<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>free speech</title>
	<atom:link href="https://axisofeasy.com/tag/free-speech/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Sat, 18 Apr 2026 12:12:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>free speech</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 446: Internet Content Regulation Is Coming To Canada</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?pk_campaign=feed&#038;pk_kwd=axisofeasy-446-internet-content-regulation-is-coming-to-canada&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-446-internet-content-regulation-is-coming-to-canada</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?pk_campaign=feed&#038;pk_kwd=axisofeasy-446-internet-content-regulation-is-coming-to-canada#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 22:00:47 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI agents]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[antivirus evasion]]></category>
		<category><![CDATA[API keys]]></category>
		<category><![CDATA[APT41]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[banking malware]]></category>
		<category><![CDATA[C2 persistence]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Claude AI]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Copilot]]></category>
		<category><![CDATA[court order]]></category>
		<category><![CDATA[credential harvesting]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[delusions]]></category>
		<category><![CDATA[DLL sideloading]]></category>
		<category><![CDATA[Electron malware]]></category>
		<category><![CDATA[email phishing]]></category>
		<category><![CDATA[First Amendment]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[Gemini]]></category>
		<category><![CDATA[GitHub Actions]]></category>
		<category><![CDATA[government policy]]></category>
		<category><![CDATA[InfoStealer]]></category>
		<category><![CDATA[internet regulation]]></category>
		<category><![CDATA[ISP monitoring]]></category>
		<category><![CDATA[JanelaRAT]]></category>
		<category><![CDATA[Latin America attacks]]></category>
		<category><![CDATA[legal case]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft update scam]]></category>
		<category><![CDATA[Mirax trojan]]></category>
		<category><![CDATA[n8n abuse]]></category>
		<category><![CDATA[obfuscation]]></category>
		<category><![CDATA[Online Harms]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PlugX]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[Python payloads]]></category>
		<category><![CDATA[Rockstar Games]]></category>
		<category><![CDATA[SharePoint exploit]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[social media ban]]></category>
		<category><![CDATA[spoofed software]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[threat actors]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[workflow automation]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33713</guid>

					<description><![CDATA[Internet Content Regulation is Coming To Canada,
Court Orders OpenAI to Block User in ChatGPT Case Raising Free Speech Concerns,
Fake Claude “Pro” Site Spreads PlugX Malware via DLL Sideloading... this and more in AofE  #446<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-446-internet-content-regulation-is-coming-to-canada%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-446-internet-content-regulation-is-coming-to-canada&amp;action_name=%23AxisOfEasy%20446%3A%20Internet%20Content%20Regulation%20Is%20Coming%20To%20Canada&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?pk_campaign=feed&#038;pk_kwd=axisofeasy-446-internet-content-regulation-is-coming-to-canada/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 446: Internet Content Regulation Is Coming To Canada</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-446-internet-content-regulation-is-coming-to-canada</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-446-internet-content-regulation-is-coming-to-canada/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 22:00:34 +0000</pubDate>
				<category><![CDATA[Bill C-11]]></category>
		<category><![CDATA[Bill C-63]]></category>
		<category><![CDATA[Bill C-9]]></category>
		<category><![CDATA[Canada censorship]]></category>
		<category><![CDATA[Canada censorship exposed]]></category>
		<category><![CDATA[Canada censorship law]]></category>
		<category><![CDATA[Canada free speech]]></category>
		<category><![CDATA[Canada internet censorship]]></category>
		<category><![CDATA[Canada internet control 2026]]></category>
		<category><![CDATA[Canadian content regulation]]></category>
		<category><![CDATA[content moderation]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[CRTC online content]]></category>
