Gulf]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[IMEWE]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[Jaguar Land Rover]]></category>
		<category><![CDATA[Janakpur]]></category>
		<category><![CDATA[Jeddah]]></category>
		<category><![CDATA[K.P. Sharma Oli]]></category>
		<category><![CDATA[Kathmandu]]></category>
		<category><![CDATA[Kerberoasting]]></category>
		<category><![CDATA[Kerberos]]></category>
		<category><![CDATA[latency]]></category>
		<category><![CDATA[lockfiles]]></category>
		<category><![CDATA[Magento]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mandiant]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[migration]]></category>
		<category><![CDATA[negligence]]></category>
		<category><![CDATA[nepal]]></category>
		<category><![CDATA[NetBlocks]]></category>
		<category><![CDATA[Node.js]]></category>
		<category><![CDATA[Npm]]></category>
		<category><![CDATA[OAuth]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[outages]]></category>
		<category><![CDATA[package.json]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Palo Alto Networks]]></category>
		<category><![CDATA[parliament]]></category>
		<category><![CDATA[patches.]]></category>
		<category><![CDATA[Philippines]]></category>
		<category><![CDATA[Proofpoint]]></category>
		<category><![CDATA[protests]]></category>
		<category><![CDATA[qix]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RC4]]></category>
		<category><![CDATA[red sea]]></category>
		<category><![CDATA[repair]]></category>
		<category><![CDATA[riot police]]></category>
		<category><![CDATA[Ron Wyden]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salesloft]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[SEA-ME-WE-4]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[SMB]]></category>
		<category><![CDATA[Snowflake]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[strip-ansi]]></category>
		<category><![CDATA[students]]></category>
		<category><![CDATA[submarine cables]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[Tenable]]></category>
		<category><![CDATA[tokens]]></category>
		<category><![CDATA[trust]]></category>
		<category><![CDATA[UNC6395]]></category>
		<category><![CDATA[unemployment]]></category>
		<category><![CDATA[US lawmakers]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[WeChat]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[Windows Server 2025]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32257</guid>

					<description><![CDATA[ Nepal Goes Offline, Then Up in Flames,
Wyden Targets Microsoft Over RC4 Use in Ransomware-Fueled Healthcare Breach,
Salesloft Breach Exposes OAuth Supply Chain Weakness Across Major Tech Platforms...this and more in AofE  #417<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-417-nepal-goes-offline-then-up-in-flames%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-417-nepal-goes-offline-then-up-in-flames&amp;action_name=%23AxisOfEasy%20417%3A%20Nepal%20Goes%20Offline%2C%20Then%20Up%20In%20Flames&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
	</channel>
</rss>
