<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>identity theft</title>
	<atom:link href="https://axisofeasy.com/tag/identity-theft/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 01 May 2026 15:37:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>identity theft</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 448: Toronto Police Bust Canada&#8217;s First SMS Blaster Cybercrime Operation</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 01 May 2026 22:00:42 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI-driven hacking]]></category>
		<category><![CDATA[API key theft]]></category>
		<category><![CDATA[attack surface]]></category>
		<category><![CDATA[automated exploitation]]></category>
		<category><![CDATA[BigQuery]]></category>
		<category><![CDATA[Bitwarden CLI]]></category>
		<category><![CDATA[BlueNoroff]]></category>
		<category><![CDATA[Cisco exploits]]></category>
		<category><![CDATA[code analysis]]></category>
		<category><![CDATA[Context.ai]]></category>
		<category><![CDATA[CopyFail]]></category>
		<category><![CDATA[cPanel exploit]]></category>
		<category><![CDATA[CrowdStrike LogScale]]></category>
		<category><![CDATA[crypto phishing]]></category>
		<category><![CDATA[CVE-2026-31431]]></category>
		<category><![CDATA[CVE-2026-40050]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[cybercrime arrests]]></category>
		<category><![CDATA[cybersecurity crisis]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[Data Leaks]]></category>
		<category><![CDATA[deepfake attacks]]></category>
		<category><![CDATA[defensive security]]></category>
		<category><![CDATA[fake CAPTCHA]]></category>
		<category><![CDATA[fake cell towers]]></category>
		<category><![CDATA[FIRESTARTER malware]]></category>
		<category><![CDATA[Google Workspace compromise]]></category>
		<category><![CDATA[identity takeover]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[incident response]]></category>
		<category><![CDATA[infostealer malware]]></category>
		<category><![CDATA[infrastructure security]]></category>
		<category><![CDATA[kernel security]]></category>
		<category><![CDATA[KeygraphHQ]]></category>
		<category><![CDATA[Lazarus Group]]></category>
		<category><![CDATA[Linux vulnerability]]></category>
		<category><![CDATA[LiteLLM vulnerability]]></category>
		<category><![CDATA[local user compromise]]></category>
		<category><![CDATA[Lumma Stealer]]></category>
		<category><![CDATA[Microsoft Entra ID]]></category>
		<category><![CDATA[Microsoft Exchange attacks]]></category>
		<category><![CDATA[North Korea hackers]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[path traversal]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[PowerShell C2]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[PyPI compromise]]></category>
		<category><![CDATA[remote access trojan]]></category>
		<category><![CDATA[remote admin access]]></category>
		<category><![CDATA[root exploit]]></category>
		<category><![CDATA[Salesforce breaches]]></category>
		<category><![CDATA[server security]]></category>
		<category><![CDATA[shadow IT]]></category>
		<category><![CDATA[Shannon tool]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[SIEM security]]></category>
		<category><![CDATA[smishing attacks]]></category>
		<category><![CDATA[SMS blaster]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[telecom interception]]></category>
		<category><![CDATA[third-party risk]]></category>
		<category><![CDATA[Toronto Police]]></category>
		<category><![CDATA[unauthenticated access]]></category>
		<category><![CDATA[Vercel breach]]></category>
		<category><![CDATA[Vidar infostealer]]></category>
		<category><![CDATA[vulnerability patching]]></category>
		<category><![CDATA[WHM authentication bypass]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33800</guid>

					<description><![CDATA[Toronto Police Bust Canada's First SMS Blaster Cybercrime Operation,
CrowdStrike Patches Critical LogScale Vulnerability Allowing Unauthenticated File Access,
Vercel Breach Traced to Roblox-Seeking "Patient Zero" at Context.ai ... this and more in AofE  #448<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation&amp;action_name=%23AxisOfEasy%20448%3A%20Toronto%20Police%20Bust%20Canada%26%238217%3Bs%20First%20SMS%20Blaster%20Cybercrime%20Operation&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 438: Apple Patches Actively Exploited Zero-Day Across Devices</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices/?pk_campaign=feed&#038;pk_kwd=axisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices/?pk_campaign=feed&#038;pk_kwd=axisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 20 Feb 2026 23:00:47 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Account Takeover]]></category>
