<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Theft</title>
	<atom:link href="https://axisofeasy.com/tag/data-theft/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 10 Oct 2025 20:52:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>Data Theft</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 421: Is Your Data Safe After the Discord Hack?</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-421-is-your-data-safe-after-the-discord-hack/?pk_campaign=feed&#038;pk_kwd=axisofeasy-421-is-your-data-safe-after-the-discord-hack&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-421-is-your-data-safe-after-the-discord-hack</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-421-is-your-data-safe-after-the-discord-hack/?pk_campaign=feed&#038;pk_kwd=axisofeasy-421-is-your-data-safe-after-the-discord-hack#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 10 Oct 2025 22:00:49 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[52 Division]]></category>
		<category><![CDATA[Aadhaar]]></category>
		<category><![CDATA[age appeal process]]></category>
		<category><![CDATA[airport outage]]></category>
		<category><![CDATA[ANTSWORD]]></category>
		<category><![CDATA[Asahi Group]]></category>
		<category><![CDATA[Billy Bishop]]></category>
		<category><![CDATA[biometric authentication]]></category>
		<category><![CDATA[border control]]></category>
		<category><![CDATA[C2 server]]></category>
		<category><![CDATA[CAFC]]></category>
		<category><![CDATA[caller ID spoofing]]></category>
		<category><![CDATA[CBSA]]></category>
		<category><![CDATA[Chinese hackers]]></category>
		<category><![CDATA[Clop hackers]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cryptocurrency scam]]></category>
		<category><![CDATA[customer support]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cyber Risk]]></category>
		<category><![CDATA[cyberattack denial]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[digital fraud]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[Discord]]></category>
		<category><![CDATA[DNS failure]]></category>
		<category><![CDATA[Doug Ford]]></category>
		<category><![CDATA[EU surveillance law]]></category>
		<category><![CDATA[extortion]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[fake investment]]></category>
		<category><![CDATA[fee scam]]></category>
		<category><![CDATA[fingerprints]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[German government]]></category>
		<category><![CDATA[Gh0st RAT]]></category>
		<category><![CDATA[Global Fintech Festival]]></category>
		<category><![CDATA[GoAnywhere MFT vulnerability]]></category>
		<category><![CDATA[government ID images]]></category>
		<category><![CDATA[Guelph]]></category>
		<category><![CDATA[Guelph Police]]></category>
		<category><![CDATA[Hong Kong]]></category>
		<category><![CDATA[Huntress]]></category>
		<category><![CDATA[impersonation]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[investor awareness]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[kiosk failure]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[law enforcement impersonation]]></category>
		<category><![CDATA[malware campaign]]></category>
		<category><![CDATA[Medusa Ransomware]]></category>
		<category><![CDATA[Microsoft Defender]]></category>
		<category><![CDATA[Microsoft exploitation]]></category>
		<category><![CDATA[misdirection]]></category>
		<category><![CDATA[Nezha]]></category>
		<category><![CDATA[NPCI]]></category>
		<category><![CDATA[online identity verification]]></category>
		<category><![CDATA[Oracle EBS zero-day]]></category>
		<category><![CDATA[payments]]></category>
		<category><![CDATA[phone spoofing]]></category>
		<category><![CDATA[phpMyAdmin]]></category>
		<category><![CDATA[PowerShell]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Concerns]]></category>
		<category><![CDATA[Qilin ransomware]]></category>
		<category><![CDATA[regulatory framework]]></category>
		<category><![CDATA[Renault]]></category>
		<category><![CDATA[Reserve Bank of India]]></category>
		<category><![CDATA[scam detection]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[social media fraud]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[technical maintenance]]></category>
		<category><![CDATA[third-party vendor]]></category>
		<category><![CDATA[Toronto Pearson]]></category>
		<category><![CDATA[Toronto Police Services]]></category>
		<category><![CDATA[travel disruption]]></category>
		<category><![CDATA[Trust & Safety]]></category>
		<category><![CDATA[UPI]]></category>
		<category><![CDATA[vehicle data theft]]></category>
		<category><![CDATA[VOIP]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32423</guid>

					<description><![CDATA[Vendor Breach Exposes Discord Support Data and ID Images,
India Turns Every Face and Finger into a Payment Key,
