<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>civil liberties</title>
	<atom:link href="https://axisofeasy.com/tag/civil-liberties/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 16 Jan 2026 19:32:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>civil liberties</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 433: Australia Moves To Enact Sweeping New Hate Speech And Extremism Laws</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 23:00:28 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[agentic AI]]></category>
		<category><![CDATA[AI impact]]></category>
		<category><![CDATA[AI model reconnaissance]]></category>
		<category><![CDATA[AI Red Teaming]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[AI Tooling Risks]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[antisemitism]]></category>
		<category><![CDATA[AsyncRAT]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[blockchain abuse]]></category>
		<category><![CDATA[burden of proof]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[C2 evasion]]></category>
		<category><![CDATA[Check Point Research]]></category>
		<category><![CDATA[Chinese threat actors]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cloudflare abuse]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[cyber extortion]]></category>
		<category><![CDATA[cybercrime-as-a-service]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[data breaches]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[DeadLock]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[developer layoffs]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[extremism legislation]]></category>
		<category><![CDATA[fintech security]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[generative AI abuse]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[government censorship]]></category>
		<category><![CDATA[Group-IB]]></category>
		<category><![CDATA[Hacker News]]></category>
		<category><![CDATA[hate speech laws]]></category>
		<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[law enforcement powers]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[LLM Exploits]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[micropayments]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Model Isolation Failures]]></category>
		<category><![CDATA[online speech]]></category>
		<category><![CDATA[open source software]]></category>
		<category><![CDATA[OS command injection]]></category>
		<category><![CDATA[parliament]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing campaigns]]></category>
		<category><![CDATA[Polygon]]></category>
		<category><![CDATA[Privacy & PII]]></category>
		<category><![CDATA[prohibited groups]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reclaim The Net]]></category>
		<category><![CDATA[RedVDS]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Secure AI Design]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[software sustainability]]></category>
		<category><![CDATA[SSH key theft]]></category>
		<category><![CDATA[SSRF attacks]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[supply-chain risk]]></category>
		<category><![CDATA[Tailwind CSS]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[voice cloning]]></category>
		<category><![CDATA[VoidLink]]></category>
		<category><![CDATA[Windows security patches]]></category>
		<category><![CDATA[X402 protocol]]></category>
		<category><![CDATA[zero-day vulnerabilities]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32970</guid>

					<description><![CDATA[Australia Moves to Enact Sweeping New Hate Speech and Extremism Laws,
Can x402 micropayments save Open Source Software?
Claude Cowork Exfiltrates Files ... this and more in AofE  #433<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&amp;action_name=%23AxisOfEasy%20433%3A%20Australia%20Moves%20To%20Enact%20Sweeping%20New%20Hate%20Speech%20And%20Extremism%20Laws&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 430: Trump Administration Plans Mandatory Social Media And Family Data For Foreign Visitors</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors/?pk_campaign=feed&#038;pk_kwd=axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors/?pk_campaign=feed&#038;pk_kwd=axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 12 Dec 2025 23:00:39 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[.NET RCE]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[border security]]></category>
		<category><![CDATA[BRICKSTORM malware]]></category>
		<category><![CDATA[Chinese hackers]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[cloudflare outage]]></category>
		<category><![CDATA[conservative party of canada]]></category>
		<category><![CDATA[credit monitoring]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[customer data exposure]]></category>
		<category><![CDATA[CVE-2025-55182]]></category>
		<category><![CDATA[cybersecurity incident]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data collection]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[developer security]]></category>
		<category><![CDATA[DLL hijacking]]></category>
		<category><![CDATA[DPRK tooling]]></category>
		<category><![CDATA[Election Security.]]></category>