		<category><![CDATA[digital censorship]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[government internet control]]></category>
		<category><![CDATA[Internet freedom]]></category>
		<category><![CDATA[internet regulation Canada]]></category>
		<category><![CDATA[Mark Carney]]></category>
		<category><![CDATA[Mark Carney censorship]]></category>
		<category><![CDATA[online censorship]]></category>
		<category><![CDATA[online censorship Canada]]></category>
		<category><![CDATA[online harms act]]></category>
		<category><![CDATA[Trudeau censorship]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=33754</guid>

					<description><![CDATA[In this issue: Internet Content Regulation is Coming To Canada Court Orders OpenAI to Block User in ChatGPT Case Raising Free Speech Concerns Fake Claude “Pro” Site Spreads PlugX Malware via DLL Sideloading n8n Abuse Turns Workflow Automation Tool into Phishing and Malware Delivery Channel AI Agents in GitHub Actions Bypassed via Prompt Injection Fake [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-446-internet-content-regulation-is-coming-to-canada%2F&amp;action_name=%23AxisOfEasy%20446%3A%20Internet%20Content%20Regulation%20Is%20Coming%20To%20Canada&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-446-internet-content-regulation-is-coming-to-canada/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 433: Australia Moves To Enact Sweeping New Hate Speech And Extremism Laws</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 23:00:28 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[agentic AI]]></category>
		<category><![CDATA[AI impact]]></category>
		<category><![CDATA[AI model reconnaissance]]></category>
		<category><![CDATA[AI Red Teaming]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[AI Tooling Risks]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[antisemitism]]></category>
		<category><![CDATA[AsyncRAT]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[blockchain abuse]]></category>
		<category><![CDATA[burden of proof]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[C2 evasion]]></category>
		<category><![CDATA[Check Point Research]]></category>
		<category><![CDATA[Chinese threat actors]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cloudflare abuse]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[cyber extortion]]></category>
		<category><![CDATA[cybercrime-as-a-service]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[data breaches]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[DeadLock]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[developer layoffs]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[extremism legislation]]></category>
		<category><![CDATA[fintech security]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[generative AI abuse]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[government censorship]]></category>
		<category><![CDATA[Group-IB]]></category>
		<category><![CDATA[Hacker News]]></category>
		<category><![CDATA[hate speech laws]]></category>
		<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[law enforcement powers]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[LLM Exploits]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[micropayments]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Model Isolation Failures]]></category>
		<category><![CDATA[online speech]]></category>
		<category><![CDATA[open source software]]></category>
		<category><![CDATA[OS command injection]]></category>
		<category><![CDATA[parliament]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing campaigns]]></category>
		<category><![CDATA[Polygon]]></category>
		<category><![CDATA[Privacy & PII]]></category>
		<category><![CDATA[prohibited groups]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reclaim The Net]]></category>
		<category><![CDATA[RedVDS]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Secure AI Design]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[software sustainability]]></category>
		<category><![CDATA[SSH key theft]]></category>
		<category><![CDATA[SSRF attacks]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[supply-chain risk]]></category>
		<category><![CDATA[Tailwind CSS]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[voice cloning]]></category>
		<category><![CDATA[VoidLink]]></category>
		<category><![CDATA[Windows security patches]]></category>
		<category><![CDATA[X402 protocol]]></category>
		<category><![CDATA[zero-day vulnerabilities]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32970</guid>

					<description><![CDATA[Australia Moves to Enact Sweeping New Hate Speech and Extremism Laws,
Can x402 micropayments save Open Source Software?
