<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cybercrime</title>
	<atom:link href="https://axisofeasy.com/tag/cybercrime/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 23 Jan 2026 18:55:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>cybercrime</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisofEasy 434: Ireland Moves To Expand Digital Surveillance Powers</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 23 Jan 2026 23:00:52 +0000</pubDate>
				<category><![CDATA[AI malware]]></category>
		<category><![CDATA[Biometric Verification]]></category>
		<category><![CDATA[calendar vulnerability]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[cybersecurity update]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[digital ID]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Google Gemini]]></category>
		<category><![CDATA[government data breach]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Ireland surveillance bill]]></category>
		<category><![CDATA[KOSMA bill]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Concerns]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security threats]]></category>
		<category><![CDATA[social media age verification]]></category>
		<category><![CDATA[Supreme Court hack]]></category>
		<category><![CDATA[tech news]]></category>
		<category><![CDATA[VoidLink]]></category>
		<category><![CDATA[weekly security news]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=33022</guid>

					<description><![CDATA[Ireland ramps up surveillance powers while AI builds malware in days. KOSMA demands digital ID age checks. Google Gemini flaw exposes calendars. Supreme Court hacked. Your privacy under attack.<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers%2F&amp;action_name=%23AxisofEasy%20434%3A%20Ireland%20Moves%20To%20Expand%20Digital%20Surveillance%20Powers&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 425: Microsoft Teams Security Flaws Show How Easily Digital Trust Can Be Exploited</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 07 Nov 2025 23:00:12 +0000</pubDate>
				<category><![CDATA[biometrics]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Data Leaks]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Surveillance]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32604</guid>

					<description><![CDATA[DHS wants to start collecting biometric data from citizens, MS Teams has a monster zero-day, and Open AI continues to leak like an old faucet. Do you have anything to worry about?<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited%2F&amp;action_name=%23AxisOfEasy%20425%3A%20Microsoft%20Teams%20Security%20Flaws%20Show%20How%20Easily%20Digital%20Trust%20Can%20Be%20Exploited&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 420: RedNovember&#8217;s Global Cyber-Espionage Blitz</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-420-rednovembers-global-cyber-espionage-blitz</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 03 Oct 2025 22:00:20 +0000</pubDate>
				<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[C11]]></category>
		<category><![CDATA[C18]]></category>
		<category><![CDATA[Canadian Legislation]]></category>
		<category><![CDATA[Canadian Privacy Laws]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[IT Privacy]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Security Software]]></category>
		<category><![CDATA[Social Media Censorship]]></category>
		<category><![CDATA[Surveillance]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32398</guid>

					<description><![CDATA[RedNovember's Global Cyber-Espionage Blitz<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-420-rednovembers-global-cyber-espionage-blitz%2F&amp;action_name=%23AxisOfEasy%20420%3A%20RedNovember%26%238217%3Bs%20Global%20Cyber-Espionage%20Blitz&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 418: Trump Delays TikTok Ban as US Consortium Eyes Control Without Algorithm</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-418-trump-delays-tiktok-ban-as-us-consortium-eyes-control-without-algorithm/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-418-trump-delays-tiktok-ban-as-us-consortium-eyes-control-without-algorithm</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-418-trump-delays-tiktok-ban-as-us-consortium-eyes-control-without-algorithm/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 22:00:50 +0000</pubDate>
				<category><![CDATA[american censorship]]></category>
		<category><![CDATA[best tiktok]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[databreach]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[online harms act]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[TikTok ban]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[trump canada]]></category>
		<category><![CDATA[trump tiktok]]></category>
		<category><![CDATA[us tiktok]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32314</guid>

					<description><![CDATA[Trump Delays TikTok Ban as US Consortium Eyes Control Without Algorithm<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-418-trump-delays-tiktok-ban-as-us-consortium-eyes-control-without-algorithm%2F&amp;action_name=%23AxisOfEasy%20418%3A%20Trump%20Delays%20TikTok%20Ban%20as%20US%20Consortium%20Eyes%20Control%20Without%20Algorithm&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-418-trump-delays-tiktok-ban-as-us-consortium-eyes-control-without-algorithm/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 415: PromptLock Signals The Arrival Of AI Powered Ransomware</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 29 Aug 2025 22:00:46 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[C-11]]></category>
		<category><![CDATA[C-13]]></category>
		<category><![CDATA[C-2]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[daily cybersecurity news]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Michael Geist]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32158</guid>