		<category><![CDATA[enterprise vulnerabilities]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ESTA]]></category>
		<category><![CDATA[Ethereum C2]]></category>
		<category><![CDATA[EtherRAT]]></category>
		<category><![CDATA[Fortinet SSO flaw]]></category>
		<category><![CDATA[global cyber threats]]></category>
		<category><![CDATA[government overreach]]></category>
		<category><![CDATA[HTTP traffic disruption]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[internet reliability]]></category>
		<category><![CDATA[law enforcement investigation]]></category>
		<category><![CDATA[Lua]]></category>
		<category><![CDATA[malicious plugins]]></category>
		<category><![CDATA[malware campaigns]]></category>
		<category><![CDATA[medical record breach]]></category>
		<category><![CDATA[Next.js]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[npm malware]]></category>
		<category><![CDATA[online surveillance]]></category>
		<category><![CDATA[open-source security]]></category>
		<category><![CDATA[persistent threats]]></category>
		<category><![CDATA[political cybersecurity]]></category>
		<category><![CDATA[PowerShell malware]]></category>
		<category><![CDATA[privacy invasion]]></category>
		<category><![CDATA[React Server Components]]></category>
		<category><![CDATA[React2Shell]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Rust malware]]></category>
		<category><![CDATA[Rust proxy]]></category>
		<category><![CDATA[social media monitoring]]></category>
		<category><![CDATA[state-sponsored cyber attacks]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[travel surveillance]]></category>
		<category><![CDATA[trump administration]]></category>
		<category><![CDATA[unpatched vulnerabilities]]></category>
		<category><![CDATA[visa waiver program]]></category>
		<category><![CDATA[VMware vSphere]]></category>
		<category><![CDATA[VS Code extensions]]></category>
		<category><![CDATA[WAF]]></category>
		<category><![CDATA[web infrastructure]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32811</guid>

					<description><![CDATA[Trump Administration Plans Mandatory Social Media and Family Data for Foreign Visitors,
Yet Another Cloudflare Outage (YATO),
Conservative Party of Canada Faces Major Cybersecurity Breach Affecting Hundreds of Candidates... this and more in AofE  #430<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors&amp;action_name=%23AxisOfEasy%20430%3A%20Trump%20Administration%20Plans%20Mandatory%20Social%20Media%20And%20Family%20Data%20For%20Foreign%20Visitors&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors/?pk_campaign=feed&#038;pk_kwd=axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 429: Edmonton’s New Police Pilot Brings Facial Recognition Into Officers’ Line Of Sight</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight/?pk_campaign=feed&#038;pk_kwd=axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight/?pk_campaign=feed&#038;pk_kwd=axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 05 Dec 2025 23:00:13 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Akira ransomware]]></category>
		<category><![CDATA[algorithmic policing]]></category>
		<category><![CDATA[Apple compliance]]></category>
		<category><![CDATA[Axon cameras]]></category>
		<category><![CDATA[banking cybersecurity]]></category>
		<category><![CDATA[biometric databases]]></category>
		<category><![CDATA[body cameras]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[ClickFix attack]]></category>
		<category><![CDATA[cloud application security]]></category>
		<category><![CDATA[CodeRED shutdown]]></category>
		<category><![CDATA[compliance platforms]]></category>
		<category><![CDATA[continuous monitoring]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[Crisis24 breach]]></category>
		<category><![CDATA[cross-platform threats]]></category>
		<category><![CDATA[CVE-2025-55182]]></category>
		<category><![CDATA[CVE-2025-66478]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data retention]]></category>
		<category><![CDATA[device surveillance]]></category>
		<category><![CDATA[emergency alert system outage]]></category>
		<category><![CDATA[EPS Edmonton]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[fake ChatGPT installers]]></category>
		<category><![CDATA[financial data exposure]]></category>
		<category><![CDATA[framework patching]]></category>
		<category><![CDATA[government tracking app]]></category>
		<category><![CDATA[human factor risks]]></category>
		<category><![CDATA[IMSI tracking]]></category>
		<category><![CDATA[India smartphone mandate]]></category>
		<category><![CDATA[insecure deserialization]]></category>
		<category><![CDATA[Iranian hackers TA450]]></category>
		<category><![CDATA[ISP account termination]]></category>
		<category><![CDATA[law enforcement technology]]></category>
		<category><![CDATA[macOS privilege escalation]]></category>
		<category><![CDATA[malicious Rust crate]]></category>
		<category><![CDATA[malicious websites]]></category>
		<category><![CDATA[Marquis Fintech]]></category>
		<category><![CDATA[Next.js vulnerability]]></category>
		<category><![CDATA[NGO cyber targeting]]></category>
		<category><![CDATA[North Korean hackers TA427]]></category>
		<category><![CDATA[npm malicious packages]]></category>
		<category><![CDATA[OtterCookie malware]]></category>
