<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>hacking</title>
	<atom:link href="https://axisofeasy.com/tag/hacking/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 23 Jan 2026 18:55:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>hacking</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisofEasy 434: Ireland Moves To Expand Digital Surveillance Powers</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 23 Jan 2026 23:00:52 +0000</pubDate>
				<category><![CDATA[AI malware]]></category>
		<category><![CDATA[Biometric Verification]]></category>
		<category><![CDATA[calendar vulnerability]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[cybersecurity update]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[digital ID]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Google Gemini]]></category>
		<category><![CDATA[government data breach]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Ireland surveillance bill]]></category>
		<category><![CDATA[KOSMA bill]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Concerns]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security threats]]></category>
		<category><![CDATA[social media age verification]]></category>
		<category><![CDATA[Supreme Court hack]]></category>
		<category><![CDATA[tech news]]></category>
		<category><![CDATA[VoidLink]]></category>
		<category><![CDATA[weekly security news]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=33022</guid>

					<description><![CDATA[Ireland ramps up surveillance powers while AI builds malware in days. KOSMA demands digital ID age checks. Google Gemini flaw exposes calendars. Supreme Court hacked. Your privacy under attack.<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers%2F&amp;action_name=%23AxisofEasy%20434%3A%20Ireland%20Moves%20To%20Expand%20Digital%20Surveillance%20Powers&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 427: Cloudflare’s Internal Failure Briefly Turns The Internet’s Biggest Platforms Dark</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark/?pk_campaign=feed&#038;pk_kwd=axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark/?pk_campaign=feed&#038;pk_kwd=axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 21 Nov 2025 23:00:45 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[7-Zip]]></category>
		<category><![CDATA[AI-driven cyberattack]]></category>
		<category><![CDATA[Ariantel]]></category>
		<category><![CDATA[autonomous hacking]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[Blockchain.com]]></category>
		<category><![CDATA[Bot Management System]]></category>
		<category><![CDATA[centralized infrastructure]]></category>
		<category><![CDATA[Chat]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Chinese state actors]]></category>
		<category><![CDATA[CIPA]]></category>
		<category><![CDATA[Citizen Lab]]></category>
		<category><![CDATA[Cl0p ransomware]]></category>
		<category><![CDATA[Claude Code]]></category>
		<category><![CDATA[cloud DDoS attack]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[Coinbase]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data access]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[database error]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[DDoSecrets]]></category>
		<category><![CDATA[decentralization]]></category>
		<category><![CDATA[deceptive practices]]></category>
		<category><![CDATA[deep packet inspection]]></category>
		<category><![CDATA[DoorDash breach]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[Ethereum]]></category>
		<category><![CDATA[fake IT workers]]></category>
		<category><![CDATA[FIN11]]></category>
		<category><![CDATA[financial sector]]></category>
		<category><![CDATA[Freedom of Speech]]></category>
		<category><![CDATA[FTSE 100 credentials]]></category>
		<category><![CDATA[Gemini AI]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[internet outage]]></category>
		<category><![CDATA[Logitech]]></category>
		<category><![CDATA[Meet]]></category>
		<category><![CDATA[Model Context Protocol]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Oracle EBS]]></category>
		<category><![CDATA[political persecution]]></category>
		<category><![CDATA[privacy lawsuit]]></category>
		<category><![CDATA[Protei]]></category>
		<category><![CDATA[ransomware campaign]]></category>
		<category><![CDATA[RCE vulnerability]]></category>
		<category><![CDATA[SOC automation]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SORM]]></category>
		<category><![CDATA[Stored Communications Act]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[symbolic link exploit]]></category>
		<category><![CDATA[telecom interception]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Trustless Manifesto]]></category>
		<category><![CDATA[Venezuela]]></category>
		<category><![CDATA[vulnerability assessment]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[X]]></category>
		<category><![CDATA[Zero-day vulnerability]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32662</guid>

					<description><![CDATA[Cloudflare’s internal failure briefly turns the internet’s biggest platforms dark
Protei is hacked and its surveillance data spills into public view
