<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>extortion</title>
	<atom:link href="https://axisofeasy.com/tag/extortion/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 10 Oct 2025 20:52:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>extortion</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 421: Is Your Data Safe After the Discord Hack?</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-421-is-your-data-safe-after-the-discord-hack/?pk_campaign=feed&#038;pk_kwd=axisofeasy-421-is-your-data-safe-after-the-discord-hack&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-421-is-your-data-safe-after-the-discord-hack</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-421-is-your-data-safe-after-the-discord-hack/?pk_campaign=feed&#038;pk_kwd=axisofeasy-421-is-your-data-safe-after-the-discord-hack#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 10 Oct 2025 22:00:49 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[52 Division]]></category>
		<category><![CDATA[Aadhaar]]></category>
		<category><![CDATA[age appeal process]]></category>
		<category><![CDATA[airport outage]]></category>
		<category><![CDATA[ANTSWORD]]></category>
		<category><![CDATA[Asahi Group]]></category>
		<category><![CDATA[Billy Bishop]]></category>
		<category><![CDATA[biometric authentication]]></category>
		<category><![CDATA[border control]]></category>
		<category><![CDATA[C2 server]]></category>
		<category><![CDATA[CAFC]]></category>
		<category><![CDATA[caller ID spoofing]]></category>
		<category><![CDATA[CBSA]]></category>
		<category><![CDATA[Chinese hackers]]></category>
		<category><![CDATA[Clop hackers]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cryptocurrency scam]]></category>
		<category><![CDATA[customer support]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cyber Risk]]></category>
		<category><![CDATA[cyberattack denial]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[digital fraud]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[Discord]]></category>
		<category><![CDATA[DNS failure]]></category>
		<category><![CDATA[Doug Ford]]></category>
		<category><![CDATA[EU surveillance law]]></category>
		<category><![CDATA[extortion]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[fake investment]]></category>
		<category><![CDATA[fee scam]]></category>
		<category><![CDATA[fingerprints]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[German government]]></category>
		<category><![CDATA[Gh0st RAT]]></category>
		<category><![CDATA[Global Fintech Festival]]></category>
		<category><![CDATA[GoAnywhere MFT vulnerability]]></category>
		<category><![CDATA[government ID images]]></category>
		<category><![CDATA[Guelph]]></category>
		<category><![CDATA[Guelph Police]]></category>
		<category><![CDATA[Hong Kong]]></category>
		<category><![CDATA[Huntress]]></category>
		<category><![CDATA[impersonation]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[investor awareness]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[kiosk failure]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[law enforcement impersonation]]></category>
		<category><![CDATA[malware campaign]]></category>
		<category><![CDATA[Medusa Ransomware]]></category>
		<category><![CDATA[Microsoft Defender]]></category>
		<category><![CDATA[Microsoft exploitation]]></category>
		<category><![CDATA[misdirection]]></category>
		<category><![CDATA[Nezha]]></category>
		<category><![CDATA[NPCI]]></category>
		<category><![CDATA[online identity verification]]></category>
		<category><![CDATA[Oracle EBS zero-day]]></category>
		<category><![CDATA[payments]]></category>
		<category><![CDATA[phone spoofing]]></category>
		<category><![CDATA[phpMyAdmin]]></category>
		<category><![CDATA[PowerShell]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Concerns]]></category>
		<category><![CDATA[Qilin ransomware]]></category>
		<category><![CDATA[regulatory framework]]></category>
		<category><![CDATA[Renault]]></category>
		<category><![CDATA[Reserve Bank of India]]></category>
		<category><![CDATA[scam detection]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[social media fraud]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[technical maintenance]]></category>
		<category><![CDATA[third-party vendor]]></category>
		<category><![CDATA[Toronto Pearson]]></category>
		<category><![CDATA[Toronto Police Services]]></category>
		<category><![CDATA[travel disruption]]></category>
		<category><![CDATA[Trust & Safety]]></category>
		<category><![CDATA[UPI]]></category>
		<category><![CDATA[vehicle data theft]]></category>
		<category><![CDATA[VOIP]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32423</guid>

					<description><![CDATA[Vendor Breach Exposes Discord Support Data and ID Images,
India Turns Every Face and Finger into a Payment Key,