		<category><![CDATA[phishing campaigns]]></category>
		<category><![CDATA[piracy policy]]></category>
		<category><![CDATA[police surveillance]]></category>
		<category><![CDATA[Privacy Concerns]]></category>
		<category><![CDATA[privacy regulation]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RCE]]></category>
		<category><![CDATA[React 19 vulnerability]]></category>
		<category><![CDATA[React Server Components]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Russian hackers TA422]]></category>
		<category><![CDATA[Russian hacking group]]></category>
		<category><![CDATA[Sanchar Saathi]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[software supply chain]]></category>
		<category><![CDATA[SonicWall exploit]]></category>
		<category><![CDATA[Star Blizzard]]></category>
		<category><![CDATA[supply-chain malware]]></category>
		<category><![CDATA[Supreme Court case]]></category>
		<category><![CDATA[telecom regulation]]></category>
		<category><![CDATA[terminal command attacks]]></category>
		<category><![CDATA[third-party risk]]></category>
		<category><![CDATA[user identification]]></category>
		<category><![CDATA[web application security]]></category>
		<category><![CDATA[Web3 malware]]></category>
		<category><![CDATA[Zero-day vulnerability]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32783</guid>

					<description><![CDATA[Edmonton’s new police pilot brings facial recognition into officers’ line of sight,
Marquis Fintech Confirms Ransomware Attack That Exposed Data of Hundreds of Thousands of Bank Customers,
React and Next.js Servers Face Critical Remote Code Execution Vulnerability... this and more in AofE  #429<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight&amp;action_name=%23AxisOfEasy%20429%3A%20Edmonton%E2%80%99s%20New%20Police%20Pilot%20Brings%20Facial%20Recognition%20Into%20Officers%E2%80%99%20Line%20Of%20Sight&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight/?pk_campaign=feed&#038;pk_kwd=axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 422: Why Treating AI As A Tool Is A Dangerous Illusion</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 17 Oct 2025 22:00:38 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[alignment]]></category>
		<category><![CDATA[Android flaw]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Astaroth Trojan]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Axis Of Easy]]></category>
		<category><![CDATA[Bill C-8]]></category>
		<category><![CDATA[BYOVD]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Claude Sonnet 4.5]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[credential dumping]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[Dufresne]]></category>
		<category><![CDATA[Earth Alux]]></category>
		<category><![CDATA[ECHOAC]]></category>
		<category><![CDATA[economic impact]]></category>
		<category><![CDATA[email rules]]></category>
		<category><![CDATA[emergent behavior]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ethical AI]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[existential risk]]></category>
		<category><![CDATA[Federal Reserve]]></category>
		<category><![CDATA[FIDO]]></category>
		<category><![CDATA[Gelsemium]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[Harvard University]]></category>
		<category><![CDATA[House of Commons]]></category>
		<category><![CDATA[HR systems]]></category>
		<category><![CDATA[initial access]]></category>
		<category><![CDATA[Italy]]></category>
		<category><![CDATA[Jack Clark]]></category>
		<category><![CDATA[Jewelbug]]></category>
		<category><![CDATA[Lucky Mouse]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[Mechanize]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Mimikatz]]></category>
		<category><![CDATA[misaligned optimization]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Oracle EBS]]></category>
		<category><![CDATA[Paragon]]></category>
		<category><![CDATA[passkeys]]></category>
		<category><![CDATA[Payroll Pirate]]></category>
		<category><![CDATA[persistence]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Pixnapping]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Commissioner]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reclaim The Net]]></category>
		<category><![CDATA[REF7707]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[reward hacking]]></category>
		<category><![CDATA[RMM]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[safety data]]></category>
		<category><![CDATA[ScreenConnect]]></category>
		<category><![CDATA[ShadowPad]]></category>
		<category><![CDATA[situational awareness]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Symantec]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[TechCrunch]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[The Hacker News]]></category>
		<category><![CDATA[threat actors]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[universities]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[warrantless access]]></category>
		<category><![CDATA[Workday]]></category>
		<category><![CDATA[Yandex Cloud]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32461</guid>

					<description><![CDATA[Why Treating AI as a Tool Is a Dangerous Illusion,
Chinese Espionage Group Expands Into Russia Through Jewelbug Cyber Campaign,