					<description><![CDATA[PromptLock Signals The Arrival Of AI Powered Ransomware<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware%2F&amp;action_name=%23AxisOfEasy%20415%3A%20PromptLock%20Signals%20The%20Arrival%20Of%20AI%20Powered%20Ransomware&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 415: PromptLock Signals The Arrival Of AI Powered Ransomware</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 29 Aug 2025 22:00:33 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[4Chan]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI crimewave]]></category>
		<category><![CDATA[AI enhancements]]></category>
		<category><![CDATA[algorithmic mediation]]></category>
		<category><![CDATA[Android Trojan]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[authenticity]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Banks]]></category>
		<category><![CDATA[Base64]]></category>
		<category><![CDATA[Bill C-11]]></category>
		<category><![CDATA[Bill C-13]]></category>
		<category><![CDATA[bitcoin ransom]]></category>
		<category><![CDATA[Broadcasting Act]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Claude Code]]></category>
		<category><![CDATA[court case]]></category>
		<category><![CDATA[creator backlash]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[defense contractors]]></category>
		<category><![CDATA[EDR evasion]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[extraterritoriality]]></category>
		<category><![CDATA[Farmers Insurance]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[filename parsing]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[GoLang]]></category>
		<category><![CDATA[Google Pixel]]></category>
		<category><![CDATA[GPT-OSS]]></category>
		<category><![CDATA[guardrails]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hospitals]]></category>
		<category><![CDATA[hybrid cloud]]></category>
		<category><![CDATA[io_uring]]></category>
		<category><![CDATA[Kiwi Farms]]></category>
		<category><![CDATA[legislative error]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Netflix]]></category>
		<category><![CDATA[Ofcom]]></category>
		<category><![CDATA[Ollama]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PromptLock]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RingReaper]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[shell injection]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Shorts]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Storm-0501]]></category>
		<category><![CDATA[trust]]></category>
		<category><![CDATA[U.S. Constitution]]></category>
		<category><![CDATA[UNC5174]]></category>
		<category><![CDATA[VShell]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Youtube]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32136</guid>

					<description><![CDATA[PromptLock Signals the Arrival of AI Powered Ransomware,
Phishing Campaign Exploits Linux Filename Parsing to Deliver VShell Backdoor,
Government Error Erases Privacy Rights from Broadcasting Act ...this and more in AofE  #415<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware&amp;action_name=%23AxisOfEasy%20415%3A%20PromptLock%20Signals%20The%20Arrival%20Of%20AI%20Powered%20Ransomware&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 407: Brazil Holds Tech Platforms Liable For User Content In Landmark Ruling</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling/?pk_campaign=feed&#038;pk_kwd=axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling/?pk_campaign=feed&#038;pk_kwd=axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 04 Jul 2025 22:00:46 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Aeza Group]]></category>
		<category><![CDATA[airline breach]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[API vulnerability]]></category>
		<category><![CDATA[Blind Eagle]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[bulletproof hosting]]></category>
		<category><![CDATA[Call Center]]></category>
		<category><![CDATA[Catwatchful]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cold wallets]]></category>
		<category><![CDATA[content moderation]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[crypto theft]]></category>
		<category><![CDATA[CSV]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[digital surveillance]]></category>
		<category><![CDATA[G_mic]]></category>
		<category><![CDATA[geolocation data]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Firebase]]></category>
		<category><![CDATA[hate speech]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[identity verification]]></category>
		<category><![CDATA[JSON]]></category>
		<category><![CDATA[legal compliance]]></category>
		<category><![CDATA[Mailchimp]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Nim malware]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Omar Soca Charcov]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing attack]]></category>
		<category><![CDATA[platform liability]]></category>
		<category><![CDATA[political speech]]></category>
		<category><![CDATA[Proton66]]></category>
		<category><![CDATA[Qantas]]></category>
		<category><![CDATA[sanctions]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[seed phrase]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Stalkerware]]></category>
		<category><![CDATA[support system abuse]]></category>
		<category><![CDATA[Supreme Court]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[systemic failure]]></category>
		<category><![CDATA[T-Mobile]]></category>
		<category><![CDATA[third-party risk]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[Trezor]]></category>
		<category><![CDATA[Verizon]]></category>
		<category><![CDATA[Web3]]></category>
		<category><![CDATA[X]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31786</guid>

