<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>China</title>
	<atom:link href="https://axisofeasy.com/tag/china/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 19 Dec 2025 18:14:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>China</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 431: UK Moves Toward Mandatory Phone Surveillance</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 19 Dec 2025 23:00:04 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple developer account disabled]]></category>
		<category><![CDATA[Apple ID bricked devices]]></category>
		<category><![CDATA[APT28 Ukraine phishing]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Axis Of Easy]]></category>
		<category><![CDATA[AxisOfEasy]]></category>
		<category><![CDATA[Bill C-9 hate speech]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[Canada religious speech protections]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[Charles Hugh Smith]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CSAM scanning bill]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[government overreach]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[mandatory device scanning]]></category>
		<category><![CDATA[Mark E. Jeftovic]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phone security]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[PornHub data breach]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[ShinyHunters extortion]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tech news]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[twitter]]></category>
		<category><![CDATA[uk government]]></category>
		<category><![CDATA[UK phone surveillance]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32898</guid>

					<description><![CDATA[UK pushes mandatory phone surveillance on all devices—plus Apple bricks developer's $30K ecosystem, PornHub extortion, &#038; Canada strips religious speech protections. #AxisOfEasy weekly digest<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-431-uk-moves-toward-mandatory-phone-surveillance%2F&amp;action_name=%23AxisOfEasy%20431%3A%20UK%20Moves%20Toward%20Mandatory%20Phone%20Surveillance&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 422: Why Treating AI As A Tool Is A Dangerous Illusion</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 17 Oct 2025 22:00:38 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[alignment]]></category>
		<category><![CDATA[Android flaw]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Astaroth Trojan]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Axis Of Easy]]></category>
		<category><![CDATA[Bill C-8]]></category>
		<category><![CDATA[BYOVD]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Claude Sonnet 4.5]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[credential dumping]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[Dufresne]]></category>
		<category><![CDATA[Earth Alux]]></category>
		<category><![CDATA[ECHOAC]]></category>
		<category><![CDATA[economic impact]]></category>
		<category><![CDATA[email rules]]></category>
		<category><![CDATA[emergent behavior]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ethical AI]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[existential risk]]></category>
		<category><![CDATA[Federal Reserve]]></category>
		<category><![CDATA[FIDO]]></category>
		<category><![CDATA[Gelsemium]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[Harvard University]]></category>
		<category><![CDATA[House of Commons]]></category>
		<category><![CDATA[HR systems]]></category>
		<category><![CDATA[initial access]]></category>
		<category><![CDATA[Italy]]></category>
		<category><![CDATA[Jack Clark]]></category>
		<category><![CDATA[Jewelbug]]></category>
		<category><![CDATA[Lucky Mouse]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[Mechanize]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Mimikatz]]></category>
		<category><![CDATA[misaligned optimization]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Oracle EBS]]></category>
		<category><![CDATA[Paragon]]></category>
		<category><![CDATA[passkeys]]></category>
		<category><![CDATA[Payroll Pirate]]></category>
		<category><![CDATA[persistence]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Pixnapping]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Commissioner]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reclaim The Net]]></category>
		<category><![CDATA[REF7707]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[reward hacking]]></category>
		<category><![CDATA[RMM]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[safety data]]></category>
		<category><![CDATA[ScreenConnect]]></category>
		<category><![CDATA[ShadowPad]]></category>
		<category><![CDATA[situational awareness]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Symantec]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[TechCrunch]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[The Hacker News]]></category>
		<category><![CDATA[threat actors]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[universities]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[warrantless access]]></category>
		<category><![CDATA[Workday]]></category>
		<category><![CDATA[Yandex Cloud]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32461</guid>

					<description><![CDATA[Why Treating AI as a Tool Is a Dangerous Illusion,
Chinese Espionage Group Expands Into Russia Through Jewelbug Cyber Campaign,
