<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Dark Web</title>
	<atom:link href="https://axisofeasy.com/tag/dark-web/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Mon, 09 Mar 2026 16:39:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>Dark Web</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 440: Meta Ray-Ban Glasses Footage Sent To Human Reviewers</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-440-meta-ray-ban-glasses-footage-sent-to-human-reviewers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-440-meta-ray-ban-glasses-footage-sent-to-human-reviewers&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-440-meta-ray-ban-glasses-footage-sent-to-human-reviewers</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-440-meta-ray-ban-glasses-footage-sent-to-human-reviewers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-440-meta-ray-ban-glasses-footage-sent-to-human-reviewers#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 06 Mar 2026 23:00:25 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AB-1043]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI Ethics]]></category>
		<category><![CDATA[AI governance]]></category>
		<category><![CDATA[AI-guardrails]]></category>
		<category><![CDATA[AI-review]]></category>
		<category><![CDATA[algorithmic-filtering]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[app-hacking]]></category>
		<category><![CDATA[autonomous-weapons]]></category>
		<category><![CDATA[AWS-breach]]></category>
		<category><![CDATA[BadeSaba]]></category>
		<category><![CDATA[breach notification]]></category>
		<category><![CDATA[Buffy-Wicks]]></category>
		<category><![CDATA[CAlifornia]]></category>
		<category><![CDATA[Canadian-Tire]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[content moderation]]></category>
		<category><![CDATA[credential-exposure]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cyberwarfare]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[DarkCell]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data-annotation]]></category>
		<category><![CDATA[Defense-Production-Act]]></category>
		<category><![CDATA[Denmark]]></category>
		<category><![CDATA[device-level-tracking]]></category>
		<category><![CDATA[digital-age-gating]]></category>
		<category><![CDATA[domestic-surveillance]]></category>
		<category><![CDATA[enterprise-data]]></category>
		<category><![CDATA[fulcrumsec]]></category>
		<category><![CDATA[government-accounts]]></category>
		<category><![CDATA[Have I Been Pwned]]></category>
		<category><![CDATA[human-moderation]]></category>
		<category><![CDATA[information-warfare]]></category>
		<category><![CDATA[intelligence-operations]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Kenya]]></category>
		<category><![CDATA[Kings-College-London]]></category>
		<category><![CDATA[LexisNexis]]></category>
		<category><![CDATA[Lulea]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[Meta-servers]]></category>
		<category><![CDATA[Military AI]]></category>
		<category><![CDATA[mobile-app-security]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[Newsom]]></category>
		<category><![CDATA[OS-providers]]></category>
		<category><![CDATA[partial-credit-card-data]]></category>
		<category><![CDATA[password-hashes]]></category>
		<category><![CDATA[PBKDF2]]></category>
		<category><![CDATA[Pentagon]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privacy regulation]]></category>
		<category><![CDATA[privacy-policy]]></category>
		<category><![CDATA[psychological-operations]]></category>
		<category><![CDATA[push-notifications]]></category>
		<category><![CDATA[Ray-Ban]]></category>
		<category><![CDATA[real-time-API]]></category>
		<category><![CDATA[Redshift]]></category>
		<category><![CDATA[RELX]]></category>
		<category><![CDATA[retail security]]></category>
		<category><![CDATA[sensitive-content]]></category>
		<category><![CDATA[smart-glasses]]></category>
		<category><![CDATA[Terms of Service]]></category>
		<category><![CDATA[threat actors]]></category>
		<category><![CDATA[user privacy]]></category>
		<category><![CDATA[video surveillance]]></category>
		<category><![CDATA[VPC]]></category>
		<category><![CDATA[wearable-tech]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33355</guid>

					<description><![CDATA[Meta Ray-Ban Glasses Footage Sent to Human Reviewers,
Israel Allegedly Hacks Iranian Prayer App to Push Wartime Messages,