		<category><![CDATA[AI Tool Ban]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple Security Updates]]></category>
		<category><![CDATA[Apryse Security Flaws]]></category>
		<category><![CDATA[arbitrary code execution]]></category>
		<category><![CDATA[Automatic Updates]]></category>
		<category><![CDATA[Behavioral Data]]></category>
		<category><![CDATA[BleepingComputer]]></category>
		<category><![CDATA[Bypassed DLP]]></category>
		<category><![CDATA[Confidential Emails]]></category>
		<category><![CDATA[Copilot Bug]]></category>
		<category><![CDATA[Copyright Act 2012]]></category>
		<category><![CDATA[Counterfeit IDs]]></category>
		<category><![CDATA[Credit Card Fraud]]></category>
		<category><![CDATA[Cryptojacking]]></category>
		<category><![CDATA[CVE-2026-20700]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data loss prevention]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Transfers to China]]></category>
		<category><![CDATA[Device Security Policy]]></category>
		<category><![CDATA[DOJ Data Security Program]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[European Parliament]]></category>
		<category><![CDATA[Extension Security]]></category>
		<category><![CDATA[Fake ID Lab]]></category>
		<category><![CDATA[Federal Court Ruling]]></category>
		<category><![CDATA[Forensic Investigation]]></category>
		<category><![CDATA[Foxit Vulnerabilities]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[iOS 26.3]]></category>
		<category><![CDATA[Lenovo Lawsuit]]></category>
		<category><![CDATA[lockdown mode]]></category>
		<category><![CDATA[macOS Tahoe]]></category>
		<category><![CDATA[Malwarebytes]]></category>
		<category><![CDATA[Media Subscriptions]]></category>
		<category><![CDATA[memory corruption]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[Monero Miner]]></category>
		<category><![CDATA[Montreal Crime]]></category>
		<category><![CDATA[Parks Canada]]></category>
		<category><![CDATA[Password Sharing]]></category>
		<category><![CDATA[phishing campaign]]></category>
		<category><![CDATA[Pirated Software]]></category>
		<category><![CDATA[public interest]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[ScreenConnect Hijacking]]></category>
		<category><![CDATA[software supply chain]]></category>
		<category><![CDATA[SSA Impersonation]]></category>
		<category><![CDATA[stolen identities]]></category>
		<category><![CDATA[Sûreté du Québec]]></category>
		<category><![CDATA[Surveillance Concerns]]></category>
		<category><![CDATA[The Register]]></category>
		<category><![CDATA[VS Code Vulnerabilities]]></category>
		<category><![CDATA[Website Trackers]]></category>
		<category><![CDATA[Windows Security]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33221</guid>

					<description><![CDATA[Apple Patches Actively Exploited Zero-Day Across Devices,
Montreal Fake ID Lab Busted, Thousands of Identities Stolen,
Microsoft 365 Copilot Bug Summarizes Confidential Emails... this and more in AofE  #438<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices&amp;action_name=%23AxisOfEasy%20438%3A%20Apple%20Patches%20Actively%20Exploited%20Zero-Day%20Across%20Devices&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices/?pk_campaign=feed&#038;pk_kwd=axisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 430: Trump Administration Plans Mandatory Social Media And Family Data For Foreign Visitors</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors/?pk_campaign=feed&#038;pk_kwd=axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors/?pk_campaign=feed&#038;pk_kwd=axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 12 Dec 2025 23:00:39 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[.NET RCE]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[border security]]></category>
		<category><![CDATA[BRICKSTORM malware]]></category>
		<category><![CDATA[Chinese hackers]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[cloudflare outage]]></category>
		<category><![CDATA[conservative party of canada]]></category>
		<category><![CDATA[credit monitoring]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[customer data exposure]]></category>
		<category><![CDATA[CVE-2025-55182]]></category>
		<category><![CDATA[cybersecurity incident]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data collection]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[developer security]]></category>
		<category><![CDATA[DLL hijacking]]></category>
		<category><![CDATA[DPRK tooling]]></category>
		<category><![CDATA[Election Security.]]></category>
		<category><![CDATA[enterprise vulnerabilities]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ESTA]]></category>