Cabinet Push for Secret Telecom Cutoffs Raises Privacy Concerns... this and more in AofE  #422<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion&amp;action_name=%23AxisOfEasy%20422%3A%20Why%20Treating%20AI%20As%20A%20Tool%20Is%20A%20Dangerous%20Illusion&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 420: RedNovember&#8217;s Global Cyber-Espionage Blitz</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-420-rednovembers-global-cyber-espionage-blitz</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 03 Oct 2025 22:00:48 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[1.2 million passengers]]></category>
		<category><![CDATA[1500 organizations]]></category>
		<category><![CDATA[ACSC]]></category>
		<category><![CDATA[Africa]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[arbitrary code execution]]></category>
		<category><![CDATA[ArcaneDoor]]></category>
		<category><![CDATA[ASA]]></category>
		<category><![CDATA[authentication bypass]]></category>
		<category><![CDATA[aviation]]></category>
		<category><![CDATA[banking trojan]]></category>
		<category><![CDATA[BCC]]></category>
		<category><![CDATA[Bill C-36]]></category>
		<category><![CDATA[Bill C-8]]></category>
		<category><![CDATA[Bill C-9]]></category>
		<category><![CDATA[Bitcoin Treasury]]></category>
		<category><![CDATA[C-2]]></category>
		<category><![CDATA[C-26]]></category>
		<category><![CDATA[C-8]]></category>
		<category><![CDATA[C-9]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Canadian Bitcoin Conference]]></category>
		<category><![CDATA[Canadian Bitcoin Podcast]]></category>
		<category><![CDATA[Canadian Human Rights Act]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[Central Asia]]></category>
		<category><![CDATA[Charter of Rights and Freedoms]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Cisco ASA]]></category>
		<category><![CDATA[Citizen Lab]]></category>
		<category><![CDATA[Cobalt Strike]]></category>
		<category><![CDATA[command-and-control]]></category>
		<category><![CDATA[Criminal Code]]></category>
		<category><![CDATA[CVE-2025-20333]]></category>
		<category><![CDATA[CVE-2025-20362]]></category>
		<category><![CDATA[cyber campaign]]></category>
		<category><![CDATA[cyber defense]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[developer data]]></category>
		<category><![CDATA[Digital Safety Commission]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[F5 BIG-IP]]></category>
		<category><![CDATA[fake recruiters]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[FTD]]></category>
		<category><![CDATA[genocide]]></category>
		<category><![CDATA[geopolitics]]></category>
		<category><![CDATA[harmful online content]]></category>
		<category><![CDATA[hate speech]]></category>
		<category><![CDATA[IDs]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Indian Cyber Crime Coordination Centre]]></category>
		<category><![CDATA[Insikt Group]]></category>
		<category><![CDATA[IT Act 2000]]></category>
		<category><![CDATA[Ivanti Connect Secure]]></category>
		<category><![CDATA[Joey Temprile]]></category>
		<category><![CDATA[Justice M Nagaprasanna]]></category>
		<category><![CDATA[Karnataka High Court]]></category>
		<category><![CDATA[Klopatra]]></category>
		<category><![CDATA[LESLIELOADER]]></category>
		<category><![CDATA[Line Dancer]]></category>
		<category><![CDATA[Line Runner]]></category>
		<category><![CDATA[loyalty programs]]></category>
		<category><![CDATA[Mark Jeftovic]]></category>
		<category><![CDATA[MCP server]]></category>
		<category><![CDATA[Melanie Joly]]></category>
		<category><![CDATA[Ministry of Home Affairs]]></category>
		<category><![CDATA[mitigation]]></category>
		<category><![CDATA[Montreal]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[Net-Star malware]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[online misuse]]></category>
		<category><![CDATA[Outlook Web Access]]></category>
		<category><![CDATA[Panama]]></category>
		<category><![CDATA[Pantegana]]></category>
		<category><![CDATA[passports]]></category>
		<category><![CDATA[peace bonds]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[Phantom Taurus]]></category>
		<category><![CDATA[phone hijacking]]></category>
		<category><![CDATA[PoC exploits]]></category>
		<category><![CDATA[Qantas]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Recorded Future]]></category>
		<category><![CDATA[RedNovember]]></category>
		<category><![CDATA[Rialto Theatre]]></category>
		<category><![CDATA[ROM manipulation]]></category>
		<category><![CDATA[Sahyog portal]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[Sean Fraser]]></category>
		<category><![CDATA[secrets]]></category>
		<category><![CDATA[Section 69A]]></category>
		<category><![CDATA[Secure Firewall]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[SparkRAT]]></category>
		<category><![CDATA[spearphishing]]></category>
		<category><![CDATA[state-sponsored]]></category>
		<category><![CDATA[Steven Guilbeault]]></category>
		<category><![CDATA[Storm-1849]]></category>
		<category><![CDATA[Storm-2077]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[surveillance bills]]></category>
		<category><![CDATA[TAG-100]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[transportation networks]]></category>
		<category><![CDATA[twitter]]></category>
		<category><![CDATA[U.S. defense contractors]]></category>
		<category><![CDATA[UAT4356]]></category>
		<category><![CDATA[VNC]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[WestJet]]></category>
		<category><![CDATA[women’s safety]]></category>
		<category><![CDATA[X Corp]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32373</guid>