Airport Outage Sparks Delays as CBSA Rules Out Cyberattack... this and more in AofE  #421<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-421-is-your-data-safe-after-the-discord-hack%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-421-is-your-data-safe-after-the-discord-hack&amp;action_name=%23AxisOfEasy%20421%3A%20Is%20Your%20Data%20Safe%20After%20the%20Discord%20Hack%3F&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-421-is-your-data-safe-after-the-discord-hack/?pk_campaign=feed&#038;pk_kwd=axisofeasy-421-is-your-data-safe-after-the-discord-hack/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 418: DHS Misconfiguration Exposes Surveillance Data To Thousands Of Unauthorized Users</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/?pk_campaign=feed&#038;pk_kwd=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/?pk_campaign=feed&#038;pk_kwd=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 22:00:26 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Acronis TikTok]]></category>
		<category><![CDATA[AI-generated images]]></category>
		<category><![CDATA[AI-powered scripts]]></category>
		<category><![CDATA[Alexander McQueen]]></category>
		<category><![CDATA[algorithm control]]></category>
		<category><![CDATA[American First Finance]]></category>
		<category><![CDATA[Andreessen Horowitz]]></category>
		<category><![CDATA[anomaly detection]]></category>
		<category><![CDATA[antivirus evasion TA558]]></category>
		<category><![CDATA[Balenciaga]]></category>
		<category><![CDATA[bitcoin ransom]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[browsers]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[Cartier]]></category>
		<category><![CDATA[chalk]]></category>
		<category><![CDATA[Chinese hacking]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[ClickFix]]></category>
		<category><![CDATA[cloud apps]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[credentials theft]]></category>
		<category><![CDATA[crypto hijacking]]></category>
		<category><![CDATA[Crypto Wallets]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[customer impact]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exposure]]></category>
		<category><![CDATA[data sovereignty]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[debug]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[disruption]]></category>
		<category><![CDATA[divestment deadline]]></category>
		<category><![CDATA[duckdb]]></category>
		<category><![CDATA[ecosystem fragility FileFix]]></category>
		<category><![CDATA[email compromise Raven Stealer]]></category>
		<category><![CDATA[email leaks]]></category>
		<category><![CDATA[export controls]]></category>
		<category><![CDATA[Facebook phishing]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[FOIA]]></category>
		<category><![CDATA[foreign cyber operations]]></category>
		<category><![CDATA[fusion centers]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[General Atlantic]]></category>
		<category><![CDATA[Gucci]]></category>
		<category><![CDATA[hardware keys]]></category>
		<category><![CDATA[high-end cyberattacks]]></category>
		<category><![CDATA[Homeland Security]]></category>
		<category><![CDATA[hospitality sector TA415]]></category>
		<category><![CDATA[hotels]]></category>
		<category><![CDATA[HSIN-Intel]]></category>
		<category><![CDATA[impersonation]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[javascript]]></category>
		<category><![CDATA[KKR]]></category>
		<category><![CDATA[lawmaker phishing FinWise Bank]]></category>
		<category><![CDATA[Lazarus Group]]></category>
		<category><![CDATA[legislation Kering]]></category>
		<category><![CDATA[local law enforcement]]></category>
		<category><![CDATA[Louis Vuitton]]></category>
		<category><![CDATA[luxury brands]]></category>
		<category><![CDATA[malicious packages]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Maven Central]]></category>
		<category><![CDATA[messaging platforms]]></category>
		<category><![CDATA[misconfiguration]]></category>
		<category><![CDATA[mr. d0x]]></category>
		<category><![CDATA[multi-language]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[NCTC]]></category>
		<category><![CDATA[npm support impersonation]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[Oracle]]></category>
		<category><![CDATA[oversight]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[payment data]]></category>
		<category><![CDATA[personally identifiable information]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing campaign]]></category>
		<category><![CDATA[phishing-as-a-service]]></category>
		<category><![CDATA[policy debate Microsoft]]></category>
		<category><![CDATA[PowerShell injection]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Protecting Americans from Foreign Adversary Controlled Applications Act]]></category>
		<category><![CDATA[protest surveillance]]></category>
		<category><![CDATA[PyPI]]></category>
		<category><![CDATA[RaccoonO365]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[recommendation system]]></category>
		<category><![CDATA[registries]]></category>
		<category><![CDATA[RubyGems]]></category>
		<category><![CDATA[Salesforce credentials]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[secondary scams]]></category>
