<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Docker</title>
	<atom:link href="https://axisofeasy.com/tag/docker/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 16 Jan 2026 19:32:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>Docker</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 433: Australia Moves To Enact Sweeping New Hate Speech And Extremism Laws</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 23:00:28 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[agentic AI]]></category>
		<category><![CDATA[AI impact]]></category>
		<category><![CDATA[AI model reconnaissance]]></category>
		<category><![CDATA[AI Red Teaming]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[AI Tooling Risks]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[antisemitism]]></category>
		<category><![CDATA[AsyncRAT]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[blockchain abuse]]></category>
		<category><![CDATA[burden of proof]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[C2 evasion]]></category>
		<category><![CDATA[Check Point Research]]></category>
		<category><![CDATA[Chinese threat actors]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cloudflare abuse]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[cyber extortion]]></category>
		<category><![CDATA[cybercrime-as-a-service]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[data breaches]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[DeadLock]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[developer layoffs]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[extremism legislation]]></category>
		<category><![CDATA[fintech security]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[generative AI abuse]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[government censorship]]></category>
		<category><![CDATA[Group-IB]]></category>
		<category><![CDATA[Hacker News]]></category>
		<category><![CDATA[hate speech laws]]></category>
		<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[law enforcement powers]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[LLM Exploits]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[micropayments]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Model Isolation Failures]]></category>
		<category><![CDATA[online speech]]></category>
		<category><![CDATA[open source software]]></category>
		<category><![CDATA[OS command injection]]></category>
		<category><![CDATA[parliament]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing campaigns]]></category>
		<category><![CDATA[Polygon]]></category>
		<category><![CDATA[Privacy & PII]]></category>
		<category><![CDATA[prohibited groups]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reclaim The Net]]></category>
		<category><![CDATA[RedVDS]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Secure AI Design]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[software sustainability]]></category>
		<category><![CDATA[SSH key theft]]></category>
		<category><![CDATA[SSRF attacks]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[supply-chain risk]]></category>
		<category><![CDATA[Tailwind CSS]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[voice cloning]]></category>
		<category><![CDATA[VoidLink]]></category>
		<category><![CDATA[Windows security patches]]></category>
		<category><![CDATA[X402 protocol]]></category>
		<category><![CDATA[zero-day vulnerabilities]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32970</guid>

					<description><![CDATA[Australia Moves to Enact Sweeping New Hate Speech and Extremism Laws,
Can x402 micropayments save Open Source Software?
Claude Cowork Exfiltrates Files ... this and more in AofE  #433<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&amp;action_name=%23AxisOfEasy%20433%3A%20Australia%20Moves%20To%20Enact%20Sweeping%20New%20Hate%20Speech%20And%20Extremism%20Laws&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 410: Can AI Chatbots Be Hacked Via DNS?</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/?pk_campaign=feed&#038;pk_kwd=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/?pk_campaign=feed&#038;pk_kwd=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 25 Jul 2025 22:00:59 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI agent]]></category>
		<category><![CDATA[AI chatbots]]></category>
		<category><![CDATA[AI fraud]]></category>
		<category><![CDATA[authentication keys]]></category>
		<category><![CDATA[autonomous agents]]></category>
		<category><![CDATA[bug bounty]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[cloud compromise]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[crypto mining]]></category>
		<category><![CDATA[CVE-2025-53770]]></category>
		<category><![CDATA[cybercrime forum]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity regulations]]></category>
		<category><![CDATA[database deletion]]></category>
		<category><![CDATA[debug code]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[Education Department]]></category>
		<category><![CDATA[ExpressVPN]]></category>
		<category><![CDATA[G5 portal]]></category>
		<category><![CDATA[Ghostwriter]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Hello Internet Corp]]></category>
		<category><![CDATA[Interlock ransomware]]></category>
		<category><![CDATA[IP address exposure]]></category>
		<category><![CDATA[JavaScript exfiltration]]></category>
		<category><![CDATA[lateral movement]]></category>
		<category><![CDATA[layoffs]]></category>
		<category><![CDATA[Magento]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[production error]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[RDP leak]]></category>
		<category><![CDATA[Replit]]></category>
		<category><![CDATA[SharePoint]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[txt records]]></category>
		<category><![CDATA[Ukraine arrest]]></category>
		<category><![CDATA[Vibe Coding Test]]></category>
		<category><![CDATA[voiceprint authentication]]></category>
		<category><![CDATA[VPN tunnel]]></category>
		<category><![CDATA[water utilities]]></category>
		<category><![CDATA[XSS.is]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31916</guid>

					<description><![CDATA[Can AI Chatbots Be Hacked Via DNS?
SharePoint Zero Day Exploit Hits U.S. Agencies and Exposes Microsoft’s Persistent Security Gaps
ExpressVPN Patch Fixes RDP Traffic Leak That Exposed User IP Addresses ...this and more in AofE  #410<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-410-can-ai-chatbots-be-hacked-via-dns%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-410-can-ai-chatbots-be-hacked-via-dns&amp;action_name=%23AxisOfEasy%20410%3A%20Can%20AI%20Chatbots%20Be%20Hacked%20Via%20DNS%3F&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/?pk_campaign=feed&#038;pk_kwd=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 396: Google Got Your Health Info Without You Knowing, And Here&#8217;s What Happened</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened/?pk_campaign=feed&#038;pk_kwd=axisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened/?pk_campaign=feed&#038;pk_kwd=axisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 18 Apr 2025 22:00:18 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[4chan hack]]></category>
		<category><![CDATA[admin leak]]></category>
		<category><![CDATA[AI fraud]]></category>
		<category><![CDATA[AI vulnerability]]></category>
		<category><![CDATA[anonymity]]></category>
		<category><![CDATA[Blue Shield]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chinese hackers]]></category>
		<category><![CDATA[Cl0p]]></category>
		<category><![CDATA[Cleo hack]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[crypto theft]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[DoJ]]></category>
		<category><![CDATA[EU diplomats]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Ads]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[healthcare data]]></category>
		<category><![CDATA[Hertz]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[human labor]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[imageboard]]></category>
		<category><![CDATA[investor fraud]]></category>
		<category><![CDATA[LinkedIn scams]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Nate app]]></category>
		<category><![CDATA[North Korean Hackers]]></category>
		<category><![CDATA[NVidia]]></category>
		<category><![CDATA[open-source tools]]></category>
		<category><![CDATA[patient information]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Russian hackers]]></category>
		<category><![CDATA[shopping app]]></category>
		<category><![CDATA[Snowlight]]></category>
		<category><![CDATA[UK data leak]]></category>
		<category><![CDATA[UNC5174]]></category>
		<category><![CDATA[US spies]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31413</guid>

					<description><![CDATA[Google Got Your Health Info Without You Knowing, and Here's What Happened,
Massive Hertz Data Leak Revealed, and It's Worse Than You Think,
Nate CEO Charged After AI Shopping App Found to Rely on Human Labor... this and more in AofE  #396<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened&amp;action_name=%23AxisOfEasy%20396%3A%20Google%20Got%20Your%20Health%20Info%20Without%20You%20Knowing%2C%20And%20Here%26%238217%3Bs%20What%20Happened&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened/?pk_campaign=feed&#038;pk_kwd=axisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
	</channel>
</rss>