					<description><![CDATA[... this and more in AofE  #420<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-420-rednovembers-global-cyber-espionage-blitz%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-420-rednovembers-global-cyber-espionage-blitz&amp;action_name=%23AxisOfEasy%20420%3A%20RedNovember%26%238217%3Bs%20Global%20Cyber-Espionage%20Blitz&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 417: Nepal Goes Offline, Then Up In Flames</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-417-nepal-goes-offline-then-up-in-flames</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-417-nepal-goes-offline-then-up-in-flames/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 12 Sep 2025 22:00:49 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[Charles Hugh Smith]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[datasec]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[healthcare breach]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mark E. Jeftovic]]></category>
		<category><![CDATA[microsfot]]></category>
		<category><![CDATA[nepal]]></category>
		<category><![CDATA[nepalese]]></category>
		<category><![CDATA[Npm]]></category>
		<category><![CDATA[NSO Group]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[red sea]]></category>
		<category><![CDATA[Salesloft]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Wyden]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32278</guid>

					<description><![CDATA[Nepal Goes Offline, Then Up in Flames<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-417-nepal-goes-offline-then-up-in-flames%2F&amp;action_name=%23AxisOfEasy%20417%3A%20Nepal%20Goes%20Offline%2C%20Then%20Up%20In%20Flames&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-417-nepal-goes-offline-then-up-in-flames/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 417: Nepal Goes Offline, Then Up In Flames</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-417-nepal-goes-offline-then-up-in-flames</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 12 Sep 2025 22:00:20 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[Adobe]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[Ascension]]></category>
		<category><![CDATA[Asia]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[BitLocker]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[Bugcrowd]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[chalk]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chitwan]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[color-convert]]></category>
		<category><![CDATA[Commerce]]></category>
		<category><![CDATA[connectivity]]></category>
		<category><![CDATA[corruption]]></category>
		<category><![CDATA[crypto-clipper]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[dependencies]]></category>
		<category><![CDATA[DES]]></category>
		<category><![CDATA[Detection]]></category>
		<category><![CDATA[Drift]]></category>
		<category><![CDATA[EggStreme]]></category>
		<category><![CDATA[embassies]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[error-ex]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[Ethereum]]></category>
		<category><![CDATA[Etherscan]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[fileless malware]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Gulf]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[IMEWE]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[Jaguar Land Rover]]></category>
		<category><![CDATA[Janakpur]]></category>
		<category><![CDATA[Jeddah]]></category>
		<category><![CDATA[K.P. Sharma Oli]]></category>
		<category><![CDATA[Kathmandu]]></category>
		<category><![CDATA[Kerberoasting]]></category>
		<category><![CDATA[Kerberos]]></category>
		<category><![CDATA[latency]]></category>
		<category><![CDATA[lockfiles]]></category>
		<category><![CDATA[Magento]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mandiant]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[migration]]></category>
		<category><![CDATA[negligence]]></category>
		<category><![CDATA[nepal]]></category>
		<category><![CDATA[NetBlocks]]></category>
		<category><![CDATA[Node.js]]></category>
		<category><![CDATA[Npm]]></category>
		<category><![CDATA[OAuth]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[outages]]></category>
		<category><![CDATA[package.json]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Palo Alto Networks]]></category>
		<category><![CDATA[parliament]]></category>
		<category><![CDATA[patches.]]></category>
		<category><![CDATA[Philippines]]></category>
		<category><![CDATA[Proofpoint]]></category>
		<category><![CDATA[protests]]></category>
		<category><![CDATA[qix]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RC4]]></category>
		<category><![CDATA[red sea]]></category>
		<category><![CDATA[repair]]></category>
		<category><![CDATA[riot police]]></category>
		<category><![CDATA[Ron Wyden]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salesloft]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[SEA-ME-WE-4]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[SMB]]></category>
		<category><![CDATA[Snowflake]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[strip-ansi]]></category>
		<category><![CDATA[students]]></category>
		<category><![CDATA[submarine cables]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[Tenable]]></category>
		<category><![CDATA[tokens]]></category>
		<category><![CDATA[trust]]></category>
		<category><![CDATA[UNC6395]]></category>
		<category><![CDATA[unemployment]]></category>
		<category><![CDATA[US lawmakers]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[WeChat]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[Windows Server 2025]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32257</guid>