		<category><![CDATA[Ethereum C2]]></category>
		<category><![CDATA[EtherRAT]]></category>
		<category><![CDATA[Fortinet SSO flaw]]></category>
		<category><![CDATA[global cyber threats]]></category>
		<category><![CDATA[government overreach]]></category>
		<category><![CDATA[HTTP traffic disruption]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[internet reliability]]></category>
		<category><![CDATA[law enforcement investigation]]></category>
		<category><![CDATA[Lua]]></category>
		<category><![CDATA[malicious plugins]]></category>
		<category><![CDATA[malware campaigns]]></category>
		<category><![CDATA[medical record breach]]></category>
		<category><![CDATA[Next.js]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[npm malware]]></category>
		<category><![CDATA[online surveillance]]></category>
		<category><![CDATA[open-source security]]></category>
		<category><![CDATA[persistent threats]]></category>
		<category><![CDATA[political cybersecurity]]></category>
		<category><![CDATA[PowerShell malware]]></category>
		<category><![CDATA[privacy invasion]]></category>
		<category><![CDATA[React Server Components]]></category>
		<category><![CDATA[React2Shell]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Rust malware]]></category>
		<category><![CDATA[Rust proxy]]></category>
		<category><![CDATA[social media monitoring]]></category>
		<category><![CDATA[state-sponsored cyber attacks]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[travel surveillance]]></category>
		<category><![CDATA[trump administration]]></category>
		<category><![CDATA[unpatched vulnerabilities]]></category>
		<category><![CDATA[visa waiver program]]></category>
		<category><![CDATA[VMware vSphere]]></category>
		<category><![CDATA[VS Code extensions]]></category>
		<category><![CDATA[WAF]]></category>
		<category><![CDATA[web infrastructure]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32811</guid>

					<description><![CDATA[Trump Administration Plans Mandatory Social Media and Family Data for Foreign Visitors,
Yet Another Cloudflare Outage (YATO),
Conservative Party of Canada Faces Major Cybersecurity Breach Affecting Hundreds of Candidates... this and more in AofE  #430<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors&amp;action_name=%23AxisOfEasy%20430%3A%20Trump%20Administration%20Plans%20Mandatory%20Social%20Media%20And%20Family%20Data%20For%20Foreign%20Visitors&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors/?pk_campaign=feed&#038;pk_kwd=axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 411: RBC Debanks Toronto Lawyer Representing Freedom Convoy Defendants</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants/?pk_campaign=feed&#038;pk_kwd=axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants/?pk_campaign=feed&#038;pk_kwd=axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 01 Aug 2025 22:00:34 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[4Chan]]></category>
		<category><![CDATA[Allianz]]></category>
		<category><![CDATA[AnyDesk]]></category>
		<category><![CDATA[Bill C-2]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[BlackSuit]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Chaos ransomware]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[civil rights]]></category>
		<category><![CDATA[Clorox]]></category>
		<category><![CDATA[CLOUD Act]]></category>
		<category><![CDATA[Cognizant]]></category>
		<category><![CDATA[crypto ransom]]></category>
		<category><![CDATA[CSIS]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data sharing]]></category>
		<category><![CDATA[debanking]]></category>
		<category><![CDATA[Elasticsearch]]></category>
		<category><![CDATA[Emergencies Act]]></category>
		<category><![CDATA[Eva Chipiuk]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[Freedom Convoy]]></category>
		<category><![CDATA[government IDs]]></category>
		<category><![CDATA[hacker forum]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[lawsuit]]></category>
		<category><![CDATA[Leak Zone]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[multithreaded encryption]]></category>
		<category><![CDATA[NAS]]></category>
		<category><![CDATA[negligence]]></category>
		<category><![CDATA[Operation Checkmate]]></category>
		<category><![CDATA[OpSec failure]]></category>
		<category><![CDATA[Orange]]></category>
		<category><![CDATA[password reset]]></category>
		<category><![CDATA[Patriot Act]]></category>
		<category><![CDATA[Pentagon]]></category>
		<category><![CDATA[plugin vulnerability]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Quick Assist]]></category>
		<category><![CDATA[RBC]]></category>
		<category><![CDATA[risk tolerance]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[selfies]]></category>