Canadian Tire Data Breach Hits Millions... this and more in AofE  #440<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-440-meta-ray-ban-glasses-footage-sent-to-human-reviewers%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-440-meta-ray-ban-glasses-footage-sent-to-human-reviewers&amp;action_name=%23AxisOfEasy%20440%3A%20Meta%20Ray-Ban%20Glasses%20Footage%20Sent%20To%20Human%20Reviewers&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-440-meta-ray-ban-glasses-footage-sent-to-human-reviewers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-440-meta-ray-ban-glasses-footage-sent-to-human-reviewers/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 400: North Korean Hackers Infiltrate U.S. Tech Jobs With Fake Identities And Remote Access</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 16 May 2025 22:00:57 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[account compromise]]></category>
		<category><![CDATA[Albania]]></category>
		<category><![CDATA[AnyDesk]]></category>
		<category><![CDATA[Baby Box Info]]></category>
		<category><![CDATA[Belgium]]></category>
		<category><![CDATA[birthdate]]></category>
		<category><![CDATA[breach detection]]></category>
		<category><![CDATA[breach monetization]]></category>
		<category><![CDATA[call centers]]></category>
		<category><![CDATA[Co-Op]]></category>
		<category><![CDATA[compromised credentials]]></category>
		<category><![CDATA[coordinated raids]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[Cubix Tech US]]></category>
		<category><![CDATA[Customer Data Breach]]></category>
		<category><![CDATA[cyber fraud]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybercrime ring]]></category>
		<category><![CDATA[cybercrime statistics]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity response]]></category>
		<category><![CDATA[Cyprus]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[decryption mandate]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[Digital Safety]]></category>
		<category><![CDATA[DOJ indictment]]></category>
		<category><![CDATA[DPRK]]></category>
		<category><![CDATA[DragonForce]]></category>
		<category><![CDATA[Dubai]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[electronic seizures]]></category>
		<category><![CDATA[electronics shipping]]></category>
		<category><![CDATA[encryption backdoor]]></category>
		<category><![CDATA[encryption debate]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[English-Korean]]></category>
		<category><![CDATA[Eurojust]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[fake identities]]></category>
		<category><![CDATA[fake investment schemes]]></category>
		<category><![CDATA[fake resumes]]></category>
		<category><![CDATA[FBI report]]></category>
		<category><![CDATA[financial fraud]]></category>
		<category><![CDATA[Flashpoint]]></category>
		<category><![CDATA[Florida bill]]></category>
		<category><![CDATA[fraud prosecution]]></category>
		<category><![CDATA[fraudulent employment]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Google Translate]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Harrods]]></category>
		<category><![CDATA[Helix US]]></category>
		<category><![CDATA[home address]]></category>
		<category><![CDATA[HR verification scripts]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[incident disclosure]]></category>
		<category><![CDATA[infostealer logs]]></category>
		<category><![CDATA[internal hierarchy]]></category>
		<category><![CDATA[international operation]]></category>
		<category><![CDATA[investment fraud]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[job references]]></category>
		<category><![CDATA[jsilver617]]></category>
		<category><![CDATA[judicial oversight]]></category>
		<category><![CDATA[Lahore Pakistan]]></category>
		<category><![CDATA[Latvia]]></category>
		<category><![CDATA[law enforcement access]]></category>
		<category><![CDATA[legislative overreach]]></category>
		<category><![CDATA[London Stock Exchange update]]></category>
		<category><![CDATA[M&S]]></category>
		<category><![CDATA[Marks and Spencer]]></category>
		<category><![CDATA[minors online safety]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[Nickel Tapestry]]></category>
		<category><![CDATA[NIgeria]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[online gaming]]></category>
		<category><![CDATA[online orders]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[online shopping]]></category>
		<category><![CDATA[OTP codes]]></category>
		<category><![CDATA[password change]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[password reset]]></category>
		<category><![CDATA[password theft]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[phishing risk]]></category>
		<category><![CDATA[phishing risks]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[phone numbers]]></category>
		<category><![CDATA[pig butchering scam]]></category>