					<description><![CDATA[ Nepal Goes Offline, Then Up in Flames,
Wyden Targets Microsoft Over RC4 Use in Ransomware-Fueled Healthcare Breach,
Salesloft Breach Exposes OAuth Supply Chain Weakness Across Major Tech Platforms...this and more in AofE  #417<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-417-nepal-goes-offline-then-up-in-flames%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-417-nepal-goes-offline-then-up-in-flames&amp;action_name=%23AxisOfEasy%20417%3A%20Nepal%20Goes%20Offline%2C%20Then%20Up%20In%20Flames&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 416: Judge Imposes Limits On Google Deals After Monopoly Ruling But Avoids Breakup</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup/?pk_campaign=feed&#038;pk_kwd=axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup/?pk_campaign=feed&#038;pk_kwd=axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 05 Sep 2025 22:00:22 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[ad-tech]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[antitrust]]></category>
		<category><![CDATA[AnyDesk]]></category>
		<category><![CDATA[API integrations]]></category>
		<category><![CDATA[appeal]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[APT group]]></category>
		<category><![CDATA[Authenticode]]></category>
		<category><![CDATA[AzCopy]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[AzureHound]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[behavioral remedies]]></category>
		<category><![CDATA[Check Point Research]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[CISOs]]></category>
		<category><![CDATA[ClickFix]]></category>
		<category><![CDATA[cloud-native attack]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[Coalition]]></category>
		<category><![CDATA[credential scanning]]></category>
		<category><![CDATA[CRM]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[default settings]]></category>
		<category><![CDATA[Digital Markets Act]]></category>
		<category><![CDATA[diplomats]]></category>
		<category><![CDATA[divestiture]]></category>
		<category><![CDATA[DoJ]]></category>
		<category><![CDATA[domain generation algorithm]]></category>
		<category><![CDATA[Drift]]></category>
		<category><![CDATA[embassy emails]]></category>
		<category><![CDATA[Entra Connect]]></category>
		<category><![CDATA[Entra ID]]></category>
		<category><![CDATA[Ethereum]]></category>
		<category><![CDATA[exclusivity deals]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[extortion]]></category>
		<category><![CDATA[fake firmware]]></category>
		<category><![CDATA[Gemini]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[hateful content]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[IoT botnet]]></category>
		<category><![CDATA[Iranian hackers]]></category>
		<category><![CDATA[Judge Amit Mehta]]></category>
		<category><![CDATA[Judge Leonie Brinkema]]></category>
		<category><![CDATA[LOLDrivers]]></category>
		<category><![CDATA[malicious npm]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mandiant]]></category>
		<category><![CDATA[MetaStealer]]></category>
		<category><![CDATA[MFA bypass]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Teams]]></category>
		<category><![CDATA[monopoly]]></category>
		<category><![CDATA[NVR exploits]]></category>
		<category><![CDATA[OAuth Tokens]]></category>
		<category><![CDATA[Palo Alto Networks]]></category>
		<category><![CDATA[Pedro Umbelino]]></category>
		<category><![CDATA[persistence]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RapperBot]]></category>
		<category><![CDATA[refresh tokens]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salesloft]]></category>
		<category><![CDATA[search]]></category>
		<category><![CDATA[Shop App]]></category>
		<category><![CDATA[Shopify]]></category>
		<category><![CDATA[Silver Fox]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Storm-0501]]></category>
		<category><![CDATA[technical committee]]></category>
		<category><![CDATA[txt records]]></category>
		<category><![CDATA[UNC6395]]></category>
		<category><![CDATA[ValleyRAT]]></category>
		<category><![CDATA[volumetric attack]]></category>
		<category><![CDATA[vulnerable drivers]]></category>
		<category><![CDATA[WatchDog]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[Winos]]></category>
		<category><![CDATA[Zemana]]></category>
		<category><![CDATA[Zero-click]]></category>
		<category><![CDATA[Zscaler]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32195</guid>

					<description><![CDATA[Judge Imposes Limits on Google Deals After Monopoly Ruling but Avoids Breakup,
Salesloft Drift Breach Exposes Salesforce Data at Zscaler, Palo Alto Networks, and Hundreds More,
APT Group Exploits Microsoft Trust to Deploy Stealthy Malware...this and more in AofE  #416<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup&amp;action_name=%23AxisOfEasy%20416%3A%20Judge%20Imposes%20Limits%20On%20Google%20Deals%20After%20Monopoly%20Ruling%20But%20Avoids%20Breakup&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup/?pk_campaign=feed&#038;pk_kwd=axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 415: PromptLock Signals The Arrival Of AI Powered Ransomware</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 29 Aug 2025 22:00:46 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[C-11]]></category>
		<category><![CDATA[C-13]]></category>