		<category><![CDATA[Shakepay]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Tea app]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[UpGuard]]></category>
		<category><![CDATA[vendor breach]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[warrantless access]]></category>
		<category><![CDATA[WordPress]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31973</guid>

					<description><![CDATA[RBC Debanks Toronto lawyer representing Freedom Convoy defendants,
Thousands of Women's IDs and Selfies Leaked from Viral App in Massive Hack,
Clorox Blames $380 Million Cyberattack on IT Giant After Shocking Mistake ...this and more in AofE  #411 <img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants&amp;action_name=%23AxisOfEasy%20411%3A%20RBC%20Debanks%20Toronto%20Lawyer%20Representing%20Freedom%20Convoy%20Defendants&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants/?pk_campaign=feed&#038;pk_kwd=axisofeasy-411-rbc-debanks-toronto-lawyer-representing-freedom-convoy-defendants/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 408: Scammers Are Ready To Strike As Amazon Prime Day Begins Tomorrow</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/?pk_campaign=feed&#038;pk_kwd=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/?pk_campaign=feed&#038;pk_kwd=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 11 Jul 2025 22:00:17 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[130 vulnerabilities]]></category>
		<category><![CDATA[AI bots]]></category>
		<category><![CDATA[AI malware]]></category>
		<category><![CDATA[Amazon Prime Day]]></category>
		<category><![CDATA[AMOS]]></category>
		<category><![CDATA[Apple Keychain]]></category>
		<category><![CDATA[Bill C-63]]></category>
		<category><![CDATA[bot blocking]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[browser data theft]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship law]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Chinese hacker]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[content monetization]]></category>
		<category><![CDATA[COVID research theft]]></category>
		<category><![CDATA[crypto users]]></category>
		<category><![CDATA[CVE-2024-12856]]></category>
		<category><![CDATA[CVE-2024-3721]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[data scraping]]></category>
		<category><![CDATA[DDoS attacks]]></category>
		<category><![CDATA[email fraud]]></category>
		<category><![CDATA[encrypted malware]]></category>
		<category><![CDATA[fake domains]]></category>
		<category><![CDATA[fake Zoom invites]]></category>
		<category><![CDATA[firmware vulnerabilities]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[Four-Faith routers]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[government overreach]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[internet restrictions]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[macOS backdoor]]></category>
		<category><![CDATA[macOS malware]]></category>
		<category><![CDATA[Mark Carney]]></category>
		<category><![CDATA[Matthew Prince]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Defender evasion]]></category>
		<category><![CDATA[Minecraft disguise]]></category>
		<category><![CDATA[NimDoor]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Nova Scotia Power]]></category>
		<category><![CDATA[Online Harms Bill]]></category>
		<category><![CDATA[password theft]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[pay-per-crawl]]></category>
		<category><![CDATA[permission-first model]]></category>
		<category><![CDATA[persistent threats]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[proxy devices]]></category>
		<category><![CDATA[RondoDox]]></category>
		<category><![CDATA[Russian hackers]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[SentinelOne]]></category>
		<category><![CDATA[smart meters]]></category>
		<category><![CDATA[stealth attacks]]></category>
		<category><![CDATA[TBK DVRs]]></category>
		<category><![CDATA[Telegram attacks]]></category>
		<category><![CDATA[website control]]></category>
		<category><![CDATA[Xu Zewei]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31849</guid>

					<description><![CDATA[Scammers Are Ready to Strike as Amazon Prime Day Begins Tomorrow,
New Malware Turns Security Devices Into Silent Weapons for Cyber Attacks,