					<description><![CDATA[Brazil Holds Tech Platforms Liable for User Content in Landmark Ruling,
Catwatchful Breach Exposes Stalkerware Users, Victims, and Developer,
Verizon and T-Mobile Customer Data Breach Exposes 116 Million Records for Sale in 2025 Leak ...this and more in AofE  #407<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling&amp;action_name=%23AxisOfEasy%20407%3A%20Brazil%20Holds%20Tech%20Platforms%20Liable%20For%20User%20Content%20In%20Landmark%20Ruling&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling/?pk_campaign=feed&#038;pk_kwd=axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 406: Chinese State Hackers Exploit Unpatched Cisco Flaw to Breach Canadian Telecom Network</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network/?pk_campaign=feed&#038;pk_kwd=axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network/?pk_campaign=feed&#038;pk_kwd=axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 27 Jun 2025 22:00:39 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Aflac]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI copyright]]></category>
		<category><![CDATA[AI innovation]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[biometrics]]></category>
		<category><![CDATA[Books3]]></category>
		<category><![CDATA[Brother printers]]></category>
		<category><![CDATA[call center compromise]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Canadian Centre for Cyber Security]]></category>
		<category><![CDATA[certificate spoofing]]></category>
		<category><![CDATA[children's data]]></category>
		<category><![CDATA[Chinese hackers]]></category>
		<category><![CDATA[Cisco IOS XE]]></category>
		<category><![CDATA[Cisco patching]]></category>
		<category><![CDATA[CITYLIGHT MEDIA]]></category>
		<category><![CDATA[Cloudflare impersonation]]></category>
		<category><![CDATA[COPPA 2.0]]></category>
		<category><![CDATA[crypto mining]]></category>
		<category><![CDATA[CVE-2018-0171]]></category>
		<category><![CDATA[CVE-2023-20198]]></category>
		<category><![CDATA[CVE-2023-20273]]></category>
		<category><![CDATA[CVE-2024-20399]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity negligence]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data collection]]></category>
		<category><![CDATA[data misuse]]></category>
		<category><![CDATA[Docker misconfiguration]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[fair use]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[GitHub vulnerability]]></category>
		<category><![CDATA[Google v. Oracle]]></category>
		<category><![CDATA[GRE tunnel]]></category>
		<category><![CDATA[hacker collective]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[insurance sector]]></category>
		<category><![CDATA[Judge William Alsup]]></category>
		<category><![CDATA[lawful intercept]]></category>
		<category><![CDATA[legal exposure]]></category>
		<category><![CDATA[LibGen]]></category>
		<category><![CDATA[LLM training]]></category>
		<category><![CDATA[malicious infrastructure]]></category>
		<category><![CDATA[Microsoft Entra ID]]></category>
		<category><![CDATA[NetExtender]]></category>
		<category><![CDATA[nOAuth vulnerability]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[PiLiMi]]></category>
		<category><![CDATA[pirated data]]></category>
		<category><![CDATA[platform liability]]></category>
		<category><![CDATA[PRC-backed operations]]></category>
		<category><![CDATA[printer vulnerability]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[Senate bill]]></category>
		<category><![CDATA[SEO Poisoning]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[SSNs]]></category>
		<category><![CDATA[State-sponsored hacking]]></category>
		<category><![CDATA[summary judgment]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[telecom breach]]></category>
		<category><![CDATA[Trojanized installer]]></category>
		<category><![CDATA[unintended surveillance]]></category>
		<category><![CDATA[universal age checks]]></category>
		<category><![CDATA[unpatchable bug]]></category>
		<category><![CDATA[unpatched vulnerabilities]]></category>
		<category><![CDATA[VPN credential theft]]></category>
		<category><![CDATA[wiretap monitoring]]></category>
		<category><![CDATA[WordPress malware]]></category>
		<category><![CDATA[youth privacy]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31748</guid>