		<category><![CDATA[C-2]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[daily cybersecurity news]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Michael Geist]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32158</guid>

					<description><![CDATA[PromptLock Signals The Arrival Of AI Powered Ransomware<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware%2F&amp;action_name=%23AxisOfEasy%20415%3A%20PromptLock%20Signals%20The%20Arrival%20Of%20AI%20Powered%20Ransomware&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 415: PromptLock Signals The Arrival Of AI Powered Ransomware</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 29 Aug 2025 22:00:33 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[4Chan]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI crimewave]]></category>
		<category><![CDATA[AI enhancements]]></category>
		<category><![CDATA[algorithmic mediation]]></category>
		<category><![CDATA[Android Trojan]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[authenticity]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Banks]]></category>
		<category><![CDATA[Base64]]></category>
		<category><![CDATA[Bill C-11]]></category>
		<category><![CDATA[Bill C-13]]></category>
		<category><![CDATA[bitcoin ransom]]></category>
		<category><![CDATA[Broadcasting Act]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Claude Code]]></category>
		<category><![CDATA[court case]]></category>
		<category><![CDATA[creator backlash]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[defense contractors]]></category>
		<category><![CDATA[EDR evasion]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[extraterritoriality]]></category>
		<category><![CDATA[Farmers Insurance]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[filename parsing]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[GoLang]]></category>
		<category><![CDATA[Google Pixel]]></category>
		<category><![CDATA[GPT-OSS]]></category>
		<category><![CDATA[guardrails]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hospitals]]></category>
		<category><![CDATA[hybrid cloud]]></category>
		<category><![CDATA[io_uring]]></category>
		<category><![CDATA[Kiwi Farms]]></category>
		<category><![CDATA[legislative error]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Netflix]]></category>
		<category><![CDATA[Ofcom]]></category>
		<category><![CDATA[Ollama]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PromptLock]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RingReaper]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[shell injection]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Shorts]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Storm-0501]]></category>
		<category><![CDATA[trust]]></category>
		<category><![CDATA[U.S. Constitution]]></category>
		<category><![CDATA[UNC5174]]></category>
		<category><![CDATA[VShell]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Youtube]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32136</guid>

					<description><![CDATA[PromptLock Signals the Arrival of AI Powered Ransomware,
Phishing Campaign Exploits Linux Filename Parsing to Deliver VShell Backdoor,
Government Error Erases Privacy Rights from Broadcasting Act ...this and more in AofE  #415<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware&amp;action_name=%23AxisOfEasy%20415%3A%20PromptLock%20Signals%20The%20Arrival%20Of%20AI%20Powered%20Ransomware&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 411: RBC Debanks Toronto Lawyer Representing Freedom Convoy Defendants</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants/?pk_campaign=feed&#038;pk_kwd=axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants/?pk_campaign=feed&#038;pk_kwd=axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 01 Aug 2025 22:00:34 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[4Chan]]></category>
		<category><![CDATA[Allianz]]></category>
		<category><![CDATA[AnyDesk]]></category>
		<category><![CDATA[Bill C-2]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[BlackSuit]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Chaos ransomware]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[civil rights]]></category>
		<category><![CDATA[Clorox]]></category>
		<category><![CDATA[CLOUD Act]]></category>
		<category><![CDATA[Cognizant]]></category>
		<category><![CDATA[crypto ransom]]></category>
		<category><![CDATA[CSIS]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data sharing]]></category>
		<category><![CDATA[debanking]]></category>
		<category><![CDATA[Elasticsearch]]></category>
		<category><![CDATA[Emergencies Act]]></category>
		<category><![CDATA[Eva Chipiuk]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[Freedom Convoy]]></category>
		<category><![CDATA[government IDs]]></category>
		<category><![CDATA[hacker forum]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[lawsuit]]></category>
		<category><![CDATA[Leak Zone]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[multithreaded encryption]]></category>
		<category><![CDATA[NAS]]></category>
		<category><![CDATA[negligence]]></category>
		<category><![CDATA[Operation Checkmate]]></category>
		<category><![CDATA[OpSec failure]]></category>
		<category><![CDATA[Orange]]></category>
		<category><![CDATA[password reset]]></category>
		<category><![CDATA[Patriot Act]]></category>
		<category><![CDATA[Pentagon]]></category>
		<category><![CDATA[plugin vulnerability]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Quick Assist]]></category>
		<category><![CDATA[RBC]]></category>
		<category><![CDATA[risk tolerance]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[selfies]]></category>
