<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Claude Code</title>
	<atom:link href="https://axisofeasy.com/tag/claude-code/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 24 Apr 2026 21:07:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>Claude Code</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 447: Unauthorized Group Accesses Anthropic’s Mythos Security Tool</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-447-unauthorized-group-accesses-anthropics-mythos-security-tool/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-447-unauthorized-group-accesses-anthropics-mythos-security-tool</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-447-unauthorized-group-accesses-anthropics-mythos-security-tool/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 24 Apr 2026 22:00:30 +0000</pubDate>
				<category><![CDATA[agi]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[ai breach]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[anthropic ai]]></category>
		<category><![CDATA[anthropic ceo]]></category>
		<category><![CDATA[anthropic falling]]></category>
		<category><![CDATA[anthropic hack]]></category>
		<category><![CDATA[anthropic losing]]></category>
		<category><![CDATA[anthropic mythos]]></category>
		<category><![CDATA[anthropic vs openai]]></category>
		<category><![CDATA[AoE podcast]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Axis Of Easy]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[Claude AI]]></category>
		<category><![CDATA[Claude Code]]></category>
		<category><![CDATA[claude leak]]></category>
		<category><![CDATA[claude mythos]]></category>
		<category><![CDATA[claude vs chatgpt]]></category>
		<category><![CDATA[claude vs gpt-5]]></category>
		<category><![CDATA[Dario Amodei]]></category>
		<category><![CDATA[generative AI]]></category>
		<category><![CDATA[gpt-5]]></category>
		<category><![CDATA[mythos breach]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[openai beats anthropic]]></category>
		<category><![CDATA[Project Glasswing]]></category>
		<category><![CDATA[sam altman]]></category>
		<category><![CDATA[tech news]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=33790</guid>

					<description><![CDATA[In this issue: Unauthorized Group Accesses Anthropic’s Mythos Security Tool Vercel Breached via Compromised Google Workspace OAuth App Canada&#8217;s Liberals Move to Revive Online Speech Legislation Crypto Scam Targets Shipping Chaos in Strait of Hormuz Mastodon and Bluesky Hit by DDoS Attacks in Rapid Succession Ethereum gateway domain hijacked on our watch In this issue: [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-447-unauthorized-group-accesses-anthropics-mythos-security-tool%2F&amp;action_name=%23AxisOfEasy%20447%3A%20Unauthorized%20Group%20Accesses%20Anthropic%E2%80%99s%20Mythos%20Security%20Tool&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-447-unauthorized-group-accesses-anthropics-mythos-security-tool/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 427: Cloudflare’s Internal Failure Briefly Turns The Internet’s Biggest Platforms Dark</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark/?pk_campaign=feed&#038;pk_kwd=axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark/?pk_campaign=feed&#038;pk_kwd=axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 21 Nov 2025 23:00:45 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[7-Zip]]></category>
		<category><![CDATA[AI-driven cyberattack]]></category>
		<category><![CDATA[Ariantel]]></category>
		<category><![CDATA[autonomous hacking]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[Blockchain.com]]></category>
		<category><![CDATA[Bot Management System]]></category>
		<category><![CDATA[centralized infrastructure]]></category>
		<category><![CDATA[Chat]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Chinese state actors]]></category>
		<category><![CDATA[CIPA]]></category>
		<category><![CDATA[Citizen Lab]]></category>
		<category><![CDATA[Cl0p ransomware]]></category>
		<category><![CDATA[Claude Code]]></category>
		<category><![CDATA[cloud DDoS attack]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[Coinbase]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data access]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[database error]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[DDoSecrets]]></category>
		<category><![CDATA[decentralization]]></category>
		<category><![CDATA[deceptive practices]]></category>
		<category><![CDATA[deep packet inspection]]></category>
		<category><![CDATA[DoorDash breach]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[Ethereum]]></category>
		<category><![CDATA[fake IT workers]]></category>
		<category><![CDATA[FIN11]]></category>
		<category><![CDATA[financial sector]]></category>
		<category><![CDATA[Freedom of Speech]]></category>
		<category><![CDATA[FTSE 100 credentials]]></category>
		<category><![CDATA[Gemini AI]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[internet outage]]></category>
		<category><![CDATA[Logitech]]></category>
		<category><![CDATA[Meet]]></category>
		<category><![CDATA[Model Context Protocol]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Oracle EBS]]></category>
		<category><![CDATA[political persecution]]></category>
		<category><![CDATA[privacy lawsuit]]></category>
		<category><![CDATA[Protei]]></category>
		<category><![CDATA[ransomware campaign]]></category>
		<category><![CDATA[RCE vulnerability]]></category>
		<category><![CDATA[SOC automation]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SORM]]></category>
		<category><![CDATA[Stored Communications Act]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[symbolic link exploit]]></category>
		<category><![CDATA[telecom interception]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Trustless Manifesto]]></category>
		<category><![CDATA[Venezuela]]></category>
		<category><![CDATA[vulnerability assessment]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[X]]></category>
		<category><![CDATA[Zero-day vulnerability]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32662</guid>

