<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>digital rights</title>
	<atom:link href="https://axisofeasy.com/tag/digital-rights/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Sat, 18 Apr 2026 12:12:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>digital rights</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 446: Internet Content Regulation Is Coming To Canada</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-446-internet-content-regulation-is-coming-to-canada</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-446-internet-content-regulation-is-coming-to-canada/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 22:00:34 +0000</pubDate>
				<category><![CDATA[Bill C-11]]></category>
		<category><![CDATA[Bill C-63]]></category>
		<category><![CDATA[Bill C-9]]></category>
		<category><![CDATA[Canada censorship]]></category>
		<category><![CDATA[Canada censorship exposed]]></category>
		<category><![CDATA[Canada censorship law]]></category>
		<category><![CDATA[Canada free speech]]></category>
		<category><![CDATA[Canada internet censorship]]></category>
		<category><![CDATA[Canada internet control 2026]]></category>
		<category><![CDATA[Canadian content regulation]]></category>
		<category><![CDATA[content moderation]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[CRTC online content]]></category>
		<category><![CDATA[digital censorship]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[government internet control]]></category>
		<category><![CDATA[Internet freedom]]></category>
		<category><![CDATA[internet regulation Canada]]></category>
		<category><![CDATA[Mark Carney]]></category>
		<category><![CDATA[Mark Carney censorship]]></category>
		<category><![CDATA[online censorship]]></category>
		<category><![CDATA[online censorship Canada]]></category>
		<category><![CDATA[online harms act]]></category>
		<category><![CDATA[Trudeau censorship]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=33754</guid>

					<description><![CDATA[In this issue: Internet Content Regulation is Coming To Canada Court Orders OpenAI to Block User in ChatGPT Case Raising Free Speech Concerns Fake Claude “Pro” Site Spreads PlugX Malware via DLL Sideloading n8n Abuse Turns Workflow Automation Tool into Phishing and Malware Delivery Channel AI Agents in GitHub Actions Bypassed via Prompt Injection Fake [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-446-internet-content-regulation-is-coming-to-canada%2F&amp;action_name=%23AxisOfEasy%20446%3A%20Internet%20Content%20Regulation%20Is%20Coming%20To%20Canada&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-446-internet-content-regulation-is-coming-to-canada/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 441: Canada Allows TikTok To Continue Operations With New Safeguards</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 13 Mar 2026 22:00:29 +0000</pubDate>
				<category><![CDATA[AI agent]]></category>
		<category><![CDATA[Android Trojan]]></category>
		<category><![CDATA[Asus router botnet]]></category>
		<category><![CDATA[AWS data loss]]></category>
		<category><![CDATA[Canadian Tire breach]]></category>
		<category><![CDATA[Chrome vulnerability]]></category>
		<category><![CDATA[Cisco SD-WAN]]></category>
		<category><![CDATA[Claude AI]]></category>
		<category><![CDATA[CVE-2026-0628]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach Canada]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[encrypted messaging]]></category>
		<category><![CDATA[Gemini Security]]></category>
		<category><![CDATA[Mark Carney China]]></category>
		<category><![CDATA[privacy Canada]]></category>
		<category><![CDATA[Russian hackers]]></category>
		<category><![CDATA[Signal hacked]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Terraform destroy]]></category>
		<category><![CDATA[TikTok ban]]></category>
		<category><![CDATA[TikTok Canada]]></category>
		<category><![CDATA[WhatsApp security]]></category>
		<category><![CDATA[WordPress malware]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=33439</guid>

					<description><![CDATA[Canada banned TikTok over national security risks. Then Carney started courting Beijing. Now TikTok's back. Make it make sense.<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards%2F&amp;action_name=%23AxisOfEasy%20441%3A%20Canada%20Allows%20TikTok%20To%20Continue%20Operations%20With%20New%20Safeguards&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 429: Edmonton’s New Police Pilot Brings Facial Recognition Into Officers’ Line Of Sight</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 05 Dec 2025 23:00:05 +0000</pubDate>