AI Bots Face a Toll as Cloudflare Makes Them Pay to Scrape Websites ...this and more in AofE  #408<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow&amp;action_name=%23AxisOfEasy%20408%3A%20Scammers%20Are%20Ready%20To%20Strike%20As%20Amazon%20Prime%20Day%20Begins%20Tomorrow&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/?pk_campaign=feed&#038;pk_kwd=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 407: Brazil Holds Tech Platforms Liable For User Content In Landmark Ruling</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling/?pk_campaign=feed&#038;pk_kwd=axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling/?pk_campaign=feed&#038;pk_kwd=axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 04 Jul 2025 22:00:46 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Aeza Group]]></category>
		<category><![CDATA[airline breach]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[API vulnerability]]></category>
		<category><![CDATA[Blind Eagle]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[bulletproof hosting]]></category>
		<category><![CDATA[Call Center]]></category>
		<category><![CDATA[Catwatchful]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cold wallets]]></category>
		<category><![CDATA[content moderation]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[crypto theft]]></category>
		<category><![CDATA[CSV]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[digital surveillance]]></category>
		<category><![CDATA[G_mic]]></category>
		<category><![CDATA[geolocation data]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Firebase]]></category>
		<category><![CDATA[hate speech]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[identity verification]]></category>
		<category><![CDATA[JSON]]></category>
		<category><![CDATA[legal compliance]]></category>
		<category><![CDATA[Mailchimp]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Nim malware]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Omar Soca Charcov]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing attack]]></category>
		<category><![CDATA[platform liability]]></category>
		<category><![CDATA[political speech]]></category>
		<category><![CDATA[Proton66]]></category>
		<category><![CDATA[Qantas]]></category>
		<category><![CDATA[sanctions]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[seed phrase]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Stalkerware]]></category>
		<category><![CDATA[support system abuse]]></category>
		<category><![CDATA[Supreme Court]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[systemic failure]]></category>
		<category><![CDATA[T-Mobile]]></category>
		<category><![CDATA[third-party risk]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[Trezor]]></category>
		<category><![CDATA[Verizon]]></category>
		<category><![CDATA[Web3]]></category>
		<category><![CDATA[X]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31786</guid>

					<description><![CDATA[Brazil Holds Tech Platforms Liable for User Content in Landmark Ruling,
Catwatchful Breach Exposes Stalkerware Users, Victims, and Developer,
Verizon and T-Mobile Customer Data Breach Exposes 116 Million Records for Sale in 2025 Leak ...this and more in AofE  #407<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling&amp;action_name=%23AxisOfEasy%20407%3A%20Brazil%20Holds%20Tech%20Platforms%20Liable%20For%20User%20Content%20In%20Landmark%20Ruling&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling/?pk_campaign=feed&#038;pk_kwd=axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 405: Senate Bill Could Kill Private Messaging And Put Your Privacy At Risk</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 20 Jun 2025 22:00:22 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[algorithmic control]]></category>
		<category><![CDATA[Bill C-4]]></category>
		<category><![CDATA[CBDCs]]></category>
		<category><![CDATA[Child Exploitation]]></category>
		<category><![CDATA[Cloud Services]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[federal privacy law]]></category>
		<category><![CDATA[Google Threat Intelligence]]></category>
		<category><![CDATA[government regulation]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[legal liability]]></category>
		<category><![CDATA[Linux vulnerabilities]]></category>
		<category><![CDATA[messaging apps]]></category>
		<category><![CDATA[Metadata]]></category>
		<category><![CDATA[MFA bypass]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PIPEDA]]></category>
		<category><![CDATA[policy rollback]]></category>
		<category><![CDATA[political parties]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[Section 230]]></category>
		<category><![CDATA[SMS spam]]></category>
		<category><![CDATA[social credit]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[STOP CSAM Act]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[WormGPT]]></category>
		<category><![CDATA[Zoomcar]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31714</guid>