		<category><![CDATA[Shiny Hunters]]></category>
		<category><![CDATA[Silver Lake]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Spain]]></category>
		<category><![CDATA[StealC infostealer]]></category>
		<category><![CDATA[steganography]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Susquehanna]]></category>
		<category><![CDATA[Telegram]]></category>
		<category><![CDATA[thousands of organizations]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[two-factor authentication npm]]></category>
		<category><![CDATA[U.S. consortium]]></category>
		<category><![CDATA[U.S. organizations]]></category>
		<category><![CDATA[U.S. ownership]]></category>
		<category><![CDATA[U.S.-China relations]]></category>
		<category><![CDATA[UK NCSC]]></category>
		<category><![CDATA[unauthorized access]]></category>
		<category><![CDATA[UNC6040]]></category>
		<category><![CDATA[VPNs]]></category>
		<category><![CDATA[VS Code backdoor]]></category>
		<category><![CDATA[Windows Explorer exploit]]></category>
		<category><![CDATA[zero-day response]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32305</guid>

					<description><![CDATA[DHS Misconfiguration Exposes Surveillance Data to Thousands of Unauthorized Users,
Kering Suffers Data Breach Targeting Luxury Shoppers Amid Surge in High-End Cyberattacks,
Phishing Breach Exposes Fragility of the JavaScript Ecosystem...this and more in AofE  #418<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users&amp;action_name=%23AxisOfEasy%20418%3A%20DHS%20Misconfiguration%20Exposes%20Surveillance%20Data%20To%20Thousands%20Of%20Unauthorized%20Users&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/?pk_campaign=feed&#038;pk_kwd=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 416: Judge Imposes Limits On Google Deals After Monopoly Ruling But Avoids Breakup</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup/?pk_campaign=feed&#038;pk_kwd=axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup/?pk_campaign=feed&#038;pk_kwd=axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 05 Sep 2025 22:00:22 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[ad-tech]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[antitrust]]></category>
		<category><![CDATA[AnyDesk]]></category>
		<category><![CDATA[API integrations]]></category>
		<category><![CDATA[appeal]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[APT group]]></category>
		<category><![CDATA[Authenticode]]></category>
		<category><![CDATA[AzCopy]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[AzureHound]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[behavioral remedies]]></category>
		<category><![CDATA[Check Point Research]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[CISOs]]></category>
		<category><![CDATA[ClickFix]]></category>
		<category><![CDATA[cloud-native attack]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[Coalition]]></category>
		<category><![CDATA[credential scanning]]></category>
		<category><![CDATA[CRM]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[default settings]]></category>
		<category><![CDATA[Digital Markets Act]]></category>
		<category><![CDATA[diplomats]]></category>
		<category><![CDATA[divestiture]]></category>
		<category><![CDATA[DoJ]]></category>
		<category><![CDATA[domain generation algorithm]]></category>
		<category><![CDATA[Drift]]></category>
		<category><![CDATA[embassy emails]]></category>
		<category><![CDATA[Entra Connect]]></category>
		<category><![CDATA[Entra ID]]></category>
		<category><![CDATA[Ethereum]]></category>
		<category><![CDATA[exclusivity deals]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[extortion]]></category>
		<category><![CDATA[fake firmware]]></category>
		<category><![CDATA[Gemini]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[hateful content]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[IoT botnet]]></category>
		<category><![CDATA[Iranian hackers]]></category>
		<category><![CDATA[Judge Amit Mehta]]></category>
		<category><![CDATA[Judge Leonie Brinkema]]></category>
		<category><![CDATA[LOLDrivers]]></category>
		<category><![CDATA[malicious npm]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mandiant]]></category>
		<category><![CDATA[MetaStealer]]></category>
		<category><![CDATA[MFA bypass]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Teams]]></category>
		<category><![CDATA[monopoly]]></category>
		<category><![CDATA[NVR exploits]]></category>
		<category><![CDATA[OAuth Tokens]]></category>
		<category><![CDATA[Palo Alto Networks]]></category>
		<category><![CDATA[Pedro Umbelino]]></category>
		<category><![CDATA[persistence]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RapperBot]]></category>
		<category><![CDATA[refresh tokens]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salesloft]]></category>
		<category><![CDATA[search]]></category>
		<category><![CDATA[Shop App]]></category>
		<category><![CDATA[Shopify]]></category>
		<category><![CDATA[Silver Fox]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Storm-0501]]></category>