Claude Cowork Exfiltrates Files ... this and more in AofE  #433<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&amp;action_name=%23AxisOfEasy%20433%3A%20Australia%20Moves%20To%20Enact%20Sweeping%20New%20Hate%20Speech%20And%20Extremism%20Laws&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 433: Australia Moves To Enact Sweeping New Hate Speech And Extremism Laws</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/#comments</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 23:00:09 +0000</pubDate>
				<category><![CDATA[AI security]]></category>
		<category><![CDATA[attack analysis]]></category>
		<category><![CDATA[Australia hate speech law]]></category>
		<category><![CDATA[BEC]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[Claude Cowork]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[CVE-2025-64155]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[DeadLock]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[FortiSIEM]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[January 2026]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[micropayments]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RCE]]></category>
		<category><![CDATA[RedVDS]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[VoidLink]]></category>
		<category><![CDATA[x402]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32986</guid>

					<description><![CDATA[Australia is moving to criminalize speech based on hypothetical harm. Meanwhile, Claude Co-Work is exfiltrating your files, and six critical attack stories expose systematic infrastructure failure - this is #AxisofEasy 433<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws%2F&amp;action_name=%23AxisOfEasy%20433%3A%20Australia%20Moves%20To%20Enact%20Sweeping%20New%20Hate%20Speech%20And%20Extremism%20Laws&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 420: RedNovember&#8217;s Global Cyber-Espionage Blitz</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-420-rednovembers-global-cyber-espionage-blitz</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 03 Oct 2025 22:00:48 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[1.2 million passengers]]></category>
		<category><![CDATA[1500 organizations]]></category>
		<category><![CDATA[ACSC]]></category>
		<category><![CDATA[Africa]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[arbitrary code execution]]></category>
		<category><![CDATA[ArcaneDoor]]></category>
		<category><![CDATA[ASA]]></category>
		<category><![CDATA[authentication bypass]]></category>
		<category><![CDATA[aviation]]></category>
		<category><![CDATA[banking trojan]]></category>
		<category><![CDATA[BCC]]></category>
		<category><![CDATA[Bill C-36]]></category>
		<category><![CDATA[Bill C-8]]></category>
		<category><![CDATA[Bill C-9]]></category>
		<category><![CDATA[Bitcoin Treasury]]></category>
		<category><![CDATA[C-2]]></category>
		<category><![CDATA[C-26]]></category>
		<category><![CDATA[C-8]]></category>
		<category><![CDATA[C-9]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Canadian Bitcoin Conference]]></category>
		<category><![CDATA[Canadian Bitcoin Podcast]]></category>
		<category><![CDATA[Canadian Human Rights Act]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[Central Asia]]></category>
		<category><![CDATA[Charter of Rights and Freedoms]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Cisco ASA]]></category>
		<category><![CDATA[Citizen Lab]]></category>
		<category><![CDATA[Cobalt Strike]]></category>
		<category><![CDATA[command-and-control]]></category>
		<category><![CDATA[Criminal Code]]></category>
		<category><![CDATA[CVE-2025-20333]]></category>
		<category><![CDATA[CVE-2025-20362]]></category>
		<category><![CDATA[cyber campaign]]></category>
		<category><![CDATA[cyber defense]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[developer data]]></category>
		<category><![CDATA[Digital Safety Commission]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[F5 BIG-IP]]></category>
		<category><![CDATA[fake recruiters]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[FTD]]></category>
		<category><![CDATA[genocide]]></category>
		<category><![CDATA[geopolitics]]></category>
		<category><![CDATA[harmful online content]]></category>
		<category><![CDATA[hate speech]]></category>
		<category><![CDATA[IDs]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Indian Cyber Crime Coordination Centre]]></category>
		<category><![CDATA[Insikt Group]]></category>
		<category><![CDATA[IT Act 2000]]></category>
		<category><![CDATA[Ivanti Connect Secure]]></category>
		<category><![CDATA[Joey Temprile]]></category>
		<category><![CDATA[Justice M Nagaprasanna]]></category>
		<category><![CDATA[Karnataka High Court]]></category>
		<category><![CDATA[Klopatra]]></category>
		<category><![CDATA[LESLIELOADER]]></category>
		<category><![CDATA[Line Dancer]]></category>
		<category><![CDATA[Line Runner]]></category>
		<category><![CDATA[loyalty programs]]></category>
		<category><![CDATA[Mark Jeftovic]]></category>