				<category><![CDATA[10 shocking facts about digital privacy in 2025]]></category>
		<category><![CDATA[active surveillance]]></category>
		<category><![CDATA[ai privacy]]></category>
		<category><![CDATA[ajax video surveillance]]></category>
		<category><![CDATA[alberta police]]></category>
		<category><![CDATA[big tech privacy]]></category>
		<category><![CDATA[body cam]]></category>
		<category><![CDATA[body cam arrest]]></category>
		<category><![CDATA[body cam channel]]></category>
		<category><![CDATA[body cam edition]]></category>
		<category><![CDATA[body cam leak]]></category>
		<category><![CDATA[body cam watch]]></category>
		<category><![CDATA[body camera]]></category>
		<category><![CDATA[body camera footage]]></category>
		<category><![CDATA[bodycam]]></category>
		<category><![CDATA[bodycam files]]></category>
		<category><![CDATA[bodycam footage]]></category>
		<category><![CDATA[bodycam videos]]></category>
		<category><![CDATA[cam]]></category>
		<category><![CDATA[camera surveillance]]></category>
		<category><![CDATA[canada police]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[digital]]></category>
		<category><![CDATA[digital footprint]]></category>
		<category><![CDATA[digital privacy]]></category>
		<category><![CDATA[digital privacy 2020]]></category>
		<category><![CDATA[digital privacy and your personal data]]></category>
		<category><![CDATA[digital privacy documentary]]></category>
		<category><![CDATA[digital privacy education]]></category>
		<category><![CDATA[digital privacy rights]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[digital rights and privacy]]></category>
		<category><![CDATA[digital surveillance]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[dui bodycam]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[edmonton]]></category>
		<category><![CDATA[edmonton alberta]]></category>
		<category><![CDATA[edmonton city police]]></category>
		<category><![CDATA[edmonton crime]]></category>
		<category><![CDATA[edmonton journal]]></category>
		<category><![CDATA[edmonton news]]></category>
		<category><![CDATA[edmonton police]]></category>
		<category><![CDATA[edmonton police commission]]></category>
		<category><![CDATA[edmonton police death]]></category>
		<category><![CDATA[edmonton police officer shooting]]></category>
		<category><![CDATA[edmonton police service]]></category>
		<category><![CDATA[edmonton police shooting]]></category>
		<category><![CDATA[edmonton shooting]]></category>
		<category><![CDATA[eprivacy]]></category>
		<category><![CDATA[eu privacy]]></category>
		<category><![CDATA[ewu bodycam]]></category>
		<category><![CDATA[florida body cam]]></category>
		<category><![CDATA[gdpr privacy]]></category>
		<category><![CDATA[global news edmonton]]></category>
		<category><![CDATA[global surveillance]]></category>
		<category><![CDATA[health surveillance]]></category>
		<category><![CDATA[insanity bodycam]]></category>
		<category><![CDATA[Mass surveillance]]></category>
		<category><![CDATA[mess with surveillance]]></category>
		<category><![CDATA[new jersey police body cam arrest]]></category>
		<category><![CDATA[passive surveillance]]></category>
		<category><![CDATA[personal privacy]]></category>
		<category><![CDATA[physical surveillance unit]]></category>
		<category><![CDATA[police]]></category>
		<category><![CDATA[police body cam]]></category>
		<category><![CDATA[police body cam arrest]]></category>
		<category><![CDATA[police body cam arrests 2025]]></category>
		<category><![CDATA[police body cam footage arrest]]></category>
		<category><![CDATA[police body cam video]]></category>
		<category><![CDATA[police body camera videos]]></category>
		<category><![CDATA[police bodycam]]></category>
		<category><![CDATA[police bodycam dui]]></category>
		<category><![CDATA[police department]]></category>
		<category><![CDATA[police fail to identify]]></category>
		<category><![CDATA[police in edmonton]]></category>
		<category><![CDATA[police interactions]]></category>
		<category><![CDATA[police officer]]></category>
		<category><![CDATA[police officer shooting edmonton]]></category>
		<category><![CDATA[police service]]></category>
		<category><![CDATA[police shooting]]></category>
		<category><![CDATA[police training]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privacy in the digital age]]></category>
		<category><![CDATA[privacy laws]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[privacy tutorial]]></category>
		<category><![CDATA[public health surveillance.]]></category>
		<category><![CDATA[raspberry pi surveillance camera]]></category>
		<category><![CDATA[real body cam footage]]></category>