		<category><![CDATA[platform security]]></category>
		<category><![CDATA[platform vulnerability]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[professionalized hacking]]></category>
		<category><![CDATA[profit dashboard]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware-as-a-service]]></category>
		<category><![CDATA[remote access]]></category>
		<category><![CDATA[retail cybersecurity]]></category>
		<category><![CDATA[scam brokers]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Steam]]></category>
		<category><![CDATA[stolen identities]]></category>
		<category><![CDATA[subpoena access]]></category>
		<category><![CDATA[surveillance tools]]></category>
		<category><![CDATA[tech legislation]]></category>
		<category><![CDATA[Two-Factor Authentication]]></category>
		<category><![CDATA[U.S. infrastructure infiltration]]></category>
		<category><![CDATA[U.S. tech jobs]]></category>
		<category><![CDATA[UK retailers]]></category>
		<category><![CDATA[user accounts]]></category>
		<category><![CDATA[user privacy]]></category>
		<category><![CDATA[Valve]]></category>
		<category><![CDATA[victim grooming]]></category>
		<category><![CDATA[webcam avoidance]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31552</guid>

					<description><![CDATA[North Korean Hackers Infiltrate U.S. Tech Jobs with Fake Identities and Remote Access,
Steam Breach Exposes 89 Million Accounts in Dark Web Data Sale, 
Marks and Spencer Cyberattack Exposes Customer Data and Halts Online Orders (update from AoE #397)... this and more in AofE  #400<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access&amp;action_name=%23AxisOfEasy%20400%3A%20North%20Korean%20Hackers%20Infiltrate%20U.S.%20Tech%20Jobs%20With%20Fake%20Identities%20And%20Remote%20Access&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 371: Malicious Chrome Extensions Exploit Google’s New Security Model</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model/?pk_campaign=feed&#038;pk_kwd=axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model/?pk_campaign=feed&#038;pk_kwd=axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 11 Oct 2024 22:00:24 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI Evolution]]></category>
		<category><![CDATA[Algorithm Addiction]]></category>
		<category><![CDATA[archival site]]></category>
		<category><![CDATA[bcrypt]]></category>
		<category><![CDATA[BlackMeta]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[Brewster Kahle]]></category>
		<category><![CDATA[Browser Extensions]]></category>
		<category><![CDATA[Cheat Scripts]]></category>
		<category><![CDATA[Child Exploitation]]></category>
		<category><![CDATA[Customer Data Breach]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[DDoS attack]]></category>
		<category><![CDATA[Digital Safety]]></category>
		<category><![CDATA[email addresses]]></category>
		<category><![CDATA[Endpoint Security]]></category>
		<category><![CDATA[Gamers]]></category>
		<category><![CDATA[Geoffrey Hinton]]></category>
		<category><![CDATA[Google Manifest V3]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hacktivist group]]></category>
		<category><![CDATA[hashed passwords]]></category>
		<category><![CDATA[Have I Been Pwned]]></category>
		<category><![CDATA[Infostealers]]></category>
		<category><![CDATA[Internet Archive]]></category>
		<category><![CDATA[JavaScript alert]]></category>
		<category><![CDATA[Lua Scripts]]></category>
		<category><![CDATA[Malicious Chrome Extensions]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mental Health Risks]]></category>
		<category><![CDATA[MoneyGram]]></category>
		<category><![CDATA[Nobel Prize]]></category>
		<category><![CDATA[password managers]]></category>
		<category><![CDATA[Phishing Sites]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Security Model]]></category>
		<category><![CDATA[sensitive data]]></category>
		<category><![CDATA[SquareX]]></category>
		<category><![CDATA[stolen database]]></category>
		<category><![CDATA[systems scrubbing]]></category>
		<category><![CDATA[Tech Regulation]]></category>
		<category><![CDATA[TikTok Lawsuit]]></category>
		<category><![CDATA[user concerns]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=30459</guid>

					<description><![CDATA[Malicious Chrome Extensions Exploit Google’s New Security Model,
Gamers Targeted by Fake Cheat Scripts Spreading Malware,
