<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>North Korea</title>
	<atom:link href="https://axisofeasy.com/tag/north-korea/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 27 Feb 2026 16:20:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>North Korea</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 439: OpenAI Suppressed Warnings On Mass Shooter Months Before Spree</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree/?pk_campaign=feed&#038;pk_kwd=axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree/?pk_campaign=feed&#038;pk_kwd=axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 27 Feb 2026 23:00:38 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[abundance]]></category>
		<category><![CDATA[active exploitation]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI espionage]]></category>
		<category><![CDATA[AI governance]]></category>
		<category><![CDATA[AI revolution]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[BeaverTail]]></category>
		<category><![CDATA[biometric surveillance]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Canadian law enforcement]]></category>
		<category><![CDATA[child data protection]]></category>
		<category><![CDATA[Chrome zero-day]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Contagious Interview]]></category>
		<category><![CDATA[CVE-2026-2441]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exposure]]></category>
		<category><![CDATA[dji romo]]></category>
		<category><![CDATA[duty to report]]></category>
		<category><![CDATA[Evan Solomon]]></category>
		<category><![CDATA[fake IT workers]]></category>
		<category><![CDATA[GitLab]]></category>
		<category><![CDATA[gun violence]]></category>
		<category><![CDATA[hacking tools]]></category>
		<category><![CDATA[IoT vulnerability]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[mass shooting]]></category>
		<category><![CDATA[MCP worm]]></category>
		<category><![CDATA[model distillation]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[npm supply chain attack]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Ottercookie]]></category>
		<category><![CDATA[Persona]]></category>
		<category><![CDATA[pre-crime ethics]]></category>
		<category><![CDATA[privacy vs security]]></category>
		<category><![CDATA[red flag laws]]></category>
		<category><![CDATA[Reddit fine]]></category>
		<category><![CDATA[root code execution]]></category>
		<category><![CDATA[Russia cybercrime]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[smart home surveillance]]></category>
		<category><![CDATA[SolarWinds Serv-U]]></category>
		<category><![CDATA[supply chain security]]></category>
		<category><![CDATA[synthetic identities]]></category>
		<category><![CDATA[tumbler ridge]]></category>
		<category><![CDATA[UK ICO]]></category>
		<category><![CDATA[use-after-free]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33269</guid>

					<description><![CDATA[OpenAI Flagged Tumbler Ridge Shooter's Chat Sessions, But Did Nothing,
GitLab Disrupts North Korean "Contagious Interview" and Fake IT Worker Networks,
DJI Robot Vacuum Flaw Exposed 7,000 Homes... this and more in AofE  #439<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree&amp;action_name=%23AxisOfEasy%20439%3A%20OpenAI%20Suppressed%20Warnings%20On%20Mass%20Shooter%20Months%20Before%20Spree&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree/?pk_campaign=feed&#038;pk_kwd=axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 431: UK Moves Toward Mandatory Phone Surveillance</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 19 Dec 2025 23:00:04 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple developer account disabled]]></category>
		<category><![CDATA[Apple ID bricked devices]]></category>
		<category><![CDATA[APT28 Ukraine phishing]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Axis Of Easy]]></category>
		<category><![CDATA[AxisOfEasy]]></category>
		<category><![CDATA[Bill C-9 hate speech]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[Canada religious speech protections]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[Charles Hugh Smith]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CSAM scanning bill]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[government overreach]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[mandatory device scanning]]></category>
		<category><![CDATA[Mark E. Jeftovic]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phone security]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[PornHub data breach]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[ShinyHunters extortion]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tech news]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[twitter]]></category>
		<category><![CDATA[uk government]]></category>
		<category><![CDATA[UK phone surveillance]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32898</guid>