		<category><![CDATA[real police body cam footage]]></category>
		<category><![CDATA[retail surveillance]]></category>
		<category><![CDATA[runour surveillance]]></category>
		<category><![CDATA[social media privacy]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[surveillance cyberpunk]]></category>
		<category><![CDATA[surveillance pricing]]></category>
		<category><![CDATA[surveillance systems]]></category>
		<category><![CDATA[syndromic surveillance]]></category>
		<category><![CDATA[tech privacy]]></category>
		<category><![CDATA[types of surveillance]]></category>
		<category><![CDATA[under surveillance]]></category>
		<category><![CDATA[video surveillance]]></category>
		<category><![CDATA[what is digital privacy]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32799</guid>

					<description><![CDATA[Edmonton police roll out facial recognition technology for on duty officers - privacy advocates are concerned.<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight%2F&amp;action_name=%23AxisOfEasy%20429%3A%20Edmonton%E2%80%99s%20New%20Police%20Pilot%20Brings%20Facial%20Recognition%20Into%20Officers%E2%80%99%20Line%20Of%20Sight&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 425: Microsoft Teams Security Flaws Show How Easily Digital Trust Can Be Exploited</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/?pk_campaign=feed&#038;pk_kwd=axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/?pk_campaign=feed&#038;pk_kwd=axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 07 Nov 2025 23:00:46 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[ai browser]]></category>
		<category><![CDATA[ai companions]]></category>
		<category><![CDATA[AI governance]]></category>
		<category><![CDATA[ai threat surface]]></category>
		<category><![CDATA[antonio guterres]]></category>
		<category><![CDATA[california ai law]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[character.ai]]></category>
		<category><![CDATA[chatgpt atlas]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[cisa kev]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[code injection]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[csrf exploit]]></category>
		<category><![CDATA[cve-2025-24893]]></category>
		<category><![CDATA[cybercrime treaty]]></category>
		<category><![CDATA[cybersecurity tech accord]]></category>
		<category><![CDATA[daniel de freitas]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[dentsu merkle]]></category>
		<category><![CDATA[dia browser]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[discord tokens]]></category>
		<category><![CDATA[DoJ]]></category>
		<category><![CDATA[edge browser]]></category>
		<category><![CDATA[EFF]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[global cybersecurity]]></category>
		<category><![CDATA[human rights watch]]></category>
		<category><![CDATA[hydra communications]]></category>
		<category><![CDATA[indicators of compromise]]></category>
		<category><![CDATA[josh hawley]]></category>
		<category><![CDATA[L3Harris]]></category>
		<category><![CDATA[lawsuits]]></category>
		<category><![CDATA[layerx security]]></category>
		<category><![CDATA[legal risk]]></category>
		<category><![CDATA[mental health]]></category>
		<category><![CDATA[Microsoft Azure]]></category>
		<category><![CDATA[neuraltrust]]></category>
		<category><![CDATA[noam shazeer]]></category>
		<category><![CDATA[npm packages]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[payroll breach]]></category>
		<category><![CDATA[perplexit comet]]></category>
		<category><![CDATA[persistent memory]]></category>
		<category><![CDATA[peter williams]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[redtiger infostealer]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Richard Blumenthal]]></category>
		<category><![CDATA[russian buyer]]></category>
		<category><![CDATA[senate legislation]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[solr search vulnerability]]></category>
		<category><![CDATA[suicide prevention]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tata motors]]></category>
		<category><![CDATA[tcrond coinminer]]></category>
		<category><![CDATA[TechCrunch]]></category>
		<category><![CDATA[teen safety]]></category>
		<category><![CDATA[Trade Secrets]]></category>
		<category><![CDATA[united nations]]></category>
		<category><![CDATA[unodc]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[vulncheck]]></category>
		<category><![CDATA[xwiki]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32597</guid>

					<description><![CDATA[Microsoft Teams Security Flaws Show How Easily Digital Trust Can Be Exploited,