		<category><![CDATA[technical committee]]></category>
		<category><![CDATA[txt records]]></category>
		<category><![CDATA[UNC6395]]></category>
		<category><![CDATA[ValleyRAT]]></category>
		<category><![CDATA[volumetric attack]]></category>
		<category><![CDATA[vulnerable drivers]]></category>
		<category><![CDATA[WatchDog]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[Winos]]></category>
		<category><![CDATA[Zemana]]></category>
		<category><![CDATA[Zero-click]]></category>
		<category><![CDATA[Zscaler]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32195</guid>

					<description><![CDATA[Judge Imposes Limits on Google Deals After Monopoly Ruling but Avoids Breakup,
Salesloft Drift Breach Exposes Salesforce Data at Zscaler, Palo Alto Networks, and Hundreds More,
APT Group Exploits Microsoft Trust to Deploy Stealthy Malware...this and more in AofE  #416<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup&amp;action_name=%23AxisOfEasy%20416%3A%20Judge%20Imposes%20Limits%20On%20Google%20Deals%20After%20Monopoly%20Ruling%20But%20Avoids%20Breakup&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup/?pk_campaign=feed&#038;pk_kwd=axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 376: Hot Topic Data Breach: Millions Exposed, Hacker Demands Ransom Amid Retailer Silence</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence/?pk_campaign=feed&#038;pk_kwd=axisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence/?pk_campaign=feed&#038;pk_kwd=axisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 15 Nov 2024 23:00:55 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[analytics platform]]></category>
		<category><![CDATA[breach notification]]></category>
		<category><![CDATA[BreachForums]]></category>
		<category><![CDATA[cloud environment]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[compromised data]]></category>
		<category><![CDATA[credit card details]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[customer notification]]></category>
		<category><![CDATA[customer privacy]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data breach reporting]]></category>
		<category><![CDATA[data exposure]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Have I Been Pwned]]></category>
		<category><![CDATA[Hot Topic]]></category>
		<category><![CDATA[Hudson Rock]]></category>
		<category><![CDATA[infostealer malware]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[ransom demand]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[regulatory obligations]]></category>
		<category><![CDATA[retail]]></category>
		<category><![CDATA[retail security]]></category>
		<category><![CDATA[Satanic]]></category>
		<category><![CDATA[state attorneys general.]]></category>
		<category><![CDATA[stolen credentials]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=30592</guid>

					<description><![CDATA[ Hot Topic Data Breach: Millions Exposed, Hacker Demands Ransom Amid Retailer Silence,
Google’s Vertex AI Fixes Reveal Deep Vulnerabilities in Enterprise AI Security,
Iranian 'Dream Job' Attack Targets Aerospace with North Korean-Style Malware... this and more in AofE  #376<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence&amp;action_name=%23AxisOfEasy%20376%3A%20Hot%20Topic%20Data%20Breach%3A%20Millions%20Exposed%2C%20Hacker%20Demands%20Ransom%20Amid%20Retailer%20Silence&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence/?pk_campaign=feed&#038;pk_kwd=axisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 375: Canada&#8217;s Bill S-210 Sparks Concerns Over Digital ID Age Verification</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification/?pk_campaign=feed&#038;pk_kwd=axisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification/?pk_campaign=feed&#038;pk_kwd=axisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 08 Nov 2024 23:00:52 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[age verification industry]]></category>
		<category><![CDATA[AI transcription tool]]></category>
		<category><![CDATA[Alexander Moucka]]></category>
		<category><![CDATA[Apple security]]></category>
		<category><![CDATA[Beijing]]></category>
		<category><![CDATA[Bill S-210]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Canada cyber threat]]></category>
		<category><![CDATA[Chinese hackers]]></category>
		<category><![CDATA[Chrome vulnerability]]></category>
		<category><![CDATA[cyber breaches]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[derogatory information]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[digital ID]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[enforcement]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[explicit content]]></category>
		<category><![CDATA[Extreme Vetting]]></category>
		<category><![CDATA[Falun Gong]]></category>
		<category><![CDATA[fines]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[FreeBSD]]></category>
		<category><![CDATA[House of Commons]]></category>
		<category><![CDATA[immigrants]]></category>
		<category><![CDATA[Interlock ransomware]]></category>