AI runs most of a state-backed cyberattack and forces OpenAI to sound the alarm... this and more in AofE  #427<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark&amp;action_name=%23AxisOfEasy%20427%3A%20Cloudflare%E2%80%99s%20Internal%20Failure%20Briefly%20Turns%20The%20Internet%E2%80%99s%20Biggest%20Platforms%20Dark&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark/?pk_campaign=feed&#038;pk_kwd=axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 415: PromptLock Signals The Arrival Of AI Powered Ransomware</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 29 Aug 2025 22:00:33 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[4Chan]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI crimewave]]></category>
		<category><![CDATA[AI enhancements]]></category>
		<category><![CDATA[algorithmic mediation]]></category>
		<category><![CDATA[Android Trojan]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[authenticity]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Banks]]></category>
		<category><![CDATA[Base64]]></category>
		<category><![CDATA[Bill C-11]]></category>
		<category><![CDATA[Bill C-13]]></category>
		<category><![CDATA[bitcoin ransom]]></category>
		<category><![CDATA[Broadcasting Act]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Claude Code]]></category>
		<category><![CDATA[court case]]></category>
		<category><![CDATA[creator backlash]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[defense contractors]]></category>
		<category><![CDATA[EDR evasion]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[extraterritoriality]]></category>
		<category><![CDATA[Farmers Insurance]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[filename parsing]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[GoLang]]></category>
		<category><![CDATA[Google Pixel]]></category>
		<category><![CDATA[GPT-OSS]]></category>
		<category><![CDATA[guardrails]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hospitals]]></category>
		<category><![CDATA[hybrid cloud]]></category>
		<category><![CDATA[io_uring]]></category>
		<category><![CDATA[Kiwi Farms]]></category>
		<category><![CDATA[legislative error]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Netflix]]></category>
		<category><![CDATA[Ofcom]]></category>
		<category><![CDATA[Ollama]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PromptLock]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RingReaper]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[shell injection]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Shorts]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Storm-0501]]></category>
		<category><![CDATA[trust]]></category>
		<category><![CDATA[U.S. Constitution]]></category>
		<category><![CDATA[UNC5174]]></category>
		<category><![CDATA[VShell]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Youtube]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32136</guid>

					<description><![CDATA[PromptLock Signals the Arrival of AI Powered Ransomware,
Phishing Campaign Exploits Linux Filename Parsing to Deliver VShell Backdoor,
Government Error Erases Privacy Rights from Broadcasting Act ...this and more in AofE  #415<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware&amp;action_name=%23AxisOfEasy%20415%3A%20PromptLock%20Signals%20The%20Arrival%20Of%20AI%20Powered%20Ransomware&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 410: Can AI Chatbots Be Hacked Via DNS?</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/?pk_campaign=feed&#038;pk_kwd=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/?pk_campaign=feed&#038;pk_kwd=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 25 Jul 2025 22:00:59 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI agent]]></category>
		<category><![CDATA[AI chatbots]]></category>
		<category><![CDATA[AI fraud]]></category>
		<category><![CDATA[authentication keys]]></category>
		<category><![CDATA[autonomous agents]]></category>
		<category><![CDATA[bug bounty]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[cloud compromise]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[crypto mining]]></category>
		<category><![CDATA[CVE-2025-53770]]></category>
		<category><![CDATA[cybercrime forum]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity regulations]]></category>
		<category><![CDATA[database deletion]]></category>
		<category><![CDATA[debug code]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[Education Department]]></category>
		<category><![CDATA[ExpressVPN]]></category>
		<category><![CDATA[G5 portal]]></category>
		<category><![CDATA[Ghostwriter]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Hello Internet Corp]]></category>
		<category><![CDATA[Interlock ransomware]]></category>
		<category><![CDATA[IP address exposure]]></category>
		<category><![CDATA[JavaScript exfiltration]]></category>
		<category><![CDATA[lateral movement]]></category>
		<category><![CDATA[layoffs]]></category>
		<category><![CDATA[Magento]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[production error]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[RDP leak]]></category>
		<category><![CDATA[Replit]]></category>
		<category><![CDATA[SharePoint]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[txt records]]></category>
		<category><![CDATA[Ukraine arrest]]></category>
		<category><![CDATA[Vibe Coding Test]]></category>
		<category><![CDATA[voiceprint authentication]]></category>
		<category><![CDATA[VPN tunnel]]></category>
		<category><![CDATA[water utilities]]></category>
		<category><![CDATA[XSS.is]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31916</guid>

					<description><![CDATA[Can AI Chatbots Be Hacked Via DNS?