Cabinet Push for Secret Telecom Cutoffs Raises Privacy Concerns... this and more in AofE  #422<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion&amp;action_name=%23AxisOfEasy%20422%3A%20Why%20Treating%20AI%20As%20A%20Tool%20Is%20A%20Dangerous%20Illusion&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 418: DHS Misconfiguration Exposes Surveillance Data To Thousands Of Unauthorized Users</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/?pk_campaign=feed&#038;pk_kwd=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/?pk_campaign=feed&#038;pk_kwd=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 22:00:26 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Acronis TikTok]]></category>
		<category><![CDATA[AI-generated images]]></category>
		<category><![CDATA[AI-powered scripts]]></category>
		<category><![CDATA[Alexander McQueen]]></category>
		<category><![CDATA[algorithm control]]></category>
		<category><![CDATA[American First Finance]]></category>
		<category><![CDATA[Andreessen Horowitz]]></category>
		<category><![CDATA[anomaly detection]]></category>
		<category><![CDATA[antivirus evasion TA558]]></category>
		<category><![CDATA[Balenciaga]]></category>
		<category><![CDATA[bitcoin ransom]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[browsers]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[Cartier]]></category>
		<category><![CDATA[chalk]]></category>
		<category><![CDATA[Chinese hacking]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[ClickFix]]></category>
		<category><![CDATA[cloud apps]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[credentials theft]]></category>
		<category><![CDATA[crypto hijacking]]></category>
		<category><![CDATA[Crypto Wallets]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[customer impact]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exposure]]></category>
		<category><![CDATA[data sovereignty]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[debug]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[disruption]]></category>
		<category><![CDATA[divestment deadline]]></category>
		<category><![CDATA[duckdb]]></category>
		<category><![CDATA[ecosystem fragility FileFix]]></category>
		<category><![CDATA[email compromise Raven Stealer]]></category>
		<category><![CDATA[email leaks]]></category>
		<category><![CDATA[export controls]]></category>
		<category><![CDATA[Facebook phishing]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[FOIA]]></category>
		<category><![CDATA[foreign cyber operations]]></category>
		<category><![CDATA[fusion centers]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[General Atlantic]]></category>
		<category><![CDATA[Gucci]]></category>
		<category><![CDATA[hardware keys]]></category>
		<category><![CDATA[high-end cyberattacks]]></category>
		<category><![CDATA[Homeland Security]]></category>
		<category><![CDATA[hospitality sector TA415]]></category>
		<category><![CDATA[hotels]]></category>
		<category><![CDATA[HSIN-Intel]]></category>
		<category><![CDATA[impersonation]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[javascript]]></category>
		<category><![CDATA[KKR]]></category>
		<category><![CDATA[lawmaker phishing FinWise Bank]]></category>
		<category><![CDATA[Lazarus Group]]></category>
		<category><![CDATA[legislation Kering]]></category>
		<category><![CDATA[local law enforcement]]></category>
		<category><![CDATA[Louis Vuitton]]></category>
		<category><![CDATA[luxury brands]]></category>
		<category><![CDATA[malicious packages]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Maven Central]]></category>
		<category><![CDATA[messaging platforms]]></category>
		<category><![CDATA[misconfiguration]]></category>
		<category><![CDATA[mr. d0x]]></category>
		<category><![CDATA[multi-language]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[NCTC]]></category>
		<category><![CDATA[npm support impersonation]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[Oracle]]></category>
		<category><![CDATA[oversight]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[payment data]]></category>
		<category><![CDATA[personally identifiable information]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing campaign]]></category>
		<category><![CDATA[phishing-as-a-service]]></category>
		<category><![CDATA[policy debate Microsoft]]></category>
		<category><![CDATA[PowerShell injection]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Protecting Americans from Foreign Adversary Controlled Applications Act]]></category>
		<category><![CDATA[protest surveillance]]></category>
		<category><![CDATA[PyPI]]></category>
		<category><![CDATA[RaccoonO365]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[recommendation system]]></category>
		<category><![CDATA[registries]]></category>
		<category><![CDATA[RubyGems]]></category>
		<category><![CDATA[Salesforce credentials]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[secondary scams]]></category>
		<category><![CDATA[Shiny Hunters]]></category>
		<category><![CDATA[Silver Lake]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Spain]]></category>
		<category><![CDATA[StealC infostealer]]></category>
		<category><![CDATA[steganography]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Susquehanna]]></category>