		<category><![CDATA[Shakepay]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Tea app]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[UpGuard]]></category>
		<category><![CDATA[vendor breach]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[warrantless access]]></category>
		<category><![CDATA[WordPress]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31973</guid>

					<description><![CDATA[RBC Debanks Toronto lawyer representing Freedom Convoy defendants,
Thousands of Women's IDs and Selfies Leaked from Viral App in Massive Hack,
Clorox Blames $380 Million Cyberattack on IT Giant After Shocking Mistake ...this and more in AofE  #411 <img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants&amp;action_name=%23AxisOfEasy%20411%3A%20RBC%20Debanks%20Toronto%20Lawyer%20Representing%20Freedom%20Convoy%20Defendants&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants/?pk_campaign=feed&#038;pk_kwd=axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 409: Adoption Data Breach Exposes Sensitive Records From Texas Nonprofit</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 18 Jul 2025 22:00:04 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[access brokers]]></category>
		<category><![CDATA[Adoption]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AxisOfEasy]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[Black Basta]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[Bluesky]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[C2 infrastructure]]></category>
		<category><![CDATA[Chatbot]]></category>
		<category><![CDATA[child protection]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cloud misconfiguration]]></category>
		<category><![CDATA[CRM migration]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cypherpunk]]></category>
		<category><![CDATA[Cypherpunk movement]]></category>
		<category><![CDATA[Dark Reading]]></category>
		<category><![CDATA[data access]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data sovereignty]]></category>
		<category><![CDATA[data storage]]></category>
		<category><![CDATA[decentralization]]></category>
		<category><![CDATA[Decentralized systems]]></category>
		<category><![CDATA[deep learning]]></category>
		<category><![CDATA[Developing Countries]]></category>
		<category><![CDATA[Digital dystopia]]></category>
		<category><![CDATA[digital economy]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[digital resilience]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[documentation]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[ECC]]></category>
		<category><![CDATA[emerging markets]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Episource]]></category>
		<category><![CDATA[existential risk]]></category>
		<category><![CDATA[facial scanning]]></category>
		<category><![CDATA[financial innovation]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[GDDR6]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GPUhammer]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hardware security]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[HexEval]]></category>
		<category><![CDATA[in-memory execution]]></category>
		<category><![CDATA[internal tooling]]></category>
		<category><![CDATA[Internet freedom]]></category>
		<category><![CDATA[Irish DPC]]></category>
		<category><![CDATA[Kid Web Services]]></category>
		<category><![CDATA[leapfrogging]]></category>
		<category><![CDATA[LOLBin]]></category>
		<category><![CDATA[long-form content]]></category>
		<category><![CDATA[Louis Vuitton]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[malware-as-a-service]]></category>
		<category><![CDATA[Matanbuchus]]></category>
		<category><![CDATA[medical imaging]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Teams]]></category>
		<category><![CDATA[monetary fine]]></category>
		<category><![CDATA[monetary sovereignty]]></category>
		<category><![CDATA[nonprofit]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[NVidia]]></category>
		<category><![CDATA[online identity]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[patient data]]></category>
		<category><![CDATA[payload delivery]]></category>
		<category><![CDATA[payments infrastructure]]></category>
		<category><![CDATA[Peer-to-peer networks]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[retail]]></category>
		<category><![CDATA[reverse shell]]></category>
		<category><![CDATA[Rowhammer]]></category>
		<category><![CDATA[SMA 100]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[support automation]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tech philosophy]]></category>
		<category><![CDATA[technological foresight]]></category>
		<category><![CDATA[Texas]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[UK regulation]]></category>
		<category><![CDATA[Usenix]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Web3]]></category>
		<category><![CDATA[XORIndex]]></category>
		<category><![CDATA[zero-day]]></category>
		<category><![CDATA[Zero-Day Exploit]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31883</guid>

					<description><![CDATA[ Adoption Data Breach Exposes Sensitive Records from Texas Nonprofit,
Matanbuchus 3.0 Expands Stealth Tactics with Teams Lures and Advanced Loader Features,
Bluesky Implements UK Age Checks Amid Privacy Backlash Over Online Safety Law...this and more in AofE  #409<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&amp;action_name=%23AxisOfEasy%20409%3A%20Adoption%20Data%20Breach%20Exposes%20Sensitive%20Records%20From%20Texas%20Nonprofit&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
	</channel>
</rss>