DHS Plans to Collect Biometrics from Immigrants and US Citizens Alike, 
Threat Actors Have Turned the OpenAI Assistants API Into a Stealthy Malware Control Channel .. this and more in AofE  #425<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited&amp;action_name=%23AxisOfEasy%20425%3A%20Microsoft%20Teams%20Security%20Flaws%20Show%20How%20Easily%20Digital%20Trust%20Can%20Be%20Exploited&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/?pk_campaign=feed&#038;pk_kwd=axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 424: ChatGPT Atlas Exploit Exposes Persistent Memory Vulnerability In AI Browsers</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 31 Oct 2025 22:00:51 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[ai browser]]></category>
		<category><![CDATA[ai companions]]></category>
		<category><![CDATA[AI governance]]></category>
		<category><![CDATA[ai threat surface]]></category>
		<category><![CDATA[antonio guterres]]></category>
		<category><![CDATA[california ai law]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[character.ai]]></category>
		<category><![CDATA[chatgpt atlas]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[cisa kev]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[code injection]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[csrf exploit]]></category>
		<category><![CDATA[cve-2025-24893]]></category>
		<category><![CDATA[cybercrime treaty]]></category>
		<category><![CDATA[cybersecurity tech accord]]></category>
		<category><![CDATA[daniel de freitas]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[dentsu merkle]]></category>
		<category><![CDATA[dia browser]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[discord tokens]]></category>
		<category><![CDATA[DoJ]]></category>
		<category><![CDATA[edge browser]]></category>
		<category><![CDATA[EFF]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[global cybersecurity]]></category>
		<category><![CDATA[human rights watch]]></category>
		<category><![CDATA[hydra communications]]></category>
		<category><![CDATA[indicators of compromise]]></category>
		<category><![CDATA[josh hawley]]></category>
		<category><![CDATA[L3Harris]]></category>
		<category><![CDATA[lawsuits]]></category>
		<category><![CDATA[layerx security]]></category>
		<category><![CDATA[legal risk]]></category>
		<category><![CDATA[mental health]]></category>
		<category><![CDATA[Microsoft Azure]]></category>
		<category><![CDATA[neuraltrust]]></category>
		<category><![CDATA[noam shazeer]]></category>
		<category><![CDATA[npm packages]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[payroll breach]]></category>
		<category><![CDATA[perplexit comet]]></category>
		<category><![CDATA[persistent memory]]></category>
		<category><![CDATA[peter williams]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[redtiger infostealer]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Richard Blumenthal]]></category>
		<category><![CDATA[russian buyer]]></category>
		<category><![CDATA[senate legislation]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[solr search vulnerability]]></category>
		<category><![CDATA[suicide prevention]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tata motors]]></category>
		<category><![CDATA[tcrond coinminer]]></category>
		<category><![CDATA[TechCrunch]]></category>
		<category><![CDATA[teen safety]]></category>
		<category><![CDATA[Trade Secrets]]></category>
		<category><![CDATA[united nations]]></category>
		<category><![CDATA[unodc]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[vulncheck]]></category>
		<category><![CDATA[xwiki]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32557</guid>

					<description><![CDATA[ChatGPT Atlas Exploit Exposes Persistent Memory Vulnerability in AI Browsers,
CharacterAI Restricts Teen Access Amid Legal and Regulatory Backlash Over AI Chat Risks,
XWiki Servers Under Active Attack Through Critical Solr Search Vulnerability... this and more in AofE  #424<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers&amp;action_name=%23AxisOfEasy%20424%3A%20ChatGPT%20Atlas%20Exploit%20Exposes%20Persistent%20Memory%20Vulnerability%20In%20AI%20Browsers&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 412: Spotify Enforces Age Checks As Digital ID Becomes Gatekeeper</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper/?pk_campaign=feed&#038;pk_kwd=axisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper/?pk_campaign=feed&#038;pk_kwd=axisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 08 Aug 2025 22:00:28 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI Ethics]]></category>
		<category><![CDATA[airline systems]]></category>
