<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>lateral movement</title>
	<atom:link href="https://axisofeasy.com/tag/lateral-movement/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 06 Feb 2026 20:07:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>lateral movement</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 436: OpenClaw And Moltbook: Inside The Rise Of Autonomous AI Agents</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents/?pk_campaign=feed&#038;pk_kwd=axisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents/?pk_campaign=feed&#038;pk_kwd=axisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 06 Feb 2026 23:00:15 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI agents]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[AI toys]]></category>
		<category><![CDATA[Amaranth Dragon]]></category>
		<category><![CDATA[APT groups]]></category>
		<category><![CDATA[APT28]]></category>
		<category><![CDATA[autonomous AI]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[bulletproof hosting]]></category>
		<category><![CDATA[CaMeL]]></category>
		<category><![CDATA[children’s data privacy]]></category>
		<category><![CDATA[Chinese threat actors]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[cloud exploitation]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[Critical vulnerabilities]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[DeepMind]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[government targeting]]></category>
		<category><![CDATA[hosting compromise]]></category>
		<category><![CDATA[Lambda]]></category>
		<category><![CDATA[lateral movement]]></category>
		<category><![CDATA[LLM security]]></category>
		<category><![CDATA[Looker]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[malware campaigns]]></category>
		<category><![CDATA[Moltbook]]></category>
		<category><![CDATA[nation-state attackers]]></category>
		<category><![CDATA[Notepad++]]></category>
		<category><![CDATA[Office vulnerability]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[OpenClaw]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RCE]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[S3]]></category>
		<category><![CDATA[SOCKS5 proxy]]></category>
		<category><![CDATA[software updates]]></category>
		<category><![CDATA[SQL injection]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[system automation]]></category>
		<category><![CDATA[SystemBC]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[Violet Typhoon]]></category>
		<category><![CDATA[vulnerability disclosure]]></category>
		<category><![CDATA[WinRAR exploit]]></category>
		<category><![CDATA[WordPress plugins]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33088</guid>

					<description><![CDATA[OpenClaw and Moltbook: Inside the Rise of Autonomous AI Agents
State Hackers Hijack Notepad++ Updates in Months-Long Supply-Chain Attack
SystemBC Malware Hits 10,000+ Global IPs, Targets Government Sites ... this and more in AofE  #436<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents&amp;action_name=%23AxisOfEasy%20436%3A%20OpenClaw%20And%20Moltbook%3A%20Inside%20The%20Rise%20Of%20Autonomous%20AI%20Agents&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents/?pk_campaign=feed&#038;pk_kwd=axisofeasy-436-openclaw-and-moltbook-inside-the-rise-of-autonomous-ai-agents/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 410: Can AI Chatbots Be Hacked Via DNS?</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/?pk_campaign=feed&#038;pk_kwd=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/?pk_campaign=feed&#038;pk_kwd=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 25 Jul 2025 22:00:59 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI agent]]></category>
		<category><![CDATA[AI chatbots]]></category>
		<category><![CDATA[AI fraud]]></category>
		<category><![CDATA[authentication keys]]></category>
		<category><![CDATA[autonomous agents]]></category>
		<category><![CDATA[bug bounty]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[cloud compromise]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[crypto mining]]></category>
		<category><![CDATA[CVE-2025-53770]]></category>
		<category><![CDATA[cybercrime forum]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity regulations]]></category>
		<category><![CDATA[database deletion]]></category>
		<category><![CDATA[debug code]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[Education Department]]></category>
		<category><![CDATA[ExpressVPN]]></category>
		<category><![CDATA[G5 portal]]></category>
		<category><![CDATA[Ghostwriter]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Hello Internet Corp]]></category>
		<category><![CDATA[Interlock ransomware]]></category>
		<category><![CDATA[IP address exposure]]></category>
		<category><![CDATA[JavaScript exfiltration]]></category>
		<category><![CDATA[lateral movement]]></category>
		<category><![CDATA[layoffs]]></category>
		<category><![CDATA[Magento]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[production error]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[RDP leak]]></category>
		<category><![CDATA[Replit]]></category>
		<category><![CDATA[SharePoint]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[txt records]]></category>
		<category><![CDATA[Ukraine arrest]]></category>
		<category><![CDATA[Vibe Coding Test]]></category>
		<category><![CDATA[voiceprint authentication]]></category>
		<category><![CDATA[VPN tunnel]]></category>
		<category><![CDATA[water utilities]]></category>
		<category><![CDATA[XSS.is]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31916</guid>

					<description><![CDATA[Can AI Chatbots Be Hacked Via DNS?
SharePoint Zero Day Exploit Hits U.S. Agencies and Exposes Microsoft’s Persistent Security Gaps
ExpressVPN Patch Fixes RDP Traffic Leak That Exposed User IP Addresses ...this and more in AofE  #410<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-410-can-ai-chatbots-be-hacked-via-dns%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-410-can-ai-chatbots-be-hacked-via-dns&amp;action_name=%23AxisOfEasy%20410%3A%20Can%20AI%20Chatbots%20Be%20Hacked%20Via%20DNS%3F&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/?pk_campaign=feed&#038;pk_kwd=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