		<category><![CDATA[Telegram]]></category>
		<category><![CDATA[thousands of organizations]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[two-factor authentication npm]]></category>
		<category><![CDATA[U.S. consortium]]></category>
		<category><![CDATA[U.S. organizations]]></category>
		<category><![CDATA[U.S. ownership]]></category>
		<category><![CDATA[U.S.-China relations]]></category>
		<category><![CDATA[UK NCSC]]></category>
		<category><![CDATA[unauthorized access]]></category>
		<category><![CDATA[UNC6040]]></category>
		<category><![CDATA[VPNs]]></category>
		<category><![CDATA[VS Code backdoor]]></category>
		<category><![CDATA[Windows Explorer exploit]]></category>
		<category><![CDATA[zero-day response]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32305</guid>

					<description><![CDATA[DHS Misconfiguration Exposes Surveillance Data to Thousands of Unauthorized Users,
Kering Suffers Data Breach Targeting Luxury Shoppers Amid Surge in High-End Cyberattacks,
Phishing Breach Exposes Fragility of the JavaScript Ecosystem...this and more in AofE  #418<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users&amp;action_name=%23AxisOfEasy%20418%3A%20DHS%20Misconfiguration%20Exposes%20Surveillance%20Data%20To%20Thousands%20Of%20Unauthorized%20Users&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/?pk_campaign=feed&#038;pk_kwd=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 414: Popular VPN Apps Exposed As Security Risk After Shocking Report</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report/?pk_campaign=feed&#038;pk_kwd=axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report/?pk_campaign=feed&#038;pk_kwd=axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 22 Aug 2025 22:00:13 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[1.1 million customers]]></category>
		<category><![CDATA[280000 emails]]></category>
		<category><![CDATA[ActBlue]]></category>
		<category><![CDATA[Advanced Data Protection]]></category>
		<category><![CDATA[AI update]]></category>
		<category><![CDATA[Allianz Life]]></category>
		<category><![CDATA[allow lists]]></category>
		<category><![CDATA[AML compliance]]></category>
		<category><![CDATA[app stores]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[authoritarian regimes]]></category>
		<category><![CDATA[Autumn Breeze]]></category>
		<category><![CDATA[Bank for International Settlements]]></category>
		<category><![CDATA[Benjamin Mixon-Baca]]></category>
		<category><![CDATA[BIS]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[brain-dead]]></category>
		<category><![CDATA[campaign emails]]></category>
		<category><![CDATA[Canadian Regulator]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[ChatGPT-5]]></category>
		<category><![CDATA[child safety]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[citations]]></category>
		<category><![CDATA[Citizen Lab]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[customer accounts]]></category>
		<category><![CDATA[D-Squared]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[digital ID]]></category>
		<category><![CDATA[duty of care]]></category>
		<category><![CDATA[Dylan T. Davis]]></category>
		<category><![CDATA[employees]]></category>
		<category><![CDATA[encryption backdoor]]></category>
		<category><![CDATA[fake ChatGPT app]]></category>
		<category><![CDATA[financial firms]]></category>
		<category><![CDATA[global attack]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[GOP]]></category>
		<category><![CDATA[hacked data]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Have I Been Pwned]]></category>
		<category><![CDATA[Hidden Links]]></category>
		<category><![CDATA[hidden tricks]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[iiNet]]></category>
		<category><![CDATA[Innovative Connecting]]></category>
		<category><![CDATA[Investigatory Powers Act]]></category>
		<category><![CDATA[ISP]]></category>
		<category><![CDATA[Jedidiah Crandall]]></category>
		<category><![CDATA[Jeffrey Knockel]]></category>
		<category><![CDATA[José Castañeda]]></category>
		<category><![CDATA[Know Your Customer]]></category>
		<category><![CDATA[KYC]]></category>
		<category><![CDATA[Lemon Clove]]></category>
		<category><![CDATA[Louisiana]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mark E. Jeftovic]]></category>
		<category><![CDATA[Marsha Blackburn]]></category>
		<category><![CDATA[non-custodial wallets]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Pandora]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[PipeMagic]]></category>
		<category><![CDATA[political bias]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[prompt optimizer]]></category>
		<category><![CDATA[Qantas]]></category>
		<category><![CDATA[Qihoo 360]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Republican fundraising]]></category>
		<category><![CDATA[Roblox]]></category>
		<category><![CDATA[routing engine]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salesforce hack]]></category>
		<category><![CDATA[scandal]]></category>
		<category><![CDATA[security risk]]></category>
		<category><![CDATA[Shadowsocks]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Snap VPN]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Social Security numbers]]></category>