		<category><![CDATA[Archive.org]]></category>
		<category><![CDATA[ATM hack]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[biometric ID]]></category>
		<category><![CDATA[Block BEARD]]></category>
		<category><![CDATA[C2 channel]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[censorship legislation]]></category>
		<category><![CDATA[ch.at]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Chinese cybercrime]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[CLI tools]]></category>
		<category><![CDATA[container security]]></category>
		<category><![CDATA[credit card theft]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exposure]]></category>
		<category><![CDATA[DaVita]]></category>
		<category><![CDATA[digital forensics]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[digital surveillance]]></category>
		<category><![CDATA[DMCA]]></category>
		<category><![CDATA[DNS queries]]></category>
		<category><![CDATA[domain hack]]></category>
		<category><![CDATA[ECS]]></category>
		<category><![CDATA[email security]]></category>
		<category><![CDATA[flight delays]]></category>
		<category><![CDATA[GPT over DNS]]></category>
		<category><![CDATA[Grok]]></category>
		<category><![CDATA[healthcare breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Interlock]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[piracy]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[public conversations]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware warning]]></category>
		<category><![CDATA[Raspberry Pi]]></category>
		<category><![CDATA[Rootkit]]></category>
		<category><![CDATA[SEC filing]]></category>
		<category><![CDATA[smishing]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[Spotify]]></category>
		<category><![CDATA[SSLVPN]]></category>
		<category><![CDATA[tech outage]]></category>
		<category><![CDATA[TINYSHELL]]></category>
		<category><![CDATA[UK regulation]]></category>
		<category><![CDATA[UNC2891]]></category>
		<category><![CDATA[United Airlines]]></category>
		<category><![CDATA[Wayback Machine]]></category>
		<category><![CDATA[website blocking]]></category>
		<category><![CDATA[Yoti]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32005</guid>

					<description><![CDATA[ChatGPT Conversations Remain Public Despite OpenAI Cleanup Effort,
Raspberry Pi Attack Exposes ATM Network to Sophisticated Financial Hackers,
Spotify Enforces Age Checks as Digital ID Becomes Gatekeeper...this and more in AofE  #412<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper&amp;action_name=%23AxisOfEasy%20412%3A%20Spotify%20Enforces%20Age%20Checks%20As%20Digital%20ID%20Becomes%20Gatekeeper&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper/?pk_campaign=feed&#038;pk_kwd=axisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 409: Adoption Data Breach Exposes Sensitive Records From Texas Nonprofit</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 18 Jul 2025 22:00:04 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[access brokers]]></category>
		<category><![CDATA[Adoption]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AxisOfEasy]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[Black Basta]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[Bluesky]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[C2 infrastructure]]></category>
		<category><![CDATA[Chatbot]]></category>
		<category><![CDATA[child protection]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cloud misconfiguration]]></category>
		<category><![CDATA[CRM migration]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cypherpunk]]></category>
		<category><![CDATA[Cypherpunk movement]]></category>
		<category><![CDATA[Dark Reading]]></category>
		<category><![CDATA[data access]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data sovereignty]]></category>
		<category><![CDATA[data storage]]></category>
		<category><![CDATA[decentralization]]></category>
		<category><![CDATA[Decentralized systems]]></category>
		<category><![CDATA[deep learning]]></category>
		<category><![CDATA[Developing Countries]]></category>
		<category><![CDATA[Digital dystopia]]></category>
		<category><![CDATA[digital economy]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[digital resilience]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[documentation]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[ECC]]></category>
		<category><![CDATA[emerging markets]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Episource]]></category>
		<category><![CDATA[existential risk]]></category>
		<category><![CDATA[facial scanning]]></category>
