<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Disinformation</title>
	<atom:link href="https://axisofeasy.com/tag/disinformation/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 17 Oct 2025 16:18:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>Disinformation</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 422: Why Treating AI As A Tool Is A Dangerous Illusion</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 17 Oct 2025 22:00:38 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[alignment]]></category>
		<category><![CDATA[Android flaw]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Astaroth Trojan]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Axis Of Easy]]></category>
		<category><![CDATA[Bill C-8]]></category>
		<category><![CDATA[BYOVD]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Claude Sonnet 4.5]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[credential dumping]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[Dufresne]]></category>
		<category><![CDATA[Earth Alux]]></category>
		<category><![CDATA[ECHOAC]]></category>
		<category><![CDATA[economic impact]]></category>
		<category><![CDATA[email rules]]></category>
		<category><![CDATA[emergent behavior]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ethical AI]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[existential risk]]></category>
		<category><![CDATA[Federal Reserve]]></category>
		<category><![CDATA[FIDO]]></category>
		<category><![CDATA[Gelsemium]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[Harvard University]]></category>
		<category><![CDATA[House of Commons]]></category>
		<category><![CDATA[HR systems]]></category>
		<category><![CDATA[initial access]]></category>
		<category><![CDATA[Italy]]></category>
		<category><![CDATA[Jack Clark]]></category>
		<category><![CDATA[Jewelbug]]></category>
		<category><![CDATA[Lucky Mouse]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[Mechanize]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Mimikatz]]></category>
		<category><![CDATA[misaligned optimization]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Oracle EBS]]></category>
		<category><![CDATA[Paragon]]></category>
		<category><![CDATA[passkeys]]></category>
		<category><![CDATA[Payroll Pirate]]></category>
		<category><![CDATA[persistence]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Pixnapping]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Commissioner]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reclaim The Net]]></category>
		<category><![CDATA[REF7707]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[reward hacking]]></category>
		<category><![CDATA[RMM]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[safety data]]></category>
		<category><![CDATA[ScreenConnect]]></category>
		<category><![CDATA[ShadowPad]]></category>
		<category><![CDATA[situational awareness]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Symantec]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[TechCrunch]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[The Hacker News]]></category>
		<category><![CDATA[threat actors]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[universities]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[warrantless access]]></category>
		<category><![CDATA[Workday]]></category>
		<category><![CDATA[Yandex Cloud]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32461</guid>

					<description><![CDATA[Why Treating AI as a Tool Is a Dangerous Illusion,
Chinese Espionage Group Expands Into Russia Through Jewelbug Cyber Campaign,
Cabinet Push for Secret Telecom Cutoffs Raises Privacy Concerns... this and more in AofE  #422<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion&amp;action_name=%23AxisOfEasy%20422%3A%20Why%20Treating%20AI%20As%20A%20Tool%20Is%20A%20Dangerous%20Illusion&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 413: Lenovo Webcams Turn Into Hacking Tools In Shocking New Discovery</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery/?pk_campaign=feed&#038;pk_kwd=axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery/?pk_campaign=feed&#038;pk_kwd=axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 15 Aug 2025 22:00:00 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[and concepts: Lenovo]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[aviation]]></category>
		<category><![CDATA[BadUSB]]></category>
		<category><![CDATA[BYOVD]]></category>
		<category><![CDATA[capturing the most important entities]]></category>
		<category><![CDATA[Charon ransomware]]></category>
		<category><![CDATA[Connex Credit Union]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data brokers]]></category>
		<category><![CDATA[DEF CON 33]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[DLL sideloading]]></category>
		<category><![CDATA[Donald Trump]]></category>
		<category><![CDATA[Earth Baxia]]></category>
		<category><![CDATA[Eclypsium]]></category>
		<category><![CDATA[EDR evasion]]></category>
		<category><![CDATA[Efimer trojan]]></category>
		<category><![CDATA[European Media Freedom Act]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[fake legal emails]]></category>
		<category><![CDATA[firmware]]></category>
		<category><![CDATA[hardware hacking]]></category>
		<category><![CDATA[Here’s the comma-separated tag cloud generated from your provided articles]]></category>
		<category><![CDATA[Interlock Group]]></category>
		<category><![CDATA[journalism]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Manpower]]></category>