					<description><![CDATA[Senate Bill Could Kill Private Messaging and Put Your Privacy at Risk,
Trump Just Gutted Major Cybersecurity Rules and Experts Are Sounding the Alarm,
Hackers Are Now Tricking IT Teams at Big Insurance Firms and Google Is Warning Everyone...this and more in AofE  #405<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk&amp;action_name=%23AxisOfEasy%20405%3A%20Senate%20Bill%20Could%20Kill%20Private%20Messaging%20And%20Put%20Your%20Privacy%20At%20Risk&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/?pk_campaign=feed&#038;pk_kwd=axisofeasy-405-senate-bill-could-kill-private-messaging-and-put-your-privacy-at-risk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 400: North Korean Hackers Infiltrate U.S. Tech Jobs With Fake Identities And Remote Access</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 16 May 2025 22:00:57 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[account compromise]]></category>
		<category><![CDATA[Albania]]></category>
		<category><![CDATA[AnyDesk]]></category>
		<category><![CDATA[Baby Box Info]]></category>
		<category><![CDATA[Belgium]]></category>
		<category><![CDATA[birthdate]]></category>
		<category><![CDATA[breach detection]]></category>
		<category><![CDATA[breach monetization]]></category>
		<category><![CDATA[call centers]]></category>
		<category><![CDATA[Co-Op]]></category>
		<category><![CDATA[compromised credentials]]></category>
		<category><![CDATA[coordinated raids]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[Cubix Tech US]]></category>
		<category><![CDATA[Customer Data Breach]]></category>
		<category><![CDATA[cyber fraud]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybercrime ring]]></category>
		<category><![CDATA[cybercrime statistics]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity response]]></category>
		<category><![CDATA[Cyprus]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[decryption mandate]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[Digital Safety]]></category>
		<category><![CDATA[DOJ indictment]]></category>
		<category><![CDATA[DPRK]]></category>
		<category><![CDATA[DragonForce]]></category>
		<category><![CDATA[Dubai]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[electronic seizures]]></category>
		<category><![CDATA[electronics shipping]]></category>
		<category><![CDATA[encryption backdoor]]></category>
		<category><![CDATA[encryption debate]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[English-Korean]]></category>
		<category><![CDATA[Eurojust]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[fake identities]]></category>
		<category><![CDATA[fake investment schemes]]></category>
		<category><![CDATA[fake resumes]]></category>
		<category><![CDATA[FBI report]]></category>
		<category><![CDATA[financial fraud]]></category>
		<category><![CDATA[Flashpoint]]></category>
		<category><![CDATA[Florida bill]]></category>
		<category><![CDATA[fraud prosecution]]></category>
		<category><![CDATA[fraudulent employment]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Google Translate]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Harrods]]></category>
		<category><![CDATA[Helix US]]></category>
		<category><![CDATA[home address]]></category>
		<category><![CDATA[HR verification scripts]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[incident disclosure]]></category>
		<category><![CDATA[infostealer logs]]></category>
		<category><![CDATA[internal hierarchy]]></category>
		<category><![CDATA[international operation]]></category>
		<category><![CDATA[investment fraud]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[job references]]></category>
		<category><![CDATA[jsilver617]]></category>
		<category><![CDATA[judicial oversight]]></category>
		<category><![CDATA[Lahore Pakistan]]></category>
		<category><![CDATA[Latvia]]></category>
		<category><![CDATA[law enforcement access]]></category>
		<category><![CDATA[legislative overreach]]></category>
		<category><![CDATA[London Stock Exchange update]]></category>
		<category><![CDATA[M&S]]></category>
		<category><![CDATA[Marks and Spencer]]></category>
		<category><![CDATA[minors online safety]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[Nickel Tapestry]]></category>
		<category><![CDATA[NIgeria]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[online gaming]]></category>
		<category><![CDATA[online orders]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[online shopping]]></category>
		<category><![CDATA[OTP codes]]></category>
		<category><![CDATA[password change]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[password reset]]></category>
		<category><![CDATA[password theft]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[phishing risk]]></category>