States Sue TikTok Over Alleged Child Exploitation and Mental Health Risks ... this and more in AofE  #371<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model&amp;action_name=%23AxisOfEasy%20371%3A%20Malicious%20Chrome%20Extensions%20Exploit%20Google%E2%80%99s%20New%20Security%20Model&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model/?pk_campaign=feed&#038;pk_kwd=axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 288: The Danger Of Weaponizing Disinformation: The Controversial Actions Of The Global Disinformation Index</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-288-the-danger-of-weaponizing-disinformation-the-controversial-actions-of-the-global-disinformation-index/?pk_campaign=feed&#038;pk_kwd=axisofeasy-288-the-danger-of-weaponizing-disinformation-the-controversial-actions-of-the-global-disinformation-index&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-288-the-danger-of-weaponizing-disinformation-the-controversial-actions-of-the-global-disinformation-index</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-288-the-danger-of-weaponizing-disinformation-the-controversial-actions-of-the-global-disinformation-index/?pk_campaign=feed&#038;pk_kwd=axisofeasy-288-the-danger-of-weaponizing-disinformation-the-controversial-actions-of-the-global-disinformation-index#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 07 Mar 2023 23:00:12 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Alex Leslie]]></category>
		<category><![CDATA[Amiga]]></category>
		<category><![CDATA[API]]></category>
		<category><![CDATA[CIS]]></category>
		<category><![CDATA[Coinbase]]></category>
		<category><![CDATA[Commodore]]></category>
		<category><![CDATA[CSIRT]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[DHL]]></category>
		<category><![CDATA[Disinformation Governance Board]]></category>
		<category><![CDATA[Edgio]]></category>
		<category><![CDATA[GDI]]></category>
		<category><![CDATA[Javvad Malik]]></category>
		<category><![CDATA[Jonathan Turley]]></category>
		<category><![CDATA[Kitsune]]></category>
		<category><![CDATA[KnowBe4]]></category>
		<category><![CDATA[Mailchimp]]></category>
		<category><![CDATA[Mailgun]]></category>
		<category><![CDATA[Mark Sokolovsky]]></category>
		<category><![CDATA[MetaMask]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[MiniMig]]></category>
		<category><![CDATA[Namecheap]]></category>
		<category><![CDATA[National Endowment for Democracy]]></category>
		<category><![CDATA[NED]]></category>
		<category><![CDATA[PlugX]]></category>
		<category><![CDATA[Raccoon Stealer]]></category>
		<category><![CDATA[RambleOn]]></category>
		<category><![CDATA[Recorded Future]]></category>
		<category><![CDATA[ReverseRAT]]></category>
		<category><![CDATA[Richard Kirkendall]]></category>
		<category><![CDATA[Sendgrid]]></category>
		<category><![CDATA[SideCopy]]></category>
		<category><![CDATA[Twilio]]></category>
		<category><![CDATA[WhiskerSpy]]></category>
		<category><![CDATA[Xandr]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=27373</guid>

					<description><![CDATA[The Danger of Weaponizing Disinformation: The controversial actions of the global disinformation index,
The Effect of the Ukraine War on Cyberspace and Cyber Crime, 
Concerns over US federal funding for the compilation of the Global Disinformation Index ...  this and more in AofE  #288<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-288-the-danger-of-weaponizing-disinformation-the-controversial-actions-of-the-global-disinformation-index%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-288-the-danger-of-weaponizing-disinformation-the-controversial-actions-of-the-global-disinformation-index&amp;action_name=%23AxisOfEasy%20288%3A%20The%20Danger%20Of%20Weaponizing%20Disinformation%3A%20The%20Controversial%20Actions%20Of%20The%20Global%20Disinformation%20Index&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-288-the-danger-of-weaponizing-disinformation-the-controversial-actions-of-the-global-disinformation-index/?pk_campaign=feed&#038;pk_kwd=axisofeasy-288-the-danger-of-weaponizing-disinformation-the-controversial-actions-of-the-global-disinformation-index/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 141: Here comes dark_nexus: possibly the most potent IoT botnet ever</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-141-here-comes-dark_nexus-possibly-the-most-potent-iot-botnet-ever/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-141-here-comes-dark_nexus-possibly-the-most-potent-iot-botnet-ever</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-141-here-comes-dark_nexus-possibly-the-most-potent-iot-botnet-ever/#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 14 Apr 2020 15:13:36 +0000</pubDate>
				<category><![CDATA[5G]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[dark_nexus]]></category>
		<category><![CDATA[Fold@home]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[mobile tracking]]></category>
