<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>McDonalsd&#8217;s</title>
	<atom:link href="https://axisofeasy.com/tag/mcdonalsds/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Tue, 08 Mar 2022 15:39:45 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>McDonalsd&#8217;s</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 236:  Researchers Found Daxin, The &#8216;Most Advanced&#8217; Backdoor Ever Deployed By Chinese Threat Actors</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-236-researchers-found-daxin-the-most-advanced-backdoor-ever-deployed-by-chinese-threat-actors/?pk_campaign=feed&#038;pk_kwd=axisofeasy-236-researchers-found-daxin-the-most-advanced-backdoor-ever-deployed-by-chinese-threat-actors&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-236-researchers-found-daxin-the-most-advanced-backdoor-ever-deployed-by-chinese-threat-actors</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-236-researchers-found-daxin-the-most-advanced-backdoor-ever-deployed-by-chinese-threat-actors/?pk_campaign=feed&#038;pk_kwd=axisofeasy-236-researchers-found-daxin-the-most-advanced-backdoor-ever-deployed-by-chinese-threat-actors#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 08 Mar 2022 23:00:37 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Daxin]]></category>
		<category><![CDATA[firefox]]></category>
		<category><![CDATA[McDonalsd's]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[NVidia]]></category>
		<category><![CDATA[TCP]]></category>
		<category><![CDATA[Teabot]]></category>
		<category><![CDATA[Toyoda]]></category>
		<category><![CDATA[Trojan]]></category>
		<category><![CDATA[twitter]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=25458</guid>

					<description><![CDATA[Hackers stole employee and internal data from Nvidia,
Researchers found Daxin, the 'most advanced' backdoor ever deployed by Chinese threat actors,
Hackers used the Ukrainian military server and impersonated NATO email invitations to target European governments and refugee movements...  this and more in AofE #236<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-236-researchers-found-daxin-the-most-advanced-backdoor-ever-deployed-by-chinese-threat-actors%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-236-researchers-found-daxin-the-most-advanced-backdoor-ever-deployed-by-chinese-threat-actors&amp;action_name=%23AxisOfEasy%20236%3A%20%20Researchers%20Found%20Daxin%2C%20The%20%26%238216%3BMost%20Advanced%26%238217%3B%20Backdoor%20Ever%20Deployed%20By%20Chinese%20Threat%20Actors&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-236-researchers-found-daxin-the-most-advanced-backdoor-ever-deployed-by-chinese-threat-actors/?pk_campaign=feed&#038;pk_kwd=axisofeasy-236-researchers-found-daxin-the-most-advanced-backdoor-ever-deployed-by-chinese-threat-actors/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
	</channel>
</rss>
