<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Check Point Research</title>
	<atom:link href="https://axisofeasy.com/tag/check-point-research/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 16 Jan 2026 19:32:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>Check Point Research</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 433: Australia Moves To Enact Sweeping New Hate Speech And Extremism Laws</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 23:00:28 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[agentic AI]]></category>
		<category><![CDATA[AI impact]]></category>
		<category><![CDATA[AI model reconnaissance]]></category>
		<category><![CDATA[AI Red Teaming]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[AI Tooling Risks]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[antisemitism]]></category>
		<category><![CDATA[AsyncRAT]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[blockchain abuse]]></category>
		<category><![CDATA[burden of proof]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[C2 evasion]]></category>
		<category><![CDATA[Check Point Research]]></category>
		<category><![CDATA[Chinese threat actors]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cloudflare abuse]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[cyber extortion]]></category>
		<category><![CDATA[cybercrime-as-a-service]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[data breaches]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[DeadLock]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[developer layoffs]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[extremism legislation]]></category>
		<category><![CDATA[fintech security]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[generative AI abuse]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[government censorship]]></category>
		<category><![CDATA[Group-IB]]></category>
		<category><![CDATA[Hacker News]]></category>
		<category><![CDATA[hate speech laws]]></category>
		<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[law enforcement powers]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[LLM Exploits]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[micropayments]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Model Isolation Failures]]></category>
		<category><![CDATA[online speech]]></category>
		<category><![CDATA[open source software]]></category>
		<category><![CDATA[OS command injection]]></category>
		<category><![CDATA[parliament]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing campaigns]]></category>
		<category><![CDATA[Polygon]]></category>
		<category><![CDATA[Privacy & PII]]></category>
		<category><![CDATA[prohibited groups]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reclaim The Net]]></category>
		<category><![CDATA[RedVDS]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Secure AI Design]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[software sustainability]]></category>
		<category><![CDATA[SSH key theft]]></category>
		<category><![CDATA[SSRF attacks]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[supply-chain risk]]></category>
		<category><![CDATA[Tailwind CSS]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[voice cloning]]></category>
		<category><![CDATA[VoidLink]]></category>
		<category><![CDATA[Windows security patches]]></category>
		<category><![CDATA[X402 protocol]]></category>
		<category><![CDATA[zero-day vulnerabilities]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32970</guid>

					<description><![CDATA[Australia Moves to Enact Sweeping New Hate Speech and Extremism Laws,
Can x402 micropayments save Open Source Software?
Claude Cowork Exfiltrates Files ... this and more in AofE  #433<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&amp;action_name=%23AxisOfEasy%20433%3A%20Australia%20Moves%20To%20Enact%20Sweeping%20New%20Hate%20Speech%20And%20Extremism%20Laws&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 416: Judge Imposes Limits On Google Deals After Monopoly Ruling But Avoids Breakup</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup/?pk_campaign=feed&#038;pk_kwd=axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup/?pk_campaign=feed&#038;pk_kwd=axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 05 Sep 2025 22:00:22 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[ad-tech]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[antitrust]]></category>
		<category><![CDATA[AnyDesk]]></category>
		<category><![CDATA[API integrations]]></category>
		<category><![CDATA[appeal]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[APT group]]></category>
		<category><![CDATA[Authenticode]]></category>
		<category><![CDATA[AzCopy]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[AzureHound]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[behavioral remedies]]></category>
		<category><![CDATA[Check Point Research]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[CISOs]]></category>
		<category><![CDATA[ClickFix]]></category>
		<category><![CDATA[cloud-native attack]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[Coalition]]></category>
		<category><![CDATA[credential scanning]]></category>
		<category><![CDATA[CRM]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[default settings]]></category>
		<category><![CDATA[Digital Markets Act]]></category>
		<category><![CDATA[diplomats]]></category>
		<category><![CDATA[divestiture]]></category>
		<category><![CDATA[DoJ]]></category>
		<category><![CDATA[domain generation algorithm]]></category>
		<category><![CDATA[Drift]]></category>
		<category><![CDATA[embassy emails]]></category>
		<category><![CDATA[Entra Connect]]></category>
		<category><![CDATA[Entra ID]]></category>
		<category><![CDATA[Ethereum]]></category>
		<category><![CDATA[exclusivity deals]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[extortion]]></category>
		<category><![CDATA[fake firmware]]></category>
		<category><![CDATA[Gemini]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[hateful content]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[IoT botnet]]></category>
		<category><![CDATA[Iranian hackers]]></category>
		<category><![CDATA[Judge Amit Mehta]]></category>
		<category><![CDATA[Judge Leonie Brinkema]]></category>
		<category><![CDATA[LOLDrivers]]></category>
		<category><![CDATA[malicious npm]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mandiant]]></category>
		<category><![CDATA[MetaStealer]]></category>
		<category><![CDATA[MFA bypass]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Teams]]></category>
		<category><![CDATA[monopoly]]></category>
		<category><![CDATA[NVR exploits]]></category>
		<category><![CDATA[OAuth Tokens]]></category>
		<category><![CDATA[Palo Alto Networks]]></category>
		<category><![CDATA[Pedro Umbelino]]></category>
		<category><![CDATA[persistence]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RapperBot]]></category>
		<category><![CDATA[refresh tokens]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salesloft]]></category>
		<category><![CDATA[search]]></category>
		<category><![CDATA[Shop App]]></category>
		<category><![CDATA[Shopify]]></category>
		<category><![CDATA[Silver Fox]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Storm-0501]]></category>
		<category><![CDATA[technical committee]]></category>
		<category><![CDATA[txt records]]></category>
		<category><![CDATA[UNC6395]]></category>
		<category><![CDATA[ValleyRAT]]></category>
		<category><![CDATA[volumetric attack]]></category>
		<category><![CDATA[vulnerable drivers]]></category>
		<category><![CDATA[WatchDog]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[Winos]]></category>
		<category><![CDATA[Zemana]]></category>
		<category><![CDATA[Zero-click]]></category>
		<category><![CDATA[Zscaler]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32195</guid>

					<description><![CDATA[Judge Imposes Limits on Google Deals After Monopoly Ruling but Avoids Breakup,
Salesloft Drift Breach Exposes Salesforce Data at Zscaler, Palo Alto Networks, and Hundreds More,
APT Group Exploits Microsoft Trust to Deploy Stealthy Malware...this and more in AofE  #416<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup&amp;action_name=%23AxisOfEasy%20416%3A%20Judge%20Imposes%20Limits%20On%20Google%20Deals%20After%20Monopoly%20Ruling%20But%20Avoids%20Breakup&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup/?pk_campaign=feed&#038;pk_kwd=axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