					<description><![CDATA[UK pushes mandatory phone surveillance on all devices—plus Apple bricks developer's $30K ecosystem, PornHub extortion, &#038; Canada strips religious speech protections. #AxisOfEasy weekly digest<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-431-uk-moves-toward-mandatory-phone-surveillance%2F&amp;action_name=%23AxisOfEasy%20431%3A%20UK%20Moves%20Toward%20Mandatory%20Phone%20Surveillance&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 430: Trump Administration Plans Mandatory Social Media And Family Data For Foreign Visitors</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors/?pk_campaign=feed&#038;pk_kwd=axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors/?pk_campaign=feed&#038;pk_kwd=axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 12 Dec 2025 23:00:39 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[.NET RCE]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[border security]]></category>
		<category><![CDATA[BRICKSTORM malware]]></category>
		<category><![CDATA[Chinese hackers]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[cloudflare outage]]></category>
		<category><![CDATA[conservative party of canada]]></category>
		<category><![CDATA[credit monitoring]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[customer data exposure]]></category>
		<category><![CDATA[CVE-2025-55182]]></category>
		<category><![CDATA[cybersecurity incident]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data collection]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[developer security]]></category>
		<category><![CDATA[DLL hijacking]]></category>
		<category><![CDATA[DPRK tooling]]></category>
		<category><![CDATA[Election Security.]]></category>
		<category><![CDATA[enterprise vulnerabilities]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ESTA]]></category>
		<category><![CDATA[Ethereum C2]]></category>
		<category><![CDATA[EtherRAT]]></category>
		<category><![CDATA[Fortinet SSO flaw]]></category>
		<category><![CDATA[global cyber threats]]></category>
		<category><![CDATA[government overreach]]></category>
		<category><![CDATA[HTTP traffic disruption]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[internet reliability]]></category>
		<category><![CDATA[law enforcement investigation]]></category>
		<category><![CDATA[Lua]]></category>
		<category><![CDATA[malicious plugins]]></category>
		<category><![CDATA[malware campaigns]]></category>
		<category><![CDATA[medical record breach]]></category>
		<category><![CDATA[Next.js]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[npm malware]]></category>
		<category><![CDATA[online surveillance]]></category>
		<category><![CDATA[open-source security]]></category>
		<category><![CDATA[persistent threats]]></category>
		<category><![CDATA[political cybersecurity]]></category>
		<category><![CDATA[PowerShell malware]]></category>
		<category><![CDATA[privacy invasion]]></category>
		<category><![CDATA[React Server Components]]></category>
		<category><![CDATA[React2Shell]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Rust malware]]></category>
		<category><![CDATA[Rust proxy]]></category>
		<category><![CDATA[social media monitoring]]></category>
		<category><![CDATA[state-sponsored cyber attacks]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[travel surveillance]]></category>
		<category><![CDATA[trump administration]]></category>
		<category><![CDATA[unpatched vulnerabilities]]></category>
		<category><![CDATA[visa waiver program]]></category>
		<category><![CDATA[VMware vSphere]]></category>
		<category><![CDATA[VS Code extensions]]></category>
		<category><![CDATA[WAF]]></category>
		<category><![CDATA[web infrastructure]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32811</guid>

					<description><![CDATA[Trump Administration Plans Mandatory Social Media and Family Data for Foreign Visitors,
Yet Another Cloudflare Outage (YATO),
Conservative Party of Canada Faces Major Cybersecurity Breach Affecting Hundreds of Candidates... this and more in AofE  #430<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors&amp;action_name=%23AxisOfEasy%20430%3A%20Trump%20Administration%20Plans%20Mandatory%20Social%20Media%20And%20Family%20Data%20For%20Foreign%20Visitors&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors/?pk_campaign=feed&#038;pk_kwd=axisofeasy-430-trump-administration-plans-mandatory-social-media-and-family-data-for-foreign-visitors/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 427: Cloudflare’s Internal Failure Briefly Turns The Internet’s Biggest Platforms Dark</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark/?pk_campaign=feed&#038;pk_kwd=axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark/?pk_campaign=feed&#038;pk_kwd=axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 21 Nov 2025 23:00:45 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[7-Zip]]></category>
		<category><![CDATA[AI-driven cyberattack]]></category>
		<category><![CDATA[Ariantel]]></category>
		<category><![CDATA[autonomous hacking]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[Blockchain.com]]></category>
		<category><![CDATA[Bot Management System]]></category>
		<category><![CDATA[centralized infrastructure]]></category>
		<category><![CDATA[Chat]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Chinese state actors]]></category>
		<category><![CDATA[CIPA]]></category>
		<category><![CDATA[Citizen Lab]]></category>
		<category><![CDATA[Cl0p ransomware]]></category>
