<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Claude</title>
	<atom:link href="https://axisofeasy.com/tag/claude/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 24 Apr 2026 21:07:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>Claude</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 447: Unauthorized Group Accesses Anthropic’s Mythos Security Tool</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-447-unauthorized-group-accesses-anthropics-mythos-security-tool/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-447-unauthorized-group-accesses-anthropics-mythos-security-tool</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-447-unauthorized-group-accesses-anthropics-mythos-security-tool/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 24 Apr 2026 22:00:30 +0000</pubDate>
				<category><![CDATA[agi]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[ai breach]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[anthropic ai]]></category>
		<category><![CDATA[anthropic ceo]]></category>
		<category><![CDATA[anthropic falling]]></category>
		<category><![CDATA[anthropic hack]]></category>
		<category><![CDATA[anthropic losing]]></category>
		<category><![CDATA[anthropic mythos]]></category>
		<category><![CDATA[anthropic vs openai]]></category>
		<category><![CDATA[AoE podcast]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Axis Of Easy]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[Claude AI]]></category>
		<category><![CDATA[Claude Code]]></category>
		<category><![CDATA[claude leak]]></category>
		<category><![CDATA[claude mythos]]></category>
		<category><![CDATA[claude vs chatgpt]]></category>
		<category><![CDATA[claude vs gpt-5]]></category>
		<category><![CDATA[Dario Amodei]]></category>
		<category><![CDATA[generative AI]]></category>
		<category><![CDATA[gpt-5]]></category>
		<category><![CDATA[mythos breach]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[openai beats anthropic]]></category>
		<category><![CDATA[Project Glasswing]]></category>
		<category><![CDATA[sam altman]]></category>
		<category><![CDATA[tech news]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=33790</guid>

					<description><![CDATA[In this issue: Unauthorized Group Accesses Anthropic’s Mythos Security Tool Vercel Breached via Compromised Google Workspace OAuth App Canada&#8217;s Liberals Move to Revive Online Speech Legislation Crypto Scam Targets Shipping Chaos in Strait of Hormuz Mastodon and Bluesky Hit by DDoS Attacks in Rapid Succession Ethereum gateway domain hijacked on our watch In this issue: [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-447-unauthorized-group-accesses-anthropics-mythos-security-tool%2F&amp;action_name=%23AxisOfEasy%20447%3A%20Unauthorized%20Group%20Accesses%20Anthropic%E2%80%99s%20Mythos%20Security%20Tool&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-447-unauthorized-group-accesses-anthropics-mythos-security-tool/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 439: OpenAI Suppressed Warnings On Mass Shooter Months Before Spree</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree/?pk_campaign=feed&#038;pk_kwd=axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree/?pk_campaign=feed&#038;pk_kwd=axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 27 Feb 2026 23:00:38 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[abundance]]></category>
		<category><![CDATA[active exploitation]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI espionage]]></category>
		<category><![CDATA[AI governance]]></category>
		<category><![CDATA[AI revolution]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[BeaverTail]]></category>
		<category><![CDATA[biometric surveillance]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Canadian law enforcement]]></category>
		<category><![CDATA[child data protection]]></category>
		<category><![CDATA[Chrome zero-day]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Contagious Interview]]></category>
		<category><![CDATA[CVE-2026-2441]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exposure]]></category>
		<category><![CDATA[dji romo]]></category>
		<category><![CDATA[duty to report]]></category>
		<category><![CDATA[Evan Solomon]]></category>
		<category><![CDATA[fake IT workers]]></category>
		<category><![CDATA[GitLab]]></category>
		<category><![CDATA[gun violence]]></category>
		<category><![CDATA[hacking tools]]></category>
		<category><![CDATA[IoT vulnerability]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[mass shooting]]></category>
		<category><![CDATA[MCP worm]]></category>
		<category><![CDATA[model distillation]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[npm supply chain attack]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Ottercookie]]></category>
		<category><![CDATA[Persona]]></category>
		<category><![CDATA[pre-crime ethics]]></category>
		<category><![CDATA[privacy vs security]]></category>
		<category><![CDATA[red flag laws]]></category>
		<category><![CDATA[Reddit fine]]></category>
		<category><![CDATA[root code execution]]></category>
		<category><![CDATA[Russia cybercrime]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[smart home surveillance]]></category>
		<category><![CDATA[SolarWinds Serv-U]]></category>
		<category><![CDATA[supply chain security]]></category>
		<category><![CDATA[synthetic identities]]></category>
		<category><![CDATA[tumbler ridge]]></category>
		<category><![CDATA[UK ICO]]></category>
		<category><![CDATA[use-after-free]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33269</guid>

