<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>critical infrastructure attacks</title>
	<atom:link href="https://axisofeasy.com/tag/critical-infrastructure-attacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 30 Jan 2026 17:56:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>critical infrastructure attacks</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 435: FBI Accesses Microsoft BitLocker Keys In Guam Fraud Case</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/?pk_campaign=feed&#038;pk_kwd=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/?pk_campaign=feed&#038;pk_kwd=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 30 Jan 2026 23:00:30 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI prompt collection]]></category>
		<category><![CDATA[AI-assisted attacks]]></category>
		<category><![CDATA[BitLocker encryption]]></category>
		<category><![CDATA[CI/CD pipeline compromise]]></category>
		<category><![CDATA[cloud key escrow]]></category>
		<category><![CDATA[container image risk]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[critical infrastructure attacks]]></category>
		<category><![CDATA[CVE exposure]]></category>
		<category><![CDATA[cybercrime forums]]></category>
		<category><![CDATA[dark web seizures]]></category>
		<category><![CDATA[data localization]]></category>
		<category><![CDATA[device encryption backdoors]]></category>
		<category><![CDATA[DOJ cybercrime enforcement]]></category>
		<category><![CDATA[energy grid cyberattacks]]></category>
		<category><![CDATA[enterprise data breaches]]></category>
		<category><![CDATA[extortion groups]]></category>
		<category><![CDATA[FBI takedowns]]></category>
		<category><![CDATA[FBI warrant]]></category>
		<category><![CDATA[Fortinet exploits]]></category>
		<category><![CDATA[fraud investigation]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Guam unemployment fraud]]></category>
		<category><![CDATA[high-severity vulnerabilities]]></category>
		<category><![CDATA[initial access brokers]]></category>
		<category><![CDATA[JavaScript supply chain flaws]]></category>
		<category><![CDATA[joint venture governance]]></category>
		<category><![CDATA[Lapsus$ affiliates]]></category>
		<category><![CDATA[law enforcement access]]></category>
		<category><![CDATA[malicious packages]]></category>
		<category><![CDATA[Maven Central]]></category>
		<category><![CDATA[MFA fatigue]]></category>
		<category><![CDATA[Microsoft cloud keys]]></category>
		<category><![CDATA[namespace confusion]]></category>
		<category><![CDATA[nation-state hacking]]></category>
		<category><![CDATA[network device compromise]]></category>
		<category><![CDATA[Nike data theft]]></category>
		<category><![CDATA[npm ecosystem]]></category>
		<category><![CDATA[NuGet vulnerabilities]]></category>
		<category><![CDATA[Okta impersonation]]></category>
		<category><![CDATA[open source supply chain attacks]]></category>
		<category><![CDATA[operational disruption]]></category>
		<category><![CDATA[Oracle cloud hosting]]></category>
		<category><![CDATA[PackageGate]]></category>
		<category><![CDATA[platform surveillance]]></category>
		<category><![CDATA[precise location tracking]]></category>
		<category><![CDATA[Privacy Risks]]></category>
		<category><![CDATA[PyPI threats]]></category>
		<category><![CDATA[RAMP marketplace]]></category>
		<category><![CDATA[ransomware extortion]]></category>
		<category><![CDATA[ransomware gangs]]></category>
		<category><![CDATA[RCE vulnerabilities]]></category>
		<category><![CDATA[recommendation algorithms]]></category>
		<category><![CDATA[repository abuse]]></category>
		<category><![CDATA[Russian intelligence operations]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Slack impersonation]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[software supply chain security]]></category>
		<category><![CDATA[SSO bypass]]></category>
		<category><![CDATA[Teams abuse]]></category>
		<category><![CDATA[threat actor migration]]></category>
		<category><![CDATA[TikTok US data collection]]></category>
		<category><![CDATA[typosquatting attacks]]></category>
		<category><![CDATA[US-China tech tensions]]></category>
		<category><![CDATA[vishing attacks]]></category>
		<category><![CDATA[voice phishing]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33045</guid>

					<description><![CDATA[FBI Accesses Microsoft BitLocker Keys in Guam Fraud Case,
Open Source Supply Chains Under Attack: Malicious Packages Surge,
Cybercrime Alliance Hits 100+ Global Organisations with Vishing Attacks ... this and more in AofE  #435<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case&amp;action_name=%23AxisOfEasy%20435%3A%20FBI%20Accesses%20Microsoft%20BitLocker%20Keys%20In%20Guam%20Fraud%20Case&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/?pk_campaign=feed&#038;pk_kwd=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