		<category><![CDATA[Thryve]]></category>
		<category><![CDATA[Vincent R. Locascio]]></category>
		<category><![CDATA[Zoom]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=21126</guid>

					<description><![CDATA[Hacked videoconference logins being sold on the Dark Web Apple and Google teaming up for Coronavirus contact tracing Eurozone Coronavirus surveillance efforts use mobile apps to track spread YouTube to quash Coronavirus / 5G content as rioters burn cell towers The car crash known as Zoom continues to impress We totally messed up last week’s [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-141-here-comes-dark_nexus-possibly-the-most-potent-iot-botnet-ever%2F&amp;action_name=%23AxisOfEasy%20141%3A%20Here%20comes%20dark_nexus%3A%20possibly%20the%20most%20potent%20IoT%20botnet%20ever&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-141-here-comes-dark_nexus-possibly-the-most-potent-iot-botnet-ever/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 141: Here Comes Dark_Nexus: Possibly The Most Potent IoT Botnet Ever</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-141-here-comes-dark_nexus-possibly-the-most-potent-iot-botnet-ever/?pk_campaign=feed&#038;pk_kwd=axisofeasy-141-here-comes-dark_nexus-possibly-the-most-potent-iot-botnet-ever&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-141-here-comes-dark_nexus-possibly-the-most-potent-iot-botnet-ever</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-141-here-comes-dark_nexus-possibly-the-most-potent-iot-botnet-ever/?pk_campaign=feed&#038;pk_kwd=axisofeasy-141-here-comes-dark_nexus-possibly-the-most-potent-iot-botnet-ever#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Mon, 13 Apr 2020 13:00:46 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[dark_nexus]]></category>
		<category><![CDATA[Fold@home]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[mobile tracking]]></category>
		<category><![CDATA[Thryve]]></category>
		<category><![CDATA[Vincent R. Locascio]]></category>
		<category><![CDATA[Zoom]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=21114</guid>

					<description><![CDATA[Hacked video conference logins being sold on the Dark Web
Apple and Google teaming up for Coronavirus contact tracing
Eurozone Coronavirus surveillance efforts use mobile apps to track spread
<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-141-here-comes-dark_nexus-possibly-the-most-potent-iot-botnet-ever%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-141-here-comes-dark_nexus-possibly-the-most-potent-iot-botnet-ever&amp;action_name=%23AxisOfEasy%20141%3A%20Here%20Comes%20Dark_Nexus%3A%20Possibly%20The%20Most%20Potent%20IoT%20Botnet%20Ever&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-141-here-comes-dark_nexus-possibly-the-most-potent-iot-botnet-ever/?pk_campaign=feed&#038;pk_kwd=axisofeasy-141-here-comes-dark_nexus-possibly-the-most-potent-iot-botnet-ever/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Future Tools: Tor and the Dark Web</title>
		<link>https://axisofeasy.com/metaviews/future-tools-tor-and-the-dark-web/?pk_campaign=feed&#038;pk_kwd=future-tools-tor-and-the-dark-web&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=future-tools-tor-and-the-dark-web</link>
					<comments>https://axisofeasy.com/metaviews/future-tools-tor-and-the-dark-web/?pk_campaign=feed&#038;pk_kwd=future-tools-tor-and-the-dark-web#comments</comments>
		
		<dc:creator><![CDATA[Jesse Hirsh]]></dc:creator>
		<pubDate>Fri, 29 Nov 2019 14:55:34 +0000</pubDate>
				<category><![CDATA[Metaviews]]></category>
		<category><![CDATA[anonymity]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[Future Tools]]></category>
		<category><![CDATA[Jesse Hirsh]]></category>
		<category><![CDATA[Tor]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://easydns.com/?p=19394</guid>

					<description><![CDATA[easyDNS is pleased to sponsor Jesse Hirsh‘s “Future Fibre / Future Tools” segments of his new email list, Metaviews. How to connect to the digital underground and why The Internet is an inherent surveillance system that attempts to track everything you do, hence the first step: login, meaning you’re now in the log. However from a technical [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fmetaviews%2Ffuture-tools-tor-and-the-dark-web%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Dfuture-tools-tor-and-the-dark-web&amp;action_name=Future%20Tools%3A%20Tor%20and%20the%20Dark%20Web&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/metaviews/future-tools-tor-and-the-dark-web/?pk_campaign=feed&#038;pk_kwd=future-tools-tor-and-the-dark-web/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
	</channel>
</rss>