Airport Outage Sparks Delays as CBSA Rules Out Cyberattack... this and more in AofE  #421<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-421-is-your-data-safe-after-the-discord-hack%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-421-is-your-data-safe-after-the-discord-hack&amp;action_name=%23AxisOfEasy%20421%3A%20Is%20Your%20Data%20Safe%20After%20the%20Discord%20Hack%3F&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-421-is-your-data-safe-after-the-discord-hack/?pk_campaign=feed&#038;pk_kwd=axisofeasy-421-is-your-data-safe-after-the-discord-hack/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 416: Judge Imposes Limits On Google Deals After Monopoly Ruling But Avoids Breakup</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup/?pk_campaign=feed&#038;pk_kwd=axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup/?pk_campaign=feed&#038;pk_kwd=axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 05 Sep 2025 22:00:22 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[ad-tech]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[antitrust]]></category>
		<category><![CDATA[AnyDesk]]></category>
		<category><![CDATA[API integrations]]></category>
		<category><![CDATA[appeal]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[APT group]]></category>
		<category><![CDATA[Authenticode]]></category>
		<category><![CDATA[AzCopy]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[AzureHound]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[behavioral remedies]]></category>
		<category><![CDATA[Check Point Research]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[CISOs]]></category>
		<category><![CDATA[ClickFix]]></category>
		<category><![CDATA[cloud-native attack]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[Coalition]]></category>
		<category><![CDATA[credential scanning]]></category>
		<category><![CDATA[CRM]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[default settings]]></category>
		<category><![CDATA[Digital Markets Act]]></category>
		<category><![CDATA[diplomats]]></category>
		<category><![CDATA[divestiture]]></category>
		<category><![CDATA[DoJ]]></category>
		<category><![CDATA[domain generation algorithm]]></category>
		<category><![CDATA[Drift]]></category>
		<category><![CDATA[embassy emails]]></category>
		<category><![CDATA[Entra Connect]]></category>
		<category><![CDATA[Entra ID]]></category>
		<category><![CDATA[Ethereum]]></category>
		<category><![CDATA[exclusivity deals]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[extortion]]></category>
		<category><![CDATA[fake firmware]]></category>
		<category><![CDATA[Gemini]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[hateful content]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[IoT botnet]]></category>
		<category><![CDATA[Iranian hackers]]></category>
		<category><![CDATA[Judge Amit Mehta]]></category>
		<category><![CDATA[Judge Leonie Brinkema]]></category>
		<category><![CDATA[LOLDrivers]]></category>
		<category><![CDATA[malicious npm]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mandiant]]></category>
		<category><![CDATA[MetaStealer]]></category>
		<category><![CDATA[MFA bypass]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Teams]]></category>
		<category><![CDATA[monopoly]]></category>
		<category><![CDATA[NVR exploits]]></category>
		<category><![CDATA[OAuth Tokens]]></category>
		<category><![CDATA[Palo Alto Networks]]></category>
		<category><![CDATA[Pedro Umbelino]]></category>
		<category><![CDATA[persistence]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RapperBot]]></category>
		<category><![CDATA[refresh tokens]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salesloft]]></category>
		<category><![CDATA[search]]></category>
		<category><![CDATA[Shop App]]></category>
		<category><![CDATA[Shopify]]></category>
		<category><![CDATA[Silver Fox]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Storm-0501]]></category>
		<category><![CDATA[technical committee]]></category>
		<category><![CDATA[txt records]]></category>
		<category><![CDATA[UNC6395]]></category>
		<category><![CDATA[ValleyRAT]]></category>
		<category><![CDATA[volumetric attack]]></category>
		<category><![CDATA[vulnerable drivers]]></category>
		<category><![CDATA[WatchDog]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[Winos]]></category>
		<category><![CDATA[Zemana]]></category>
		<category><![CDATA[Zero-click]]></category>
		<category><![CDATA[Zscaler]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32195</guid>

					<description><![CDATA[Judge Imposes Limits on Google Deals After Monopoly Ruling but Avoids Breakup,
Salesloft Drift Breach Exposes Salesforce Data at Zscaler, Palo Alto Networks, and Hundreds More,
APT Group Exploits Microsoft Trust to Deploy Stealthy Malware...this and more in AofE  #416<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup&amp;action_name=%23AxisOfEasy%20416%3A%20Judge%20Imposes%20Limits%20On%20Google%20Deals%20After%20Monopoly%20Ruling%20But%20Avoids%20Breakup&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup/?pk_campaign=feed&#038;pk_kwd=axisofeasy-416-judge-imposes-limits-on-google-deals-after-monopoly-ruling-but-avoids-breakup/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
