<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Maven Central</title>
	<atom:link href="https://axisofeasy.com/tag/maven-central/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 30 Jan 2026 17:56:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>Maven Central</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 435: FBI Accesses Microsoft BitLocker Keys In Guam Fraud Case</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/?pk_campaign=feed&#038;pk_kwd=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/?pk_campaign=feed&#038;pk_kwd=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 30 Jan 2026 23:00:30 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI prompt collection]]></category>
		<category><![CDATA[AI-assisted attacks]]></category>
		<category><![CDATA[BitLocker encryption]]></category>
		<category><![CDATA[CI/CD pipeline compromise]]></category>
		<category><![CDATA[cloud key escrow]]></category>
		<category><![CDATA[container image risk]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[critical infrastructure attacks]]></category>
		<category><![CDATA[CVE exposure]]></category>
		<category><![CDATA[cybercrime forums]]></category>
		<category><![CDATA[dark web seizures]]></category>
		<category><![CDATA[data localization]]></category>
		<category><![CDATA[device encryption backdoors]]></category>
		<category><![CDATA[DOJ cybercrime enforcement]]></category>
		<category><![CDATA[energy grid cyberattacks]]></category>
		<category><![CDATA[enterprise data breaches]]></category>
		<category><![CDATA[extortion groups]]></category>
		<category><![CDATA[FBI takedowns]]></category>
		<category><![CDATA[FBI warrant]]></category>
		<category><![CDATA[Fortinet exploits]]></category>
		<category><![CDATA[fraud investigation]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Guam unemployment fraud]]></category>
		<category><![CDATA[high-severity vulnerabilities]]></category>
		<category><![CDATA[initial access brokers]]></category>
		<category><![CDATA[JavaScript supply chain flaws]]></category>
		<category><![CDATA[joint venture governance]]></category>
		<category><![CDATA[Lapsus$ affiliates]]></category>
		<category><![CDATA[law enforcement access]]></category>
		<category><![CDATA[malicious packages]]></category>
		<category><![CDATA[Maven Central]]></category>
		<category><![CDATA[MFA fatigue]]></category>
		<category><![CDATA[Microsoft cloud keys]]></category>
		<category><![CDATA[namespace confusion]]></category>
		<category><![CDATA[nation-state hacking]]></category>
		<category><![CDATA[network device compromise]]></category>
		<category><![CDATA[Nike data theft]]></category>
		<category><![CDATA[npm ecosystem]]></category>
		<category><![CDATA[NuGet vulnerabilities]]></category>
		<category><![CDATA[Okta impersonation]]></category>
		<category><![CDATA[open source supply chain attacks]]></category>
		<category><![CDATA[operational disruption]]></category>
		<category><![CDATA[Oracle cloud hosting]]></category>
		<category><![CDATA[PackageGate]]></category>
		<category><![CDATA[platform surveillance]]></category>
		<category><![CDATA[precise location tracking]]></category>
		<category><![CDATA[Privacy Risks]]></category>
		<category><![CDATA[PyPI threats]]></category>
		<category><![CDATA[RAMP marketplace]]></category>
		<category><![CDATA[ransomware extortion]]></category>
		<category><![CDATA[ransomware gangs]]></category>
		<category><![CDATA[RCE vulnerabilities]]></category>
		<category><![CDATA[recommendation algorithms]]></category>
		<category><![CDATA[repository abuse]]></category>
		<category><![CDATA[Russian intelligence operations]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Slack impersonation]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[software supply chain security]]></category>
		<category><![CDATA[SSO bypass]]></category>
		<category><![CDATA[Teams abuse]]></category>
		<category><![CDATA[threat actor migration]]></category>
		<category><![CDATA[TikTok US data collection]]></category>
		<category><![CDATA[typosquatting attacks]]></category>
		<category><![CDATA[US-China tech tensions]]></category>
		<category><![CDATA[vishing attacks]]></category>
		<category><![CDATA[voice phishing]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33045</guid>

					<description><![CDATA[FBI Accesses Microsoft BitLocker Keys in Guam Fraud Case,
Open Source Supply Chains Under Attack: Malicious Packages Surge,
Cybercrime Alliance Hits 100+ Global Organisations with Vishing Attacks ... this and more in AofE  #435<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case&amp;action_name=%23AxisOfEasy%20435%3A%20FBI%20Accesses%20Microsoft%20BitLocker%20Keys%20In%20Guam%20Fraud%20Case&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/?pk_campaign=feed&#038;pk_kwd=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 418: DHS Misconfiguration Exposes Surveillance Data To Thousands Of Unauthorized Users</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/?pk_campaign=feed&#038;pk_kwd=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/?pk_campaign=feed&#038;pk_kwd=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 22:00:26 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Acronis TikTok]]></category>
		<category><![CDATA[AI-generated images]]></category>
		<category><![CDATA[AI-powered scripts]]></category>
		<category><![CDATA[Alexander McQueen]]></category>
		<category><![CDATA[algorithm control]]></category>
		<category><![CDATA[American First Finance]]></category>
		<category><![CDATA[Andreessen Horowitz]]></category>
		<category><![CDATA[anomaly detection]]></category>