		<category><![CDATA[financial innovation]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[GDDR6]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GPUhammer]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hardware security]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[HexEval]]></category>
		<category><![CDATA[in-memory execution]]></category>
		<category><![CDATA[internal tooling]]></category>
		<category><![CDATA[Internet freedom]]></category>
		<category><![CDATA[Irish DPC]]></category>
		<category><![CDATA[Kid Web Services]]></category>
		<category><![CDATA[leapfrogging]]></category>
		<category><![CDATA[LOLBin]]></category>
		<category><![CDATA[long-form content]]></category>
		<category><![CDATA[Louis Vuitton]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[malware-as-a-service]]></category>
		<category><![CDATA[Matanbuchus]]></category>
		<category><![CDATA[medical imaging]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Teams]]></category>
		<category><![CDATA[monetary fine]]></category>
		<category><![CDATA[monetary sovereignty]]></category>
		<category><![CDATA[nonprofit]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[NVidia]]></category>
		<category><![CDATA[online identity]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[patient data]]></category>
		<category><![CDATA[payload delivery]]></category>
		<category><![CDATA[payments infrastructure]]></category>
		<category><![CDATA[Peer-to-peer networks]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[retail]]></category>
		<category><![CDATA[reverse shell]]></category>
		<category><![CDATA[Rowhammer]]></category>
		<category><![CDATA[SMA 100]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[support automation]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tech philosophy]]></category>
		<category><![CDATA[technological foresight]]></category>
		<category><![CDATA[Texas]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[UK regulation]]></category>
		<category><![CDATA[Usenix]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Web3]]></category>
		<category><![CDATA[XORIndex]]></category>
		<category><![CDATA[zero-day]]></category>
		<category><![CDATA[Zero-Day Exploit]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31883</guid>

					<description><![CDATA[ Adoption Data Breach Exposes Sensitive Records from Texas Nonprofit,
Matanbuchus 3.0 Expands Stealth Tactics with Teams Lures and Advanced Loader Features,
Bluesky Implements UK Age Checks Amid Privacy Backlash Over Online Safety Law...this and more in AofE  #409<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&amp;action_name=%23AxisOfEasy%20409%3A%20Adoption%20Data%20Breach%20Exposes%20Sensitive%20Records%20From%20Texas%20Nonprofit&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 407: Brazil Holds Tech Platforms Liable For User Content In Landmark Ruling</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling/?pk_campaign=feed&#038;pk_kwd=axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling/?pk_campaign=feed&#038;pk_kwd=axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 04 Jul 2025 22:00:46 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Aeza Group]]></category>
		<category><![CDATA[airline breach]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[API vulnerability]]></category>
		<category><![CDATA[Blind Eagle]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[bulletproof hosting]]></category>
		<category><![CDATA[Call Center]]></category>
		<category><![CDATA[Catwatchful]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cold wallets]]></category>
		<category><![CDATA[content moderation]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[crypto theft]]></category>
		<category><![CDATA[CSV]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[digital surveillance]]></category>
		<category><![CDATA[G_mic]]></category>
		<category><![CDATA[geolocation data]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Firebase]]></category>
		<category><![CDATA[hate speech]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[identity verification]]></category>
		<category><![CDATA[JSON]]></category>
		<category><![CDATA[legal compliance]]></category>
		<category><![CDATA[Mailchimp]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Nim malware]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Omar Soca Charcov]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing attack]]></category>
		<category><![CDATA[platform liability]]></category>
		<category><![CDATA[political speech]]></category>
		<category><![CDATA[Proton66]]></category>
		<category><![CDATA[Qantas]]></category>