SharePoint Zero Day Exploit Hits U.S. Agencies and Exposes Microsoft’s Persistent Security Gaps
ExpressVPN Patch Fixes RDP Traffic Leak That Exposed User IP Addresses ...this and more in AofE  #410<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-410-can-ai-chatbots-be-hacked-via-dns%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-410-can-ai-chatbots-be-hacked-via-dns&amp;action_name=%23AxisOfEasy%20410%3A%20Can%20AI%20Chatbots%20Be%20Hacked%20Via%20DNS%3F&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/?pk_campaign=feed&#038;pk_kwd=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 409: Adoption Data Breach Exposes Sensitive Records From Texas Nonprofit</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 18 Jul 2025 22:00:04 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[access brokers]]></category>
		<category><![CDATA[Adoption]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AxisOfEasy]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[Black Basta]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[Bluesky]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[C2 infrastructure]]></category>
		<category><![CDATA[Chatbot]]></category>
		<category><![CDATA[child protection]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cloud misconfiguration]]></category>
		<category><![CDATA[CRM migration]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cypherpunk]]></category>
		<category><![CDATA[Cypherpunk movement]]></category>
		<category><![CDATA[Dark Reading]]></category>
		<category><![CDATA[data access]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data sovereignty]]></category>
		<category><![CDATA[data storage]]></category>
		<category><![CDATA[decentralization]]></category>
		<category><![CDATA[Decentralized systems]]></category>
		<category><![CDATA[deep learning]]></category>
		<category><![CDATA[Developing Countries]]></category>
		<category><![CDATA[Digital dystopia]]></category>
		<category><![CDATA[digital economy]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[digital resilience]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[documentation]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[ECC]]></category>
		<category><![CDATA[emerging markets]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Episource]]></category>
		<category><![CDATA[existential risk]]></category>
		<category><![CDATA[facial scanning]]></category>
		<category><![CDATA[financial innovation]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[GDDR6]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GPUhammer]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hardware security]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[HexEval]]></category>
		<category><![CDATA[in-memory execution]]></category>
		<category><![CDATA[internal tooling]]></category>
		<category><![CDATA[Internet freedom]]></category>
		<category><![CDATA[Irish DPC]]></category>
		<category><![CDATA[Kid Web Services]]></category>
		<category><![CDATA[leapfrogging]]></category>
		<category><![CDATA[LOLBin]]></category>
		<category><![CDATA[long-form content]]></category>
		<category><![CDATA[Louis Vuitton]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[malware-as-a-service]]></category>
		<category><![CDATA[Matanbuchus]]></category>
		<category><![CDATA[medical imaging]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Teams]]></category>
		<category><![CDATA[monetary fine]]></category>
		<category><![CDATA[monetary sovereignty]]></category>
		<category><![CDATA[nonprofit]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[NVidia]]></category>
		<category><![CDATA[online identity]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[patient data]]></category>
		<category><![CDATA[payload delivery]]></category>
		<category><![CDATA[payments infrastructure]]></category>
		<category><![CDATA[Peer-to-peer networks]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[retail]]></category>
		<category><![CDATA[reverse shell]]></category>
		<category><![CDATA[Rowhammer]]></category>
		<category><![CDATA[SMA 100]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[support automation]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tech philosophy]]></category>
		<category><![CDATA[technological foresight]]></category>
		<category><![CDATA[Texas]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[UK regulation]]></category>
		<category><![CDATA[Usenix]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Web3]]></category>
		<category><![CDATA[XORIndex]]></category>
		<category><![CDATA[zero-day]]></category>
		<category><![CDATA[Zero-Day Exploit]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31883</guid>

					<description><![CDATA[ Adoption Data Breach Exposes Sensitive Records from Texas Nonprofit,
Matanbuchus 3.0 Expands Stealth Tactics with Teams Lures and Advanced Loader Features,