					<description><![CDATA[Chinese State Hackers Exploit Unpatched Cisco Flaw to Breach Canadian Telecom Network
Senate Bill Expands Youth Privacy Rules and Raises Concerns Over Online Surveillance
Aflac Reports Data Breach Affecting Customers and Employees...this and more in AofE  #406<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network&amp;action_name=%23AxisOfEasy%20406%3A%20Chinese%20State%20Hackers%20Exploit%20Unpatched%20Cisco%20Flaw%20to%20Breach%20Canadian%20Telecom%20Network&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network/?pk_campaign=feed&#038;pk_kwd=axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network/feed/</wfw:commentRss>
			<slash:comments>7</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 405: Senate Bill Could Kill Private Messaging And Put Your Privacy At Risk</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 20 Jun 2025 22:00:22 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[algorithmic control]]></category>
		<category><![CDATA[Bill C-4]]></category>
		<category><![CDATA[CBDCs]]></category>
		<category><![CDATA[Child Exploitation]]></category>
		<category><![CDATA[Cloud Services]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[federal privacy law]]></category>
		<category><![CDATA[Google Threat Intelligence]]></category>
		<category><![CDATA[government regulation]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[legal liability]]></category>
		<category><![CDATA[Linux vulnerabilities]]></category>
		<category><![CDATA[messaging apps]]></category>
		<category><![CDATA[Metadata]]></category>
		<category><![CDATA[MFA bypass]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PIPEDA]]></category>
		<category><![CDATA[policy rollback]]></category>
		<category><![CDATA[political parties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[Section 230]]></category>
		<category><![CDATA[SMS spam]]></category>
		<category><![CDATA[social credit]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[STOP CSAM Act]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[WormGPT]]></category>
		<category><![CDATA[Zoomcar]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31714</guid>