		<category><![CDATA[MCP server]]></category>
		<category><![CDATA[Melanie Joly]]></category>
		<category><![CDATA[Ministry of Home Affairs]]></category>
		<category><![CDATA[mitigation]]></category>
		<category><![CDATA[Montreal]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[Net-Star malware]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[online misuse]]></category>
		<category><![CDATA[Outlook Web Access]]></category>
		<category><![CDATA[Panama]]></category>
		<category><![CDATA[Pantegana]]></category>
		<category><![CDATA[passports]]></category>
		<category><![CDATA[peace bonds]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[Phantom Taurus]]></category>
		<category><![CDATA[phone hijacking]]></category>
		<category><![CDATA[PoC exploits]]></category>
		<category><![CDATA[Qantas]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Recorded Future]]></category>
		<category><![CDATA[RedNovember]]></category>
		<category><![CDATA[Rialto Theatre]]></category>
		<category><![CDATA[ROM manipulation]]></category>
		<category><![CDATA[Sahyog portal]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[Sean Fraser]]></category>
		<category><![CDATA[secrets]]></category>
		<category><![CDATA[Section 69A]]></category>
		<category><![CDATA[Secure Firewall]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[SparkRAT]]></category>
		<category><![CDATA[spearphishing]]></category>
		<category><![CDATA[state-sponsored]]></category>
		<category><![CDATA[Steven Guilbeault]]></category>
		<category><![CDATA[Storm-1849]]></category>
		<category><![CDATA[Storm-2077]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[surveillance bills]]></category>
		<category><![CDATA[TAG-100]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[transportation networks]]></category>
		<category><![CDATA[twitter]]></category>
		<category><![CDATA[U.S. defense contractors]]></category>
		<category><![CDATA[UAT4356]]></category>
		<category><![CDATA[VNC]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[WestJet]]></category>
		<category><![CDATA[women’s safety]]></category>
		<category><![CDATA[X Corp]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32373</guid>

					<description><![CDATA[... this and more in AofE  #420<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-420-rednovembers-global-cyber-espionage-blitz%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-420-rednovembers-global-cyber-espionage-blitz&amp;action_name=%23AxisOfEasy%20420%3A%20RedNovember%26%238217%3Bs%20Global%20Cyber-Espionage%20Blitz&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 418: Trump Delays TikTok Ban as US Consortium Eyes Control Without Algorithm</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-418-trump-delays-tiktok-ban-as-us-consortium-eyes-control-without-algorithm/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-418-trump-delays-tiktok-ban-as-us-consortium-eyes-control-without-algorithm</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-418-trump-delays-tiktok-ban-as-us-consortium-eyes-control-without-algorithm/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 22:00:50 +0000</pubDate>
				<category><![CDATA[american censorship]]></category>
		<category><![CDATA[best tiktok]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[databreach]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[online harms act]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[TikTok ban]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[trump canada]]></category>
		<category><![CDATA[trump tiktok]]></category>
		<category><![CDATA[us tiktok]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32314</guid>

					<description><![CDATA[Trump Delays TikTok Ban as US Consortium Eyes Control Without Algorithm<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-418-trump-delays-tiktok-ban-as-us-consortium-eyes-control-without-algorithm%2F&amp;action_name=%23AxisOfEasy%20418%3A%20Trump%20Delays%20TikTok%20Ban%20as%20US%20Consortium%20Eyes%20Control%20Without%20Algorithm&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-418-trump-delays-tiktok-ban-as-us-consortium-eyes-control-without-algorithm/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 415: PromptLock Signals The Arrival Of AI Powered Ransomware</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 29 Aug 2025 22:00:33 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[4Chan]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI crimewave]]></category>
		<category><![CDATA[AI enhancements]]></category>
		<category><![CDATA[algorithmic mediation]]></category>
		<category><![CDATA[Android Trojan]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[authenticity]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Banks]]></category>
		<category><![CDATA[Base64]]></category>
		<category><![CDATA[Bill C-11]]></category>
		<category><![CDATA[Bill C-13]]></category>
		<category><![CDATA[bitcoin ransom]]></category>
		<category><![CDATA[Broadcasting Act]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Claude Code]]></category>