Bluesky Implements UK Age Checks Amid Privacy Backlash Over Online Safety Law...this and more in AofE  #409<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&amp;action_name=%23AxisOfEasy%20409%3A%20Adoption%20Data%20Breach%20Exposes%20Sensitive%20Records%20From%20Texas%20Nonprofit&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 405: Senate Bill Could Kill Private Messaging And Put Your Privacy At Risk</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 20 Jun 2025 22:00:22 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[algorithmic control]]></category>
		<category><![CDATA[Bill C-4]]></category>
		<category><![CDATA[CBDCs]]></category>
		<category><![CDATA[Child Exploitation]]></category>
		<category><![CDATA[Cloud Services]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[federal privacy law]]></category>
		<category><![CDATA[Google Threat Intelligence]]></category>
		<category><![CDATA[government regulation]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[legal liability]]></category>
		<category><![CDATA[Linux vulnerabilities]]></category>
		<category><![CDATA[messaging apps]]></category>
		<category><![CDATA[Metadata]]></category>
		<category><![CDATA[MFA bypass]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PIPEDA]]></category>
		<category><![CDATA[policy rollback]]></category>
		<category><![CDATA[political parties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[Section 230]]></category>
		<category><![CDATA[SMS spam]]></category>
		<category><![CDATA[social credit]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[STOP CSAM Act]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[WormGPT]]></category>
		<category><![CDATA[Zoomcar]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31714</guid>

					<description><![CDATA[Senate Bill Could Kill Private Messaging and Put Your Privacy at Risk,
Trump Just Gutted Major Cybersecurity Rules and Experts Are Sounding the Alarm,
Hackers Are Now Tricking IT Teams at Big Insurance Firms and Google Is Warning Everyone...this and more in AofE  #405<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk&amp;action_name=%23AxisOfEasy%20405%3A%20Senate%20Bill%20Could%20Kill%20Private%20Messaging%20And%20Put%20Your%20Privacy%20At%20Risk&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 389: What Did You Get Done Last Week?</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-389-what-did-you-get-done-last-week/?pk_campaign=feed&#038;pk_kwd=axisofeasy-389-what-did-you-get-done-last-week&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-389-what-did-you-get-done-last-week</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-389-what-did-you-get-done-last-week/?pk_campaign=feed&#038;pk_kwd=axisofeasy-389-what-did-you-get-done-last-week#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 28 Feb 2025 23:00:56 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[AI censorship]]></category>
		<category><![CDATA[AI governance]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Asana]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[bullet journaling]]></category>
		<category><![CDATA[bureaucracy]]></category>
		<category><![CDATA[busywork]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chrystia Freeland]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity threats]]></category>
		<category><![CDATA[daily wins]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[digital privacy]]></category>
		<category><![CDATA[digital trust]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[efficiency]]></category>
		<category><![CDATA[election interference]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[gaming]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[goal setting]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[index cards]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Journalists]]></category>
		<category><![CDATA[Justin Trudeau]]></category>
		<category><![CDATA[leadership]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[LockBit]]></category>
		<category><![CDATA[Mark Jeftovic]]></category>
		<category><![CDATA[Omnifocus]]></category>
		<category><![CDATA[OmniGPT]]></category>
		<category><![CDATA[online scams]]></category>
		<category><![CDATA[Paragon]]></category>
		<category><![CDATA[personal development]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PlayStation Network]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[productivity]]></category>
		<category><![CDATA[project management]]></category>
		<category><![CDATA[PSN outage]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RAT malware]]></category>
		<category><![CDATA[sanctions]]></category>
		<category><![CDATA[self-improvement]]></category>
		<category><![CDATA[self-reflection]]></category>
		<category><![CDATA[SITE]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Sony]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[task tracking]]></category>