		<category><![CDATA[antivirus evasion TA558]]></category>
		<category><![CDATA[Balenciaga]]></category>
		<category><![CDATA[bitcoin ransom]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[browsers]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[Cartier]]></category>
		<category><![CDATA[chalk]]></category>
		<category><![CDATA[Chinese hacking]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[ClickFix]]></category>
		<category><![CDATA[cloud apps]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[credentials theft]]></category>
		<category><![CDATA[crypto hijacking]]></category>
		<category><![CDATA[Crypto Wallets]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[customer impact]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exposure]]></category>
		<category><![CDATA[data sovereignty]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[debug]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[disruption]]></category>
		<category><![CDATA[divestment deadline]]></category>
		<category><![CDATA[duckdb]]></category>
		<category><![CDATA[ecosystem fragility FileFix]]></category>
		<category><![CDATA[email compromise Raven Stealer]]></category>
		<category><![CDATA[email leaks]]></category>
		<category><![CDATA[export controls]]></category>
		<category><![CDATA[Facebook phishing]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[FOIA]]></category>
		<category><![CDATA[foreign cyber operations]]></category>
		<category><![CDATA[fusion centers]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[General Atlantic]]></category>
		<category><![CDATA[Gucci]]></category>
		<category><![CDATA[hardware keys]]></category>
		<category><![CDATA[high-end cyberattacks]]></category>
		<category><![CDATA[Homeland Security]]></category>
		<category><![CDATA[hospitality sector TA415]]></category>
		<category><![CDATA[hotels]]></category>
		<category><![CDATA[HSIN-Intel]]></category>
		<category><![CDATA[impersonation]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[javascript]]></category>
		<category><![CDATA[KKR]]></category>
		<category><![CDATA[lawmaker phishing FinWise Bank]]></category>
		<category><![CDATA[Lazarus Group]]></category>
		<category><![CDATA[legislation Kering]]></category>
		<category><![CDATA[local law enforcement]]></category>
		<category><![CDATA[Louis Vuitton]]></category>
		<category><![CDATA[luxury brands]]></category>
		<category><![CDATA[malicious packages]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Maven Central]]></category>
		<category><![CDATA[messaging platforms]]></category>
		<category><![CDATA[misconfiguration]]></category>
		<category><![CDATA[mr. d0x]]></category>
		<category><![CDATA[multi-language]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[NCTC]]></category>
		<category><![CDATA[npm support impersonation]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[Oracle]]></category>
		<category><![CDATA[oversight]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[payment data]]></category>
		<category><![CDATA[personally identifiable information]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing campaign]]></category>
		<category><![CDATA[phishing-as-a-service]]></category>
		<category><![CDATA[policy debate Microsoft]]></category>
		<category><![CDATA[PowerShell injection]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Protecting Americans from Foreign Adversary Controlled Applications Act]]></category>
		<category><![CDATA[protest surveillance]]></category>
		<category><![CDATA[PyPI]]></category>
		<category><![CDATA[RaccoonO365]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[recommendation system]]></category>
		<category><![CDATA[registries]]></category>
		<category><![CDATA[RubyGems]]></category>
		<category><![CDATA[Salesforce credentials]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[secondary scams]]></category>
		<category><![CDATA[Shiny Hunters]]></category>
		<category><![CDATA[Silver Lake]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Spain]]></category>
		<category><![CDATA[StealC infostealer]]></category>
		<category><![CDATA[steganography]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Susquehanna]]></category>
		<category><![CDATA[Telegram]]></category>
		<category><![CDATA[thousands of organizations]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[two-factor authentication npm]]></category>
		<category><![CDATA[U.S. consortium]]></category>
		<category><![CDATA[U.S. organizations]]></category>
		<category><![CDATA[U.S. ownership]]></category>
		<category><![CDATA[U.S.-China relations]]></category>
		<category><![CDATA[UK NCSC]]></category>
		<category><![CDATA[unauthorized access]]></category>
		<category><![CDATA[UNC6040]]></category>
		<category><![CDATA[VPNs]]></category>
		<category><![CDATA[VS Code backdoor]]></category>
		<category><![CDATA[Windows Explorer exploit]]></category>
		<category><![CDATA[zero-day response]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32305</guid>

					<description><![CDATA[DHS Misconfiguration Exposes Surveillance Data to Thousands of Unauthorized Users,
Kering Suffers Data Breach Targeting Luxury Shoppers Amid Surge in High-End Cyberattacks,
Phishing Breach Exposes Fragility of the JavaScript Ecosystem...this and more in AofE  #418<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users&amp;action_name=%23AxisOfEasy%20418%3A%20DHS%20Misconfiguration%20Exposes%20Surveillance%20Data%20To%20Thousands%20Of%20Unauthorized%20Users&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/?pk_campaign=feed&#038;pk_kwd=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