		<category><![CDATA[spam filter]]></category>
		<category><![CDATA[stablecoin]]></category>
		<category><![CDATA[Steve Scalise]]></category>
		<category><![CDATA[stolen data]]></category>
		<category><![CDATA[structured prompts]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[transaction scoring]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[Tulsi Gabbard]]></category>
		<category><![CDATA[Turbo VPN]]></category>
		<category><![CDATA[U.K. government]]></category>
		<category><![CDATA[U.S. pressure]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[VPN Monster]]></category>
		<category><![CDATA[wallets]]></category>
		<category><![CDATA[weak encryption]]></category>
		<category><![CDATA[widespread breach]]></category>
		<category><![CDATA[WinRed]]></category>
		<category><![CDATA[Workday]]></category>
		<category><![CDATA[XML tags]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32099</guid>

					<description><![CDATA[Popular VPN Apps Exposed as Security Risk After Shocking Report,
UK Retreats After US Pressure Forces End to Apple Encryption Backdoor Plan,
BIS Proposes Transaction Scoring System to Enforce Crypto AML Compliance ...this and more in AofE  #414<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report&amp;action_name=%23AxisOfEasy%20414%3A%20Popular%20VPN%20Apps%20Exposed%20As%20Security%20Risk%20After%20Shocking%20Report&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report/?pk_campaign=feed&#038;pk_kwd=axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 411: RBC Debanks Toronto Lawyer Representing Freedom Convoy Defendants</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants/?pk_campaign=feed&#038;pk_kwd=axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants/?pk_campaign=feed&#038;pk_kwd=axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 01 Aug 2025 22:00:34 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[4Chan]]></category>
		<category><![CDATA[Allianz]]></category>
		<category><![CDATA[AnyDesk]]></category>
		<category><![CDATA[Bill C-2]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[BlackSuit]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Chaos ransomware]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[civil rights]]></category>
		<category><![CDATA[Clorox]]></category>
		<category><![CDATA[CLOUD Act]]></category>
		<category><![CDATA[Cognizant]]></category>
		<category><![CDATA[crypto ransom]]></category>
		<category><![CDATA[CSIS]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data sharing]]></category>
		<category><![CDATA[debanking]]></category>
		<category><![CDATA[Elasticsearch]]></category>
		<category><![CDATA[Emergencies Act]]></category>
		<category><![CDATA[Eva Chipiuk]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[Freedom Convoy]]></category>
		<category><![CDATA[government IDs]]></category>
		<category><![CDATA[hacker forum]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[lawsuit]]></category>
		<category><![CDATA[Leak Zone]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[multithreaded encryption]]></category>
		<category><![CDATA[NAS]]></category>
		<category><![CDATA[negligence]]></category>
		<category><![CDATA[Operation Checkmate]]></category>
		<category><![CDATA[OpSec failure]]></category>
		<category><![CDATA[Orange]]></category>
		<category><![CDATA[password reset]]></category>
		<category><![CDATA[Patriot Act]]></category>
		<category><![CDATA[Pentagon]]></category>
		<category><![CDATA[plugin vulnerability]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Quick Assist]]></category>
		<category><![CDATA[RBC]]></category>
		<category><![CDATA[risk tolerance]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[selfies]]></category>
		<category><![CDATA[Shakepay]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Tea app]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[UpGuard]]></category>
		<category><![CDATA[vendor breach]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[warrantless access]]></category>
		<category><![CDATA[WordPress]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31973</guid>

					<description><![CDATA[RBC Debanks Toronto lawyer representing Freedom Convoy defendants,
Thousands of Women's IDs and Selfies Leaked from Viral App in Massive Hack,
Clorox Blames $380 Million Cyberattack on IT Giant After Shocking Mistake ...this and more in AofE  #411 <img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants&amp;action_name=%23AxisOfEasy%20411%3A%20RBC%20Debanks%20Toronto%20Lawyer%20Representing%20Freedom%20Convoy%20Defendants&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants/?pk_campaign=feed&#038;pk_kwd=axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 408: Scammers Are Ready To Strike As Amazon Prime Day Begins Tomorrow</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/?pk_campaign=feed&#038;pk_kwd=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/?pk_campaign=feed&#038;pk_kwd=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 11 Jul 2025 22:00:17 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[130 vulnerabilities]]></category>
		<category><![CDATA[AI bots]]></category>
		<category><![CDATA[AI malware]]></category>
		<category><![CDATA[Amazon Prime Day]]></category>
		<category><![CDATA[AMOS]]></category>