					<description><![CDATA[Cloudflare’s internal failure briefly turns the internet’s biggest platforms dark
Protei is hacked and its surveillance data spills into public view
AI runs most of a state-backed cyberattack and forces OpenAI to sound the alarm... this and more in AofE  #427<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark&amp;action_name=%23AxisOfEasy%20427%3A%20Cloudflare%E2%80%99s%20Internal%20Failure%20Briefly%20Turns%20The%20Internet%E2%80%99s%20Biggest%20Platforms%20Dark&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark/?pk_campaign=feed&#038;pk_kwd=axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 415: PromptLock Signals The Arrival Of AI Powered Ransomware</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 29 Aug 2025 22:00:33 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[4Chan]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI crimewave]]></category>
		<category><![CDATA[AI enhancements]]></category>
		<category><![CDATA[algorithmic mediation]]></category>
		<category><![CDATA[Android Trojan]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[authenticity]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Banks]]></category>
		<category><![CDATA[Base64]]></category>
		<category><![CDATA[Bill C-11]]></category>
		<category><![CDATA[Bill C-13]]></category>
		<category><![CDATA[bitcoin ransom]]></category>
		<category><![CDATA[Broadcasting Act]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Claude Code]]></category>
		<category><![CDATA[court case]]></category>
		<category><![CDATA[creator backlash]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[defense contractors]]></category>
		<category><![CDATA[EDR evasion]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[extraterritoriality]]></category>
		<category><![CDATA[Farmers Insurance]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[filename parsing]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[GoLang]]></category>
		<category><![CDATA[Google Pixel]]></category>
		<category><![CDATA[GPT-OSS]]></category>
		<category><![CDATA[guardrails]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hospitals]]></category>
		<category><![CDATA[hybrid cloud]]></category>
		<category><![CDATA[io_uring]]></category>
		<category><![CDATA[Kiwi Farms]]></category>
		<category><![CDATA[legislative error]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Netflix]]></category>
		<category><![CDATA[Ofcom]]></category>
		<category><![CDATA[Ollama]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PromptLock]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RingReaper]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[shell injection]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Shorts]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Storm-0501]]></category>
		<category><![CDATA[trust]]></category>
		<category><![CDATA[U.S. Constitution]]></category>
		<category><![CDATA[UNC5174]]></category>
		<category><![CDATA[VShell]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Youtube]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32136</guid>

					<description><![CDATA[PromptLock Signals the Arrival of AI Powered Ransomware,
Phishing Campaign Exploits Linux Filename Parsing to Deliver VShell Backdoor,
Government Error Erases Privacy Rights from Broadcasting Act ...this and more in AofE  #415<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware&amp;action_name=%23AxisOfEasy%20415%3A%20PromptLock%20Signals%20The%20Arrival%20Of%20AI%20Powered%20Ransomware&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
	</channel>
</rss>