		<category><![CDATA[technology risks]]></category>
		<category><![CDATA[threat landscape]]></category>
		<category><![CDATA[time management]]></category>
		<category><![CDATA[U.K. government]]></category>
		<category><![CDATA[work habits]]></category>
		<category><![CDATA[work-from-home scams]]></category>
		<category><![CDATA[Zservers]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31143</guid>

					<description><![CDATA[What Did You Get Done Last Week? (From the desk of Mark Jeftovic, easyDNS CEO),
AI-Powered Phishing Scams: How Cybercriminals Use Deepfakes and Stolen Credentials to Hijack Accounts,
Private GitHub Repos Still Accessible via Microsoft Copilot, Security Firm Warns ... this and more in AofE  #389<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-389-what-did-you-get-done-last-week%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-389-what-did-you-get-done-last-week&amp;action_name=%23AxisOfEasy%20389%3A%20What%20Did%20You%20Get%20Done%20Last%20Week%3F&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-389-what-did-you-get-done-last-week/?pk_campaign=feed&#038;pk_kwd=axisofeasy-389-what-did-you-get-done-last-week/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 386: Trapped In A Scam Call Center A Young Worker’s Shocking Story</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-386-trapped-in-a-scam-call-center-a-young-workers-shocking-story/?pk_campaign=feed&#038;pk_kwd=axisofeasy-386-trapped-in-a-scam-call-center-a-young-workers-shocking-story&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-386-trapped-in-a-scam-call-center-a-young-workers-shocking-story</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-386-trapped-in-a-scam-call-center-a-young-workers-shocking-story/?pk_campaign=feed&#038;pk_kwd=axisofeasy-386-trapped-in-a-scam-call-center-a-young-workers-shocking-story#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 07 Feb 2025 23:00:49 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Account Takeovers]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Ethics]]></category>
		<category><![CDATA[AI Weapons]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[Banks]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[Compensation]]></category>
		<category><![CDATA[Contagious Interview]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DeFi Fraud]]></category>
		<category><![CDATA[Education Sector]]></category>
		<category><![CDATA[EU Disinformation]]></category>
		<category><![CDATA[Fake Interviews]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[ICE]]></category>
		<category><![CDATA[Italy]]></category>
		<category><![CDATA[Job Scams]]></category>
		<category><![CDATA[Mac Malware]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft Accounts]]></category>
		<category><![CDATA[Military AI]]></category>
		<category><![CDATA[North Korean Hackers]]></category>
		<category><![CDATA[Online Fraud]]></category>
		<category><![CDATA[Paragon Solutions]]></category>
		<category><![CDATA[Pentagon]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Pig Butchering]]></category>
		<category><![CDATA[Romance Scam]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[SentinelOne]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Surveillance Technology]]></category>
		<category><![CDATA[U.S. Government]]></category>
		<category><![CDATA[UK Law]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[XProtect]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=30970</guid>

					<description><![CDATA[Trapped in a Scam Call Center A Young Worker’s Shocking Story
Google Quietly Drops AI Weapons Pledge Amid Military Partnerships
Fake Job Interviews Spread New Mac Malware, Researchers Warn ... this and more in AofE  #386<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-386-trapped-in-a-scam-call-center-a-young-workers-shocking-story%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-386-trapped-in-a-scam-call-center-a-young-workers-shocking-story&amp;action_name=%23AxisOfEasy%20386%3A%20Trapped%20In%20A%20Scam%20Call%20Center%20A%20Young%20Worker%E2%80%99s%20Shocking%20Story&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-386-trapped-in-a-scam-call-center-a-young-workers-shocking-story/?pk_campaign=feed&#038;pk_kwd=axisofeasy-386-trapped-in-a-scam-call-center-a-young-workers-shocking-story/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 379: China Hacks US Telecom Giants In Massive Espionage Operation</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 06 Dec 2024 23:00:36 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[ASIC]]></category>
		<category><![CDATA[AT&T]]></category>
		<category><![CDATA[Bluesky]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[CALEA]]></category>
		<category><![CDATA[Campaign]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Computational Power]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[cyberespionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Digital Services Act]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[Encrypted Apps]]></category>