		<category><![CDATA[media ownership]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[NodeSnake]]></category>
		<category><![CDATA[operational technology]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[press freedom]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[ransomware attack]]></category>
		<category><![CDATA[ransomware trends]]></category>
		<category><![CDATA[RCE vulnerability]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[sealed records]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[SigmaStar]]></category>
		<category><![CDATA[stolen data]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[topics]]></category>
		<category><![CDATA[torrents]]></category>
		<category><![CDATA[Ukraine war]]></category>
		<category><![CDATA[Ursula von der Leyen]]></category>
		<category><![CDATA[US federal courts]]></category>
		<category><![CDATA[Vladimir Putin]]></category>
		<category><![CDATA[webcams]]></category>
		<category><![CDATA[WinRAR vulnerability]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32052</guid>

					<description><![CDATA[Lenovo Webcams Turn into Hacking Tools in Shocking New Discovery,
EU Law Meant to Protect Press Gives Governments Power to Arrest Journalists,
Charon Ransomware Targets Middle East Aviation Using Advanced APT Tradecraft ...this and more in AofE  #413<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery&amp;action_name=%23AxisOfEasy%20413%3A%20Lenovo%20Webcams%20Turn%20Into%20Hacking%20Tools%20In%20Shocking%20New%20Discovery&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery/?pk_campaign=feed&#038;pk_kwd=axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 405: Senate Bill Could Kill Private Messaging And Put Your Privacy At Risk</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 20 Jun 2025 22:00:22 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[algorithmic control]]></category>
		<category><![CDATA[Bill C-4]]></category>
		<category><![CDATA[CBDCs]]></category>
		<category><![CDATA[Child Exploitation]]></category>
		<category><![CDATA[Cloud Services]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[federal privacy law]]></category>
		<category><![CDATA[Google Threat Intelligence]]></category>
		<category><![CDATA[government regulation]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[legal liability]]></category>
		<category><![CDATA[Linux vulnerabilities]]></category>
		<category><![CDATA[messaging apps]]></category>
		<category><![CDATA[Metadata]]></category>
		<category><![CDATA[MFA bypass]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PIPEDA]]></category>
		<category><![CDATA[policy rollback]]></category>
		<category><![CDATA[political parties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[Section 230]]></category>
		<category><![CDATA[SMS spam]]></category>
		<category><![CDATA[social credit]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[STOP CSAM Act]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[WormGPT]]></category>
		<category><![CDATA[Zoomcar]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31714</guid>

					<description><![CDATA[Senate Bill Could Kill Private Messaging and Put Your Privacy at Risk,
Trump Just Gutted Major Cybersecurity Rules and Experts Are Sounding the Alarm,
Hackers Are Now Tricking IT Teams at Big Insurance Firms and Google Is Warning Everyone...this and more in AofE  #405<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk&amp;action_name=%23AxisOfEasy%20405%3A%20Senate%20Bill%20Could%20Kill%20Private%20Messaging%20And%20Put%20Your%20Privacy%20At%20Risk&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 398: Texas Bill Could Jail People For Sharing Political Memes Without Disclaimers</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 02 May 2025 22:00:41 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[45th general election]]></category>
		<category><![CDATA[Activists]]></category>
		<category><![CDATA[altered media]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Belgium]]></category>
		<category><![CDATA[bill]]></category>
		<category><![CDATA[brand abuse]]></category>
		<category><![CDATA[CA/Browser Forum]]></category>
		<category><![CDATA[certificate lifespans]]></category>
		<category><![CDATA[certificate renewal]]></category>
		<category><![CDATA[certificate reuse]]></category>
		<category><![CDATA[Ciro Pellegrino]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[copyright enforcement]]></category>
		<category><![CDATA[court orders]]></category>
		<category><![CDATA[CRLs]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Dade Phelan]]></category>
		<category><![CDATA[DAZN]]></category>
		<category><![CDATA[digital expression]]></category>
		<category><![CDATA[disclaimers]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[DKIM Replay]]></category>
		<category><![CDATA[DMARC]]></category>
		<category><![CDATA[DNS compliance]]></category>
		<category><![CDATA[DNS error]]></category>
		<category><![CDATA[DNS filtering]]></category>
		<category><![CDATA[DNS neutrality]]></category>
		<category><![CDATA[DNS records]]></category>
		<category><![CDATA[DNS Resolvers]]></category>
		<category><![CDATA[DNSSEC]]></category>
		<category><![CDATA[domain blocking]]></category>
		<category><![CDATA[domain validation]]></category>
		<category><![CDATA[Drunk Dade]]></category>
		<category><![CDATA[DV certificates]]></category>
		<category><![CDATA[EasyDMARC]]></category>
		<category><![CDATA[election night]]></category>