					<description><![CDATA[Senate Bill Could Kill Private Messaging and Put Your Privacy at Risk,
Trump Just Gutted Major Cybersecurity Rules and Experts Are Sounding the Alarm,
Hackers Are Now Tricking IT Teams at Big Insurance Firms and Google Is Warning Everyone...this and more in AofE  #405<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk&amp;action_name=%23AxisOfEasy%20405%3A%20Senate%20Bill%20Could%20Kill%20Private%20Messaging%20And%20Put%20Your%20Privacy%20At%20Risk&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 400: North Korean Hackers Infiltrate U.S. Tech Jobs With Fake Identities And Remote Access</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 16 May 2025 22:00:57 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[account compromise]]></category>
		<category><![CDATA[Albania]]></category>
		<category><![CDATA[AnyDesk]]></category>
		<category><![CDATA[Baby Box Info]]></category>
		<category><![CDATA[Belgium]]></category>
		<category><![CDATA[birthdate]]></category>
		<category><![CDATA[breach detection]]></category>
		<category><![CDATA[breach monetization]]></category>
		<category><![CDATA[call centers]]></category>
		<category><![CDATA[Co-Op]]></category>
		<category><![CDATA[compromised credentials]]></category>
		<category><![CDATA[coordinated raids]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[Cubix Tech US]]></category>
		<category><![CDATA[Customer Data Breach]]></category>
		<category><![CDATA[cyber fraud]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybercrime ring]]></category>
		<category><![CDATA[cybercrime statistics]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity response]]></category>
		<category><![CDATA[Cyprus]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[decryption mandate]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[Digital Safety]]></category>
		<category><![CDATA[DOJ indictment]]></category>
		<category><![CDATA[DPRK]]></category>
		<category><![CDATA[DragonForce]]></category>
		<category><![CDATA[Dubai]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[electronic seizures]]></category>
		<category><![CDATA[electronics shipping]]></category>
		<category><![CDATA[encryption backdoor]]></category>
		<category><![CDATA[encryption debate]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[English-Korean]]></category>
		<category><![CDATA[Eurojust]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[fake identities]]></category>
		<category><![CDATA[fake investment schemes]]></category>
		<category><![CDATA[fake resumes]]></category>
		<category><![CDATA[FBI report]]></category>
		<category><![CDATA[financial fraud]]></category>
		<category><![CDATA[Flashpoint]]></category>
		<category><![CDATA[Florida bill]]></category>
		<category><![CDATA[fraud prosecution]]></category>
		<category><![CDATA[fraudulent employment]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Google Translate]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Harrods]]></category>
		<category><![CDATA[Helix US]]></category>
		<category><![CDATA[home address]]></category>
		<category><![CDATA[HR verification scripts]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[incident disclosure]]></category>
		<category><![CDATA[infostealer logs]]></category>
		<category><![CDATA[internal hierarchy]]></category>
		<category><![CDATA[international operation]]></category>
		<category><![CDATA[investment fraud]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[job references]]></category>
		<category><![CDATA[jsilver617]]></category>
		<category><![CDATA[judicial oversight]]></category>
		<category><![CDATA[Lahore Pakistan]]></category>
		<category><![CDATA[Latvia]]></category>
		<category><![CDATA[law enforcement access]]></category>
		<category><![CDATA[legislative overreach]]></category>
		<category><![CDATA[London Stock Exchange update]]></category>
		<category><![CDATA[M&S]]></category>
		<category><![CDATA[Marks and Spencer]]></category>
		<category><![CDATA[minors online safety]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[Nickel Tapestry]]></category>
		<category><![CDATA[NIgeria]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[online gaming]]></category>
		<category><![CDATA[online orders]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[online shopping]]></category>
		<category><![CDATA[OTP codes]]></category>
		<category><![CDATA[password change]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[password reset]]></category>
		<category><![CDATA[password theft]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[phishing risk]]></category>
		<category><![CDATA[phishing risks]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[phone numbers]]></category>
		<category><![CDATA[pig butchering scam]]></category>
		<category><![CDATA[platform security]]></category>
		<category><![CDATA[platform vulnerability]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[professionalized hacking]]></category>
		<category><![CDATA[profit dashboard]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware-as-a-service]]></category>
		<category><![CDATA[remote access]]></category>
		<category><![CDATA[retail cybersecurity]]></category>
		<category><![CDATA[scam brokers]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Steam]]></category>
		<category><![CDATA[stolen identities]]></category>
		<category><![CDATA[subpoena access]]></category>
		<category><![CDATA[surveillance tools]]></category>
		<category><![CDATA[tech legislation]]></category>
		<category><![CDATA[Two-Factor Authentication]]></category>
		<category><![CDATA[U.S. infrastructure infiltration]]></category>
		<category><![CDATA[U.S. tech jobs]]></category>
		<category><![CDATA[UK retailers]]></category>
		<category><![CDATA[user accounts]]></category>
		<category><![CDATA[user privacy]]></category>
		<category><![CDATA[Valve]]></category>
		<category><![CDATA[victim grooming]]></category>
		<category><![CDATA[webcam avoidance]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31552</guid>

					<description><![CDATA[North Korean Hackers Infiltrate U.S. Tech Jobs with Fake Identities and Remote Access,
Steam Breach Exposes 89 Million Accounts in Dark Web Data Sale, 
Marks and Spencer Cyberattack Exposes Customer Data and Halts Online Orders (update from AoE #397)... this and more in AofE  #400<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access&amp;action_name=%23AxisOfEasy%20400%3A%20North%20Korean%20Hackers%20Infiltrate%20U.S.%20Tech%20Jobs%20With%20Fake%20Identities%20And%20Remote%20Access&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