		<category><![CDATA[sanctions]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[seed phrase]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Stalkerware]]></category>
		<category><![CDATA[support system abuse]]></category>
		<category><![CDATA[Supreme Court]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[systemic failure]]></category>
		<category><![CDATA[T-Mobile]]></category>
		<category><![CDATA[third-party risk]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[Trezor]]></category>
		<category><![CDATA[Verizon]]></category>
		<category><![CDATA[Web3]]></category>
		<category><![CDATA[X]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31786</guid>

					<description><![CDATA[Brazil Holds Tech Platforms Liable for User Content in Landmark Ruling,
Catwatchful Breach Exposes Stalkerware Users, Victims, and Developer,
Verizon and T-Mobile Customer Data Breach Exposes 116 Million Records for Sale in 2025 Leak ...this and more in AofE  #407<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling&amp;action_name=%23AxisOfEasy%20407%3A%20Brazil%20Holds%20Tech%20Platforms%20Liable%20For%20User%20Content%20In%20Landmark%20Ruling&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling/?pk_campaign=feed&#038;pk_kwd=axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 405: Senate Bill Could Kill Private Messaging And Put Your Privacy At Risk</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 20 Jun 2025 22:00:22 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[algorithmic control]]></category>
		<category><![CDATA[Bill C-4]]></category>
		<category><![CDATA[CBDCs]]></category>
		<category><![CDATA[Child Exploitation]]></category>
		<category><![CDATA[Cloud Services]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[federal privacy law]]></category>
		<category><![CDATA[Google Threat Intelligence]]></category>
		<category><![CDATA[government regulation]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[legal liability]]></category>
		<category><![CDATA[Linux vulnerabilities]]></category>
		<category><![CDATA[messaging apps]]></category>
		<category><![CDATA[Metadata]]></category>
		<category><![CDATA[MFA bypass]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PIPEDA]]></category>
		<category><![CDATA[policy rollback]]></category>
		<category><![CDATA[political parties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[Section 230]]></category>
		<category><![CDATA[SMS spam]]></category>
		<category><![CDATA[social credit]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[STOP CSAM Act]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[WormGPT]]></category>
		<category><![CDATA[Zoomcar]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31714</guid>

					<description><![CDATA[Senate Bill Could Kill Private Messaging and Put Your Privacy at Risk,
Trump Just Gutted Major Cybersecurity Rules and Experts Are Sounding the Alarm,
Hackers Are Now Tricking IT Teams at Big Insurance Firms and Google Is Warning Everyone...this and more in AofE  #405<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk&amp;action_name=%23AxisOfEasy%20405%3A%20Senate%20Bill%20Could%20Kill%20Private%20Messaging%20And%20Put%20Your%20Privacy%20At%20Risk&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 400: North Korean Hackers Infiltrate U.S. Tech Jobs With Fake Identities And Remote Access</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 16 May 2025 22:00:57 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[account compromise]]></category>
		<category><![CDATA[Albania]]></category>
		<category><![CDATA[AnyDesk]]></category>
		<category><![CDATA[Baby Box Info]]></category>
		<category><![CDATA[Belgium]]></category>
		<category><![CDATA[birthdate]]></category>
		<category><![CDATA[breach detection]]></category>
		<category><![CDATA[breach monetization]]></category>
		<category><![CDATA[call centers]]></category>
		<category><![CDATA[Co-Op]]></category>
		<category><![CDATA[compromised credentials]]></category>
		<category><![CDATA[coordinated raids]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[Cubix Tech US]]></category>
		<category><![CDATA[Customer Data Breach]]></category>
		<category><![CDATA[cyber fraud]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybercrime ring]]></category>
		<category><![CDATA[cybercrime statistics]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity response]]></category>
		<category><![CDATA[Cyprus]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[decryption mandate]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[Digital Safety]]></category>
		<category><![CDATA[DOJ indictment]]></category>
		<category><![CDATA[DPRK]]></category>