		<category><![CDATA[Justice Department]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[non-compliance]]></category>
		<category><![CDATA[North Korean cyber threats]]></category>
		<category><![CDATA[Online Streaming Act]]></category>
		<category><![CDATA[platforms]]></category>
		<category><![CDATA[Play ransomware]]></category>
		<category><![CDATA[pornography act]]></category>
		<category><![CDATA[privacy advocates]]></category>
		<category><![CDATA[Privacy Concerns]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Russian hackers]]></category>
		<category><![CDATA[Russian malware]]></category>
		<category><![CDATA[Senate]]></category>
		<category><![CDATA[Senator Julie Miville-Dechêne]]></category>
		<category><![CDATA[sexually explicit]]></category>
		<category><![CDATA[Snowflake data breach]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[takedowns]]></category>
		<category><![CDATA[technological feasibility]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[TikTok ban]]></category>
		<category><![CDATA[Ukrainian recruits]]></category>
		<category><![CDATA[user privacy]]></category>
		<category><![CDATA[Uyghurs]]></category>
		<category><![CDATA[Visa Lifecycle Vetting]]></category>
		<category><![CDATA[young persons]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=30562</guid>

					<description><![CDATA[Canada's Bill S-210 Sparks Concerns Over Digital ID Age Verification,
EFF Lawsuit Reveals $100 Million Government Surveillance of Immigrants' Social Media,
Canada Faces Years of Cyber Breaches by Foreign Hackers ... this and more in AofE  #375<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification&amp;action_name=%23AxisOfEasy%20375%3A%20Canada%26%238217%3Bs%20Bill%20S-210%20Sparks%20Concerns%20Over%20Digital%20ID%20Age%20Verification&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification/?pk_campaign=feed&#038;pk_kwd=axisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 371: Malicious Chrome Extensions Exploit Google’s New Security Model</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model/?pk_campaign=feed&#038;pk_kwd=axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model/?pk_campaign=feed&#038;pk_kwd=axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 11 Oct 2024 22:00:24 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI Evolution]]></category>
		<category><![CDATA[Algorithm Addiction]]></category>
		<category><![CDATA[archival site]]></category>
		<category><![CDATA[bcrypt]]></category>
		<category><![CDATA[BlackMeta]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[Brewster Kahle]]></category>
		<category><![CDATA[Browser Extensions]]></category>
		<category><![CDATA[Cheat Scripts]]></category>
		<category><![CDATA[Child Exploitation]]></category>
		<category><![CDATA[Customer Data Breach]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[DDoS attack]]></category>
		<category><![CDATA[Digital Safety]]></category>
		<category><![CDATA[email addresses]]></category>
		<category><![CDATA[Endpoint Security]]></category>
		<category><![CDATA[Gamers]]></category>
		<category><![CDATA[Geoffrey Hinton]]></category>
		<category><![CDATA[Google Manifest V3]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hacktivist group]]></category>
		<category><![CDATA[hashed passwords]]></category>
		<category><![CDATA[Have I Been Pwned]]></category>
		<category><![CDATA[Infostealers]]></category>
		<category><![CDATA[Internet Archive]]></category>
		<category><![CDATA[JavaScript alert]]></category>
		<category><![CDATA[Lua Scripts]]></category>
		<category><![CDATA[Malicious Chrome Extensions]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mental Health Risks]]></category>
		<category><![CDATA[MoneyGram]]></category>
		<category><![CDATA[Nobel Prize]]></category>
		<category><![CDATA[password managers]]></category>
		<category><![CDATA[Phishing Sites]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Security Measures]]></category>
		<category><![CDATA[Security Model]]></category>
		<category><![CDATA[sensitive data]]></category>
		<category><![CDATA[SquareX]]></category>
		<category><![CDATA[stolen database]]></category>
		<category><![CDATA[systems scrubbing]]></category>
		<category><![CDATA[Tech Regulation]]></category>
		<category><![CDATA[TikTok Lawsuit]]></category>
		<category><![CDATA[user concerns]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=30459</guid>

					<description><![CDATA[Malicious Chrome Extensions Exploit Google’s New Security Model,
Gamers Targeted by Fake Cheat Scripts Spreading Malware,
States Sue TikTok Over Alleged Child Exploitation and Mental Health Risks ... this and more in AofE  #371<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model&amp;action_name=%23AxisOfEasy%20371%3A%20Malicious%20Chrome%20Extensions%20Exploit%20Google%E2%80%99s%20New%20Security%20Model&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model/?pk_campaign=feed&#038;pk_kwd=axisofeasy-371-malicious-chrome-extensions-exploit-googles-new-security-model/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