					<description><![CDATA[OpenAI Flagged Tumbler Ridge Shooter's Chat Sessions, But Did Nothing,
GitLab Disrupts North Korean "Contagious Interview" and Fake IT Worker Networks,
DJI Robot Vacuum Flaw Exposed 7,000 Homes... this and more in AofE  #439<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree&amp;action_name=%23AxisOfEasy%20439%3A%20OpenAI%20Suppressed%20Warnings%20On%20Mass%20Shooter%20Months%20Before%20Spree&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree/?pk_campaign=feed&#038;pk_kwd=axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 436: OpenClaw And Moltbook: Inside The Rise Of Autonomous AI Agents</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents/?pk_campaign=feed&#038;pk_kwd=axisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents/?pk_campaign=feed&#038;pk_kwd=axisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 06 Feb 2026 23:00:15 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI agents]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[AI toys]]></category>
		<category><![CDATA[Amaranth Dragon]]></category>
		<category><![CDATA[APT groups]]></category>
		<category><![CDATA[APT28]]></category>
		<category><![CDATA[autonomous AI]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[bulletproof hosting]]></category>
		<category><![CDATA[CaMeL]]></category>
		<category><![CDATA[children’s data privacy]]></category>
		<category><![CDATA[Chinese threat actors]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[cloud exploitation]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[Critical vulnerabilities]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[DeepMind]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[government targeting]]></category>
		<category><![CDATA[hosting compromise]]></category>
		<category><![CDATA[Lambda]]></category>
		<category><![CDATA[lateral movement]]></category>
		<category><![CDATA[LLM security]]></category>
		<category><![CDATA[Looker]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[malware campaigns]]></category>
		<category><![CDATA[Moltbook]]></category>
		<category><![CDATA[nation-state attackers]]></category>
		<category><![CDATA[Notepad++]]></category>
		<category><![CDATA[Office vulnerability]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[OpenClaw]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RCE]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[S3]]></category>
		<category><![CDATA[SOCKS5 proxy]]></category>
		<category><![CDATA[software updates]]></category>
		<category><![CDATA[SQL injection]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[system automation]]></category>
		<category><![CDATA[SystemBC]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[Violet Typhoon]]></category>
		<category><![CDATA[vulnerability disclosure]]></category>
		<category><![CDATA[WinRAR exploit]]></category>
		<category><![CDATA[WordPress plugins]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33088</guid>

					<description><![CDATA[OpenClaw and Moltbook: Inside the Rise of Autonomous AI Agents
State Hackers Hijack Notepad++ Updates in Months-Long Supply-Chain Attack
SystemBC Malware Hits 10,000+ Global IPs, Targets Government Sites ... this and more in AofE  #436<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents&amp;action_name=%23AxisOfEasy%20436%3A%20OpenClaw%20And%20Moltbook%3A%20Inside%20The%20Rise%20Of%20Autonomous%20AI%20Agents&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents/?pk_campaign=feed&#038;pk_kwd=axisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 433: Australia Moves To Enact Sweeping New Hate Speech And Extremism Laws</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 23:00:28 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[agentic AI]]></category>
		<category><![CDATA[AI impact]]></category>
		<category><![CDATA[AI model reconnaissance]]></category>
		<category><![CDATA[AI Red Teaming]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[AI Tooling Risks]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[antisemitism]]></category>
		<category><![CDATA[AsyncRAT]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[blockchain abuse]]></category>
		<category><![CDATA[burden of proof]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[C2 evasion]]></category>
		<category><![CDATA[Check Point Research]]></category>
		<category><![CDATA[Chinese threat actors]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cloudflare abuse]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[cyber extortion]]></category>
		<category><![CDATA[cybercrime-as-a-service]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[data breaches]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[DeadLock]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[developer layoffs]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[extremism legislation]]></category>
		<category><![CDATA[fintech security]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[generative AI abuse]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[government censorship]]></category>
		<category><![CDATA[Group-IB]]></category>
		<category><![CDATA[Hacker News]]></category>
		<category><![CDATA[hate speech laws]]></category>
		<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[law enforcement powers]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[LLM Exploits]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[micropayments]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Model Isolation Failures]]></category>
		<category><![CDATA[online speech]]></category>
		<category><![CDATA[open source software]]></category>
		<category><![CDATA[OS command injection]]></category>
		<category><![CDATA[parliament]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing campaigns]]></category>
		<category><![CDATA[Polygon]]></category>
		<category><![CDATA[Privacy & PII]]></category>
		<category><![CDATA[prohibited groups]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reclaim The Net]]></category>
		<category><![CDATA[RedVDS]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Secure AI Design]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[software sustainability]]></category>
		<category><![CDATA[SSH key theft]]></category>
		<category><![CDATA[SSRF attacks]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[supply-chain risk]]></category>
		<category><![CDATA[Tailwind CSS]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[voice cloning]]></category>
		<category><![CDATA[VoidLink]]></category>
		<category><![CDATA[Windows security patches]]></category>
		<category><![CDATA[X402 protocol]]></category>
		<category><![CDATA[zero-day vulnerabilities]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32970</guid>

					<description><![CDATA[Australia Moves to Enact Sweeping New Hate Speech and Extremism Laws,
Can x402 micropayments save Open Source Software?
Claude Cowork Exfiltrates Files ... this and more in AofE  #433<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&amp;action_name=%23AxisOfEasy%20433%3A%20Australia%20Moves%20To%20Enact%20Sweeping%20New%20Hate%20Speech%20And%20Extremism%20Laws&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