		<category><![CDATA[Apple Keychain]]></category>
		<category><![CDATA[Bill C-63]]></category>
		<category><![CDATA[bot blocking]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[browser data theft]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship law]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Chinese hacker]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[content monetization]]></category>
		<category><![CDATA[COVID research theft]]></category>
		<category><![CDATA[crypto users]]></category>
		<category><![CDATA[CVE-2024-12856]]></category>
		<category><![CDATA[CVE-2024-3721]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[data scraping]]></category>
		<category><![CDATA[DDoS attacks]]></category>
		<category><![CDATA[email fraud]]></category>
		<category><![CDATA[encrypted malware]]></category>
		<category><![CDATA[fake domains]]></category>
		<category><![CDATA[fake Zoom invites]]></category>
		<category><![CDATA[firmware vulnerabilities]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[Four-Faith routers]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[government overreach]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[internet restrictions]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[macOS backdoor]]></category>
		<category><![CDATA[macOS malware]]></category>
		<category><![CDATA[Mark Carney]]></category>
		<category><![CDATA[Matthew Prince]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Defender evasion]]></category>
		<category><![CDATA[Minecraft disguise]]></category>
		<category><![CDATA[NimDoor]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Nova Scotia Power]]></category>
		<category><![CDATA[Online Harms Bill]]></category>
		<category><![CDATA[password theft]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[pay-per-crawl]]></category>
		<category><![CDATA[permission-first model]]></category>
		<category><![CDATA[persistent threats]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[proxy devices]]></category>
		<category><![CDATA[RondoDox]]></category>
		<category><![CDATA[Russian hackers]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[SentinelOne]]></category>
		<category><![CDATA[smart meters]]></category>
		<category><![CDATA[stealth attacks]]></category>
		<category><![CDATA[TBK DVRs]]></category>
		<category><![CDATA[Telegram attacks]]></category>
		<category><![CDATA[website control]]></category>
		<category><![CDATA[Xu Zewei]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31849</guid>

					<description><![CDATA[Scammers Are Ready to Strike as Amazon Prime Day Begins Tomorrow,
New Malware Turns Security Devices Into Silent Weapons for Cyber Attacks,
AI Bots Face a Toll as Cloudflare Makes Them Pay to Scrape Websites ...this and more in AofE  #408<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow&amp;action_name=%23AxisOfEasy%20408%3A%20Scammers%20Are%20Ready%20To%20Strike%20As%20Amazon%20Prime%20Day%20Begins%20Tomorrow&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/?pk_campaign=feed&#038;pk_kwd=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 387: UK Secretly Orders Apple To Build Global iCloud Backdoor, Sparking Privacy Battle</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle/?pk_campaign=feed&#038;pk_kwd=axisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle/?pk_campaign=feed&#038;pk_kwd=axisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 14 Feb 2025 23:00:46 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple compliance]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data access]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[encryption ban]]></category>
		<category><![CDATA[encryption debate]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[global implications]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[hacking risks]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[intelligence agencies]]></category>
		<category><![CDATA[Investigatory Powers Act]]></category>
		<category><![CDATA[key escrow]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privacy battle]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Snoopers’ Charter]]></category>
		<category><![CDATA[surveillance law]]></category>
		<category><![CDATA[Tech Regulation]]></category>
		<category><![CDATA[technology policy]]></category>
		<category><![CDATA[UK]]></category>
		<category><![CDATA[Western governments]]></category>
		<category><![CDATA[whistleblowing]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31004</guid>

					<description><![CDATA[UK Secretly Orders Apple to Build Global iCloud Backdoor, Sparking Privacy Battle,
PlayStation Network Outage Leaves Gamers Stranded: PS4, PS5, and Online Services Down with No ETA,
China-Linked Disinformation Targets Freeland in Liberal Leadership Race, SITE Warns ... this and more in AofE  #387<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle&amp;action_name=%23AxisOfEasy%20387%3A%20UK%20Secretly%20Orders%20Apple%20To%20Build%20Global%20iCloud%20Backdoor%2C%20Sparking%20Privacy%20Battle&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle/?pk_campaign=feed&#038;pk_kwd=axisofeasy-387-uk-secretly-orders-apple-to-build-global-icloud-backdoor-sparking-privacy-battle/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
	</channel>
</rss>