		<category><![CDATA[Encrypted Platforms]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Future Ventures]]></category>
		<category><![CDATA[GPU]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Jeff Greene]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[Lumen Technologies]]></category>
		<category><![CDATA[Matrix]]></category>
		<category><![CDATA[Metadata]]></category>
		<category><![CDATA[Moore’s Law]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<category><![CDATA[NVidia]]></category>
		<category><![CDATA[Operation]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Regulatory Compliance]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<category><![CDATA[Senator Ron Wyden]]></category>
		<category><![CDATA[signal]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Stephen Jurvetson]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Tech Regulation]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[Verizon]]></category>
		<category><![CDATA[VLOP]]></category>
		<category><![CDATA[Washington D.C.]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[X]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=30703</guid>

					<description><![CDATA[China Hacks US Telecom Giants in Massive Espionage Operation,
Bluesky Gains Traction Amid Political Shifts,
Matrix Exposed in Europol’s Operation Against Encrypted Platforms ... this and more in AofE  #379<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation&amp;action_name=%23AxisOfEasy%20379%3A%20China%20Hacks%20US%20Telecom%20Giants%20In%20Massive%20Espionage%20Operation&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 374: Google and Microsoft Clash Escalates: Allegations of Shadow Campaigns, Cloud Wars, and Regulatory Maneuvers</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-374-google-and-microsoft-clash-escalates-allegations-of-shadow-campaigns-cloud-wars-and-regulatory-maneuvers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-374-google-and-microsoft-clash-escalates-allegations-of-shadow-campaigns-cloud-wars-and-regulatory-maneuvers&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-374-google-and-microsoft-clash-escalates-allegations-of-shadow-campaigns-cloud-wars-and-regulatory-maneuvers</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-374-google-and-microsoft-clash-escalates-allegations-of-shadow-campaigns-cloud-wars-and-regulatory-maneuvers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-374-google-and-microsoft-clash-escalates-allegations-of-shadow-campaigns-cloud-wars-and-regulatory-maneuvers#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 01 Nov 2024 22:00:40 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[antitrust]]></category>
		<category><![CDATA[Canadian Revenue Agency]]></category>
		<category><![CDATA[Cloud Services]]></category>
		<category><![CDATA[Cloud Wars]]></category>
		<category><![CDATA[CloudScout]]></category>
		<category><![CDATA[Coalition for Fair Software Licensing]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Evasive Panda]]></category>
		<category><![CDATA[Global Law Enforcement]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Infostealer Networks]]></category>
		<category><![CDATA[ISP Attack]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Privacy Breaches.]]></category>
		<category><![CDATA[Regulatory Maneuvers]]></category>
		<category><![CDATA[Security Vulnerabilities]]></category>
		<category><![CDATA[Shadow Campaigns]]></category>
		<category><![CDATA[Tax Fraud]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=30537</guid>

					<description><![CDATA[Google and Microsoft Clash Escalates: Allegations of Shadow Campaigns, Cloud Wars, and Regulatory Maneuvers,
French ISP Breach Exposes 19 Million Records Amid Rising Cyber Threat,
Tax Scammers Exploit CRA Weaknesses, Millions Paid in Bogus Refunds ... this and more in AofE  #374<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-374-google-and-microsoft-clash-escalates-allegations-of-shadow-campaigns-cloud-wars-and-regulatory-maneuvers%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-374-google-and-microsoft-clash-escalates-allegations-of-shadow-campaigns-cloud-wars-and-regulatory-maneuvers&amp;action_name=%23AxisOfEasy%20374%3A%20Google%20and%20Microsoft%20Clash%20Escalates%3A%20Allegations%20of%20Shadow%20Campaigns%2C%20Cloud%20Wars%2C%20and%20Regulatory%20Maneuvers&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-374-google-and-microsoft-clash-escalates-allegations-of-shadow-campaigns-cloud-wars-and-regulatory-maneuvers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-374-google-and-microsoft-clash-escalates-allegations-of-shadow-campaigns-cloud-wars-and-regulatory-maneuvers/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