		<category><![CDATA[DragonForce]]></category>
		<category><![CDATA[Dubai]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[electronic seizures]]></category>
		<category><![CDATA[electronics shipping]]></category>
		<category><![CDATA[encryption backdoor]]></category>
		<category><![CDATA[encryption debate]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[English-Korean]]></category>
		<category><![CDATA[Eurojust]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[fake identities]]></category>
		<category><![CDATA[fake investment schemes]]></category>
		<category><![CDATA[fake resumes]]></category>
		<category><![CDATA[FBI report]]></category>
		<category><![CDATA[financial fraud]]></category>
		<category><![CDATA[Flashpoint]]></category>
		<category><![CDATA[Florida bill]]></category>
		<category><![CDATA[fraud prosecution]]></category>
		<category><![CDATA[fraudulent employment]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Google Translate]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Harrods]]></category>
		<category><![CDATA[Helix US]]></category>
		<category><![CDATA[home address]]></category>
		<category><![CDATA[HR verification scripts]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[incident disclosure]]></category>
		<category><![CDATA[infostealer logs]]></category>
		<category><![CDATA[internal hierarchy]]></category>
		<category><![CDATA[international operation]]></category>
		<category><![CDATA[investment fraud]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[job references]]></category>
		<category><![CDATA[jsilver617]]></category>
		<category><![CDATA[judicial oversight]]></category>
		<category><![CDATA[Lahore Pakistan]]></category>
		<category><![CDATA[Latvia]]></category>
		<category><![CDATA[law enforcement access]]></category>
		<category><![CDATA[legislative overreach]]></category>
		<category><![CDATA[London Stock Exchange update]]></category>
		<category><![CDATA[M&S]]></category>
		<category><![CDATA[Marks and Spencer]]></category>
		<category><![CDATA[minors online safety]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[Nickel Tapestry]]></category>
		<category><![CDATA[NIgeria]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[online gaming]]></category>
		<category><![CDATA[online orders]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[online shopping]]></category>
		<category><![CDATA[OTP codes]]></category>
		<category><![CDATA[password change]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[password reset]]></category>
		<category><![CDATA[password theft]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[phishing risk]]></category>
		<category><![CDATA[phishing risks]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[phone numbers]]></category>
		<category><![CDATA[pig butchering scam]]></category>
		<category><![CDATA[platform security]]></category>
		<category><![CDATA[platform vulnerability]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[professionalized hacking]]></category>
		<category><![CDATA[profit dashboard]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware-as-a-service]]></category>
		<category><![CDATA[remote access]]></category>
		<category><![CDATA[retail cybersecurity]]></category>
		<category><![CDATA[scam brokers]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Steam]]></category>
		<category><![CDATA[stolen identities]]></category>
		<category><![CDATA[subpoena access]]></category>
		<category><![CDATA[surveillance tools]]></category>
		<category><![CDATA[tech legislation]]></category>
		<category><![CDATA[Two-Factor Authentication]]></category>
		<category><![CDATA[U.S. infrastructure infiltration]]></category>
		<category><![CDATA[U.S. tech jobs]]></category>
		<category><![CDATA[UK retailers]]></category>
		<category><![CDATA[user accounts]]></category>
		<category><![CDATA[user privacy]]></category>
		<category><![CDATA[Valve]]></category>
		<category><![CDATA[victim grooming]]></category>
		<category><![CDATA[webcam avoidance]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31552</guid>

					<description><![CDATA[North Korean Hackers Infiltrate U.S. Tech Jobs with Fake Identities and Remote Access,
Steam Breach Exposes 89 Million Accounts in Dark Web Data Sale, 
Marks and Spencer Cyberattack Exposes Customer Data and Halts Online Orders (update from AoE #397)... this and more in AofE  #400<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access&amp;action_name=%23AxisOfEasy%20400%3A%20North%20Korean%20Hackers%20Infiltrate%20U.S.%20Tech%20Jobs%20With%20Fake%20Identities%20And%20Remote%20Access&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