		<category><![CDATA[phishing risks]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[phone numbers]]></category>
		<category><![CDATA[pig butchering scam]]></category>
		<category><![CDATA[platform security]]></category>
		<category><![CDATA[platform vulnerability]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[professionalized hacking]]></category>
		<category><![CDATA[profit dashboard]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware-as-a-service]]></category>
		<category><![CDATA[remote access]]></category>
		<category><![CDATA[retail cybersecurity]]></category>
		<category><![CDATA[scam brokers]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Steam]]></category>
		<category><![CDATA[stolen identities]]></category>
		<category><![CDATA[subpoena access]]></category>
		<category><![CDATA[surveillance tools]]></category>
		<category><![CDATA[tech legislation]]></category>
		<category><![CDATA[Two-Factor Authentication]]></category>
		<category><![CDATA[U.S. infrastructure infiltration]]></category>
		<category><![CDATA[U.S. tech jobs]]></category>
		<category><![CDATA[UK retailers]]></category>
		<category><![CDATA[user accounts]]></category>
		<category><![CDATA[user privacy]]></category>
		<category><![CDATA[Valve]]></category>
		<category><![CDATA[victim grooming]]></category>
		<category><![CDATA[webcam avoidance]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31552</guid>

					<description><![CDATA[North Korean Hackers Infiltrate U.S. Tech Jobs with Fake Identities and Remote Access,
Steam Breach Exposes 89 Million Accounts in Dark Web Data Sale, 
Marks and Spencer Cyberattack Exposes Customer Data and Halts Online Orders (update from AoE #397)... this and more in AofE  #400<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access&amp;action_name=%23AxisOfEasy%20400%3A%20North%20Korean%20Hackers%20Infiltrate%20U.S.%20Tech%20Jobs%20With%20Fake%20Identities%20And%20Remote%20Access&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 396: Google Got Your Health Info Without You Knowing, And Here&#8217;s What Happened</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened/?pk_campaign=feed&#038;pk_kwd=axisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened/?pk_campaign=feed&#038;pk_kwd=axisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 18 Apr 2025 22:00:18 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[4chan hack]]></category>
		<category><![CDATA[admin leak]]></category>
		<category><![CDATA[AI fraud]]></category>
		<category><![CDATA[AI vulnerability]]></category>
		<category><![CDATA[anonymity]]></category>
		<category><![CDATA[Blue Shield]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chinese hackers]]></category>
		<category><![CDATA[Cl0p]]></category>
		<category><![CDATA[Cleo hack]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[crypto theft]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[DoJ]]></category>
		<category><![CDATA[EU diplomats]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Ads]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[healthcare data]]></category>
		<category><![CDATA[Hertz]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[human labor]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[imageboard]]></category>
		<category><![CDATA[investor fraud]]></category>
		<category><![CDATA[LinkedIn scams]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Nate app]]></category>
		<category><![CDATA[North Korean Hackers]]></category>
		<category><![CDATA[NVidia]]></category>
		<category><![CDATA[open-source tools]]></category>
		<category><![CDATA[patient information]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Russian hackers]]></category>
		<category><![CDATA[shopping app]]></category>
		<category><![CDATA[Snowlight]]></category>
		<category><![CDATA[UK data leak]]></category>
		<category><![CDATA[UNC5174]]></category>
		<category><![CDATA[US spies]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31413</guid>

					<description><![CDATA[Google Got Your Health Info Without You Knowing, and Here's What Happened,
Massive Hertz Data Leak Revealed, and It's Worse Than You Think,
Nate CEO Charged After AI Shopping App Found to Rely on Human Labor... this and more in AofE  #396<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened&amp;action_name=%23AxisOfEasy%20396%3A%20Google%20Got%20Your%20Health%20Info%20Without%20You%20Knowing%2C%20And%20Here%26%238217%3Bs%20What%20Happened&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened/?pk_campaign=feed&#038;pk_kwd=axisofeasy-396-google-got-your-health-info-without-you-knowing-and-heres-what-happened/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
	</channel>
</rss>