		<category><![CDATA[court case]]></category>
		<category><![CDATA[creator backlash]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[defense contractors]]></category>
		<category><![CDATA[EDR evasion]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[extraterritoriality]]></category>
		<category><![CDATA[Farmers Insurance]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[filename parsing]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[GoLang]]></category>
		<category><![CDATA[Google Pixel]]></category>
		<category><![CDATA[GPT-OSS]]></category>
		<category><![CDATA[guardrails]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hospitals]]></category>
		<category><![CDATA[hybrid cloud]]></category>
		<category><![CDATA[io_uring]]></category>
		<category><![CDATA[Kiwi Farms]]></category>
		<category><![CDATA[legislative error]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Netflix]]></category>
		<category><![CDATA[Ofcom]]></category>
		<category><![CDATA[Ollama]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PromptLock]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RingReaper]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[shell injection]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Shorts]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Storm-0501]]></category>
		<category><![CDATA[trust]]></category>
		<category><![CDATA[U.S. Constitution]]></category>
		<category><![CDATA[UNC5174]]></category>
		<category><![CDATA[VShell]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Youtube]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32136</guid>

					<description><![CDATA[PromptLock Signals the Arrival of AI Powered Ransomware,
Phishing Campaign Exploits Linux Filename Parsing to Deliver VShell Backdoor,
Government Error Erases Privacy Rights from Broadcasting Act ...this and more in AofE  #415<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware&amp;action_name=%23AxisOfEasy%20415%3A%20PromptLock%20Signals%20The%20Arrival%20Of%20AI%20Powered%20Ransomware&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 409: Adoption Data Breach Exposes Sensitive Records From Texas Nonprofit</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 18 Jul 2025 22:00:04 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[access brokers]]></category>
		<category><![CDATA[Adoption]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AxisOfEasy]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[Black Basta]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[Bluesky]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[C2 infrastructure]]></category>
		<category><![CDATA[Chatbot]]></category>
		<category><![CDATA[child protection]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cloud misconfiguration]]></category>
		<category><![CDATA[CRM migration]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cypherpunk]]></category>
		<category><![CDATA[Cypherpunk movement]]></category>
		<category><![CDATA[Dark Reading]]></category>
		<category><![CDATA[data access]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data sovereignty]]></category>
		<category><![CDATA[data storage]]></category>
		<category><![CDATA[decentralization]]></category>
		<category><![CDATA[Decentralized systems]]></category>
		<category><![CDATA[deep learning]]></category>
		<category><![CDATA[Developing Countries]]></category>
		<category><![CDATA[Digital dystopia]]></category>
		<category><![CDATA[digital economy]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[digital resilience]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[documentation]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[ECC]]></category>
		<category><![CDATA[emerging markets]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Episource]]></category>
		<category><![CDATA[existential risk]]></category>
		<category><![CDATA[facial scanning]]></category>
		<category><![CDATA[financial innovation]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[GDDR6]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GPUhammer]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hardware security]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[HexEval]]></category>
		<category><![CDATA[in-memory execution]]></category>
		<category><![CDATA[internal tooling]]></category>
		<category><![CDATA[Internet freedom]]></category>
		<category><![CDATA[Irish DPC]]></category>
		<category><![CDATA[Kid Web Services]]></category>
		<category><![CDATA[leapfrogging]]></category>
		<category><![CDATA[LOLBin]]></category>
		<category><![CDATA[long-form content]]></category>
		<category><![CDATA[Louis Vuitton]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[malware-as-a-service]]></category>
		<category><![CDATA[Matanbuchus]]></category>
		<category><![CDATA[medical imaging]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Teams]]></category>
		<category><![CDATA[monetary fine]]></category>
		<category><![CDATA[monetary sovereignty]]></category>