		<category><![CDATA[election results]]></category>
		<category><![CDATA[Elections Canada]]></category>
		<category><![CDATA[email authentication]]></category>
		<category><![CDATA[email security]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[enforcement]]></category>
		<category><![CDATA[EV certificates]]></category>
		<category><![CDATA[Eva Vlaardingerbroek]]></category>
		<category><![CDATA[Fanpage]]></category>
		<category><![CDATA[federal election]]></category>
		<category><![CDATA[First Amendment]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[garbled pages]]></category>
		<category><![CDATA[generative AI]]></category>
		<category><![CDATA[Gerasim Hovhannisyan]]></category>
		<category><![CDATA[global warning]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Sites]]></category>
		<category><![CDATA[Google.com spoof]]></category>
		<category><![CDATA[government IT]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[grassroots speech]]></category>
		<category><![CDATA[House Bill 366]]></category>
		<category><![CDATA[human rights]]></category>
		<category><![CDATA[internet censorship]]></category>
		<category><![CDATA[internet infrastructure]]></category>
		<category><![CDATA[intimidation]]></category>
		<category><![CDATA[iOS threat detection]]></category>
		<category><![CDATA[iPhone alert]]></category>
		<category><![CDATA[IPTV]]></category>
		<category><![CDATA[ISP penalties]]></category>
		<category><![CDATA[jail]]></category>
		<category><![CDATA[Jellyfish SMTP]]></category>
		<category><![CDATA[Journalists]]></category>
		<category><![CDATA[legal concerns]]></category>
		<category><![CDATA[legal pressure]]></category>
		<category><![CDATA[legal subpoena scam]]></category>
		<category><![CDATA[memes]]></category>
		<category><![CDATA[mercenary spyware]]></category>
		<category><![CDATA[Michael Berry]]></category>
		<category><![CDATA[Microsoft Outlook]]></category>
		<category><![CDATA[misinformation]]></category>
		<category><![CDATA[OCSP]]></category>
		<category><![CDATA[online voting infrastructure]]></category>
		<category><![CDATA[opendns]]></category>
		<category><![CDATA[OV certificates]]></category>
		<category><![CDATA[parody]]></category>
		<category><![CDATA[personal security]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[piracy]]></category>
		<category><![CDATA[PKI]]></category>
		<category><![CDATA[political advertising]]></category>
		<category><![CDATA[political media]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PrivateEmail]]></category>
		<category><![CDATA[Pro League]]></category>
		<category><![CDATA[Quad9]]></category>
		<category><![CDATA[satire]]></category>
		<category><![CDATA[selective prosecution]]></category>
		<category><![CDATA[SMS attack]]></category>
		<category><![CDATA[speech regulation]]></category>
		<category><![CDATA[spf]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[State Affairs Committee]]></category>
		<category><![CDATA[streaming]]></category>
		<category><![CDATA[Subject Identity Information]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[targeted attacks]]></category>
		<category><![CDATA[technical failure]]></category>
		<category><![CDATA[Texas]]></category>
		<category><![CDATA[Texas Ethics Commission]]></category>
		<category><![CDATA[TLS]]></category>
		<category><![CDATA[trust exploitation]]></category>
		<category><![CDATA[unconstitutional]]></category>
		<category><![CDATA[voter access]]></category>
		<category><![CDATA[web security]]></category>
		<category><![CDATA[website crash]]></category>
		<category><![CDATA[website outage]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31482</guid>

					<description><![CDATA[Texas bill could jail people for sharing political memes without disclaimers,
Apple Warns Targets of Global Spyware Campaign Including Journalists and Activists,
Elections Canada Website Crashes on Election Night... this and more in AofE  #398<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers&amp;action_name=%23AxisOfEasy%20398%3A%20Texas%20Bill%20Could%20Jail%20People%20For%20Sharing%20Political%20Memes%20Without%20Disclaimers&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-398-texas-bill-could-jail-people-for-sharing-political-memes-without-disclaimers/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 389: What Did You Get Done Last Week?</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-389-what-did-you-get-done-last-week/?pk_campaign=feed&#038;pk_kwd=axisofeasy-389-what-did-you-get-done-last-week&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-389-what-did-you-get-done-last-week</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-389-what-did-you-get-done-last-week/?pk_campaign=feed&#038;pk_kwd=axisofeasy-389-what-did-you-get-done-last-week#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 28 Feb 2025 23:00:56 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[AI censorship]]></category>
		<category><![CDATA[AI governance]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Asana]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[bullet journaling]]></category>
		<category><![CDATA[bureaucracy]]></category>
		<category><![CDATA[busywork]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chrystia Freeland]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity threats]]></category>
		<category><![CDATA[daily wins]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[digital privacy]]></category>
		<category><![CDATA[digital trust]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[efficiency]]></category>