		<category><![CDATA[nonprofit]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[NVidia]]></category>
		<category><![CDATA[online identity]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[patient data]]></category>
		<category><![CDATA[payload delivery]]></category>
		<category><![CDATA[payments infrastructure]]></category>
		<category><![CDATA[Peer-to-peer networks]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[retail]]></category>
		<category><![CDATA[reverse shell]]></category>
		<category><![CDATA[Rowhammer]]></category>
		<category><![CDATA[SMA 100]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[support automation]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tech philosophy]]></category>
		<category><![CDATA[technological foresight]]></category>
		<category><![CDATA[Texas]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[UK regulation]]></category>
		<category><![CDATA[Usenix]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Web3]]></category>
		<category><![CDATA[XORIndex]]></category>
		<category><![CDATA[zero-day]]></category>
		<category><![CDATA[Zero-Day Exploit]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31883</guid>

					<description><![CDATA[ Adoption Data Breach Exposes Sensitive Records from Texas Nonprofit,
Matanbuchus 3.0 Expands Stealth Tactics with Teams Lures and Advanced Loader Features,
Bluesky Implements UK Age Checks Amid Privacy Backlash Over Online Safety Law...this and more in AofE  #409<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&amp;action_name=%23AxisOfEasy%20409%3A%20Adoption%20Data%20Breach%20Exposes%20Sensitive%20Records%20From%20Texas%20Nonprofit&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 408: Scammers Are Ready To Strike As Amazon Prime Day Begins Tomorrow</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/?pk_campaign=feed&#038;pk_kwd=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/?pk_campaign=feed&#038;pk_kwd=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 11 Jul 2025 22:00:17 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[130 vulnerabilities]]></category>
		<category><![CDATA[AI bots]]></category>
		<category><![CDATA[AI malware]]></category>
		<category><![CDATA[Amazon Prime Day]]></category>
		<category><![CDATA[AMOS]]></category>
		<category><![CDATA[Apple Keychain]]></category>
		<category><![CDATA[Bill C-63]]></category>
		<category><![CDATA[bot blocking]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[browser data theft]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship law]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Chinese hacker]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[content monetization]]></category>
		<category><![CDATA[COVID research theft]]></category>
		<category><![CDATA[crypto users]]></category>
		<category><![CDATA[CVE-2024-12856]]></category>
		<category><![CDATA[CVE-2024-3721]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[data scraping]]></category>
		<category><![CDATA[DDoS attacks]]></category>
		<category><![CDATA[email fraud]]></category>
		<category><![CDATA[encrypted malware]]></category>
		<category><![CDATA[fake domains]]></category>
		<category><![CDATA[fake Zoom invites]]></category>
		<category><![CDATA[firmware vulnerabilities]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[Four-Faith routers]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[government overreach]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[internet restrictions]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[macOS backdoor]]></category>
		<category><![CDATA[macOS malware]]></category>
		<category><![CDATA[Mark Carney]]></category>
		<category><![CDATA[Matthew Prince]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Defender evasion]]></category>
		<category><![CDATA[Minecraft disguise]]></category>
		<category><![CDATA[NimDoor]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Nova Scotia Power]]></category>
		<category><![CDATA[Online Harms Bill]]></category>
		<category><![CDATA[password theft]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[pay-per-crawl]]></category>
		<category><![CDATA[permission-first model]]></category>
		<category><![CDATA[persistent threats]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[proxy devices]]></category>
		<category><![CDATA[RondoDox]]></category>
		<category><![CDATA[Russian hackers]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[SentinelOne]]></category>
		<category><![CDATA[smart meters]]></category>
		<category><![CDATA[stealth attacks]]></category>
		<category><![CDATA[TBK DVRs]]></category>
		<category><![CDATA[Telegram attacks]]></category>
		<category><![CDATA[website control]]></category>
		<category><![CDATA[Xu Zewei]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31849</guid>

					<description><![CDATA[Scammers Are Ready to Strike as Amazon Prime Day Begins Tomorrow,
New Malware Turns Security Devices Into Silent Weapons for Cyber Attacks,