		<category><![CDATA[election interference]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[gaming]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[goal setting]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[index cards]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Journalists]]></category>
		<category><![CDATA[Justin Trudeau]]></category>
		<category><![CDATA[leadership]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[LockBit]]></category>
		<category><![CDATA[Mark Jeftovic]]></category>
		<category><![CDATA[Omnifocus]]></category>
		<category><![CDATA[OmniGPT]]></category>
		<category><![CDATA[online scams]]></category>
		<category><![CDATA[Paragon]]></category>
		<category><![CDATA[personal development]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PlayStation Network]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[productivity]]></category>
		<category><![CDATA[project management]]></category>
		<category><![CDATA[PSN outage]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RAT malware]]></category>
		<category><![CDATA[sanctions]]></category>
		<category><![CDATA[self-improvement]]></category>
		<category><![CDATA[self-reflection]]></category>
		<category><![CDATA[SITE]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Sony]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[task tracking]]></category>
		<category><![CDATA[technology risks]]></category>
		<category><![CDATA[threat landscape]]></category>
		<category><![CDATA[time management]]></category>
		<category><![CDATA[U.K. government]]></category>
		<category><![CDATA[work habits]]></category>
		<category><![CDATA[work-from-home scams]]></category>
		<category><![CDATA[Zservers]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31143</guid>

					<description><![CDATA[What Did You Get Done Last Week? (From the desk of Mark Jeftovic, easyDNS CEO),
AI-Powered Phishing Scams: How Cybercriminals Use Deepfakes and Stolen Credentials to Hijack Accounts,
Private GitHub Repos Still Accessible via Microsoft Copilot, Security Firm Warns ... this and more in AofE  #389<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-389-what-did-you-get-done-last-week%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-389-what-did-you-get-done-last-week&amp;action_name=%23AxisOfEasy%20389%3A%20What%20Did%20You%20Get%20Done%20Last%20Week%3F&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-389-what-did-you-get-done-last-week/?pk_campaign=feed&#038;pk_kwd=axisofeasy-389-what-did-you-get-done-last-week/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 373: Microsoft Admits Losing Weeks Of Security Logs For Cloud Products</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-373-microsoft-admits-losing-weeks-of-security-logs-for-cloud-products/?pk_campaign=feed&#038;pk_kwd=axisofeasy-373-microsoft-admits-losing-weeks-of-security-logs-for-cloud-products&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-373-microsoft-admits-losing-weeks-of-security-logs-for-cloud-products</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-373-microsoft-admits-losing-weeks-of-security-logs-for-cloud-products/?pk_campaign=feed&#038;pk_kwd=axisofeasy-373-microsoft-admits-losing-weeks-of-security-logs-for-cloud-products#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 25 Oct 2024 22:00:39 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI Transparency]]></category>
		<category><![CDATA[Cloud Products]]></category>
		<category><![CDATA[Cyber Risk]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Defender for Cloud]]></category>
		<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[Entra]]></category>
		<category><![CDATA[Exynos Processors]]></category>
		<category><![CDATA[Kernel Space Mirroring Attack]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Misleading Disclosures]]></category>
		<category><![CDATA[Monitoring Agents]]></category>
		<category><![CDATA[Ottawa Declaration]]></category>
		<category><![CDATA[Privacy Risks]]></category>
		<category><![CDATA[Public Broadcasters]]></category>
		<category><![CDATA[Purview]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[SEC Charges]]></category>
		<category><![CDATA[Security Logs]]></category>
		<category><![CDATA[Sensitive Information]]></category>
		<category><![CDATA[Sentinel]]></category>
		<category><![CDATA[SolarWinds]]></category>
		<category><![CDATA[Tenant Admin Rights]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[UN Database]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Zero-Day Exploit]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=30517</guid>

					<description><![CDATA[Microsoft Admits Losing Weeks of Security Logs for Cloud Products,
Samsung Hit by Dangerous Zero-Day Exploit in Mobile Processors,
BT⚡TV 16: Marc Morano - CBDC's Are About Creating a Permission-Based Society ... this and more in AofE  #373<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-373-microsoft-admits-losing-weeks-of-security-logs-for-cloud-products%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-373-microsoft-admits-losing-weeks-of-security-logs-for-cloud-products&amp;action_name=%23AxisOfEasy%20373%3A%20Microsoft%20Admits%20Losing%20Weeks%20Of%20Security%20Logs%20For%20Cloud%20Products&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-373-microsoft-admits-losing-weeks-of-security-logs-for-cloud-products/?pk_campaign=feed&#038;pk_kwd=axisofeasy-373-microsoft-admits-losing-weeks-of-security-logs-for-cloud-products/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