AI Bots Face a Toll as Cloudflare Makes Them Pay to Scrape Websites ...this and more in AofE  #408<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow&amp;action_name=%23AxisOfEasy%20408%3A%20Scammers%20Are%20Ready%20To%20Strike%20As%20Amazon%20Prime%20Day%20Begins%20Tomorrow&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/?pk_campaign=feed&#038;pk_kwd=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 403: Meta And Yandex Caught Spying On Millions Of Android Users Without Consent</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-403-meta-and-yandex-caught-spying-on-millions-of-android-users-without-consent/?pk_campaign=feed&#038;pk_kwd=axisofeasy-403-meta-and-yandex-caught-spying-on-millions-of-android-users-without-consent&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-403-meta-and-yandex-caught-spying-on-millions-of-android-users-without-consent</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-403-meta-and-yandex-caught-spying-on-millions-of-android-users-without-consent/?pk_campaign=feed&#038;pk_kwd=axisofeasy-403-meta-and-yandex-caught-spying-on-millions-of-android-users-without-consent#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 06 Jun 2025 22:00:29 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age checks]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI fraud]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[app store regulation]]></category>
		<category><![CDATA[app tracking]]></category>
		<category><![CDATA[Bill C-2]]></category>
		<category><![CDATA[Bill S-209]]></category>
		<category><![CDATA[Brave]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Builder AI]]></category>
		<category><![CDATA[Canada Post]]></category>
		<category><![CDATA[Canadian Senate]]></category>
		<category><![CDATA[Cartier]]></category>
		<category><![CDATA[cash ban]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[client exposure]]></category>
		<category><![CDATA[compliance failure]]></category>
		<category><![CDATA[Crocodilus]]></category>
		<category><![CDATA[Cronguard]]></category>
		<category><![CDATA[Cronly]]></category>
		<category><![CDATA[CrowdStrike]]></category>
		<category><![CDATA[crypto theft]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[data sharing]]></category>
		<category><![CDATA[digital ID]]></category>
		<category><![CDATA[digital trust]]></category>
		<category><![CDATA[DuckDuckGo]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[fake AI]]></category>
		<category><![CDATA[fake DocuSign]]></category>
		<category><![CDATA[federal database]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[internal bug]]></category>
		<category><![CDATA[investor deception]]></category>
		<category><![CDATA[ISP blocking]]></category>
		<category><![CDATA[ISP data tapping]]></category>
		<category><![CDATA[Mainstreet Bank]]></category>
		<category><![CDATA[manual coding]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[Meta Pixel]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[North Face]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[Palantir]]></category>
		<category><![CDATA[parental consent]]></category>
		<category><![CDATA[payment card leak]]></category>
		<category><![CDATA[Peter Thiel]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[platform controls]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Risks]]></category>
		<category><![CDATA[Qatar Investment Authority]]></category>
		<category><![CDATA[retail cyberattacks]]></category>
		<category><![CDATA[sandbox breach]]></category>
		<category><![CDATA[SoftBank]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Strong Borders Act]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[surveillance law]]></category>
		<category><![CDATA[surveillance state]]></category>
		<category><![CDATA[Texas law]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[Vanta]]></category>
		<category><![CDATA[VPN bypass]]></category>
		<category><![CDATA[Yandex]]></category>
		<category><![CDATA[Yandex Metrica]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31638</guid>

					<description><![CDATA[Meta and Yandex Caught Spying on Millions of Android Users Without Consent,
Texas Just Made This Move That Will Change How You Download Apps Forever,
Canada’s New Internet Bill Could Break the Web and Still Fail to Protect Kids.. this and more in AofE  #403<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-403-meta-and-yandex-caught-spying-on-millions-of-android-users-without-consent%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-403-meta-and-yandex-caught-spying-on-millions-of-android-users-without-consent&amp;action_name=%23AxisOfEasy%20403%3A%20Meta%20And%20Yandex%20Caught%20Spying%20On%20Millions%20Of%20Android%20Users%20Without%20Consent&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-403-meta-and-yandex-caught-spying-on-millions-of-android-users-without-consent/?pk_campaign=feed&#038;pk_kwd=axisofeasy-403-meta-and-yandex-caught-spying-on-millions-of-android-users-without-consent/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