		<category><![CDATA[Claude Code]]></category>
		<category><![CDATA[cloud DDoS attack]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[Coinbase]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data access]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[database error]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[DDoSecrets]]></category>
		<category><![CDATA[decentralization]]></category>
		<category><![CDATA[deceptive practices]]></category>
		<category><![CDATA[deep packet inspection]]></category>
		<category><![CDATA[DoorDash breach]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[Ethereum]]></category>
		<category><![CDATA[fake IT workers]]></category>
		<category><![CDATA[FIN11]]></category>
		<category><![CDATA[financial sector]]></category>
		<category><![CDATA[Freedom of Speech]]></category>
		<category><![CDATA[FTSE 100 credentials]]></category>
		<category><![CDATA[Gemini AI]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[internet outage]]></category>
		<category><![CDATA[Logitech]]></category>
		<category><![CDATA[Meet]]></category>
		<category><![CDATA[Model Context Protocol]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Oracle EBS]]></category>
		<category><![CDATA[political persecution]]></category>
		<category><![CDATA[privacy lawsuit]]></category>
		<category><![CDATA[Protei]]></category>
		<category><![CDATA[ransomware campaign]]></category>
		<category><![CDATA[RCE vulnerability]]></category>
		<category><![CDATA[SOC automation]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SORM]]></category>
		<category><![CDATA[Stored Communications Act]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[symbolic link exploit]]></category>
		<category><![CDATA[telecom interception]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Trustless Manifesto]]></category>
		<category><![CDATA[Venezuela]]></category>
		<category><![CDATA[vulnerability assessment]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[X]]></category>
		<category><![CDATA[Zero-day vulnerability]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32662</guid>

					<description><![CDATA[Cloudflare’s internal failure briefly turns the internet’s biggest platforms dark
Protei is hacked and its surveillance data spills into public view
AI runs most of a state-backed cyberattack and forces OpenAI to sound the alarm... this and more in AofE  #427<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark&amp;action_name=%23AxisOfEasy%20427%3A%20Cloudflare%E2%80%99s%20Internal%20Failure%20Briefly%20Turns%20The%20Internet%E2%80%99s%20Biggest%20Platforms%20Dark&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark/?pk_campaign=feed&#038;pk_kwd=axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 420: RedNovember&#8217;s Global Cyber-Espionage Blitz</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-420-rednovembers-global-cyber-espionage-blitz</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 03 Oct 2025 22:00:48 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[1.2 million passengers]]></category>
		<category><![CDATA[1500 organizations]]></category>
		<category><![CDATA[ACSC]]></category>
		<category><![CDATA[Africa]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[arbitrary code execution]]></category>
		<category><![CDATA[ArcaneDoor]]></category>
		<category><![CDATA[ASA]]></category>
		<category><![CDATA[authentication bypass]]></category>
		<category><![CDATA[aviation]]></category>
		<category><![CDATA[banking trojan]]></category>
		<category><![CDATA[BCC]]></category>
		<category><![CDATA[Bill C-36]]></category>
		<category><![CDATA[Bill C-8]]></category>
		<category><![CDATA[Bill C-9]]></category>
		<category><![CDATA[Bitcoin Treasury]]></category>
		<category><![CDATA[C-2]]></category>
		<category><![CDATA[C-26]]></category>
		<category><![CDATA[C-8]]></category>
		<category><![CDATA[C-9]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Canadian Bitcoin Conference]]></category>
		<category><![CDATA[Canadian Bitcoin Podcast]]></category>
		<category><![CDATA[Canadian Human Rights Act]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[Central Asia]]></category>
		<category><![CDATA[Charter of Rights and Freedoms]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Cisco ASA]]></category>
		<category><![CDATA[Citizen Lab]]></category>
		<category><![CDATA[Cobalt Strike]]></category>
		<category><![CDATA[command-and-control]]></category>
		<category><![CDATA[Criminal Code]]></category>
		<category><![CDATA[CVE-2025-20333]]></category>
		<category><![CDATA[CVE-2025-20362]]></category>
		<category><![CDATA[cyber campaign]]></category>
		<category><![CDATA[cyber defense]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[developer data]]></category>
		<category><![CDATA[Digital Safety Commission]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[F5 BIG-IP]]></category>
		<category><![CDATA[fake recruiters]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[FTD]]></category>
		<category><![CDATA[genocide]]></category>
		<category><![CDATA[geopolitics]]></category>
		<category><![CDATA[harmful online content]]></category>
		<category><![CDATA[hate speech]]></category>
		<category><![CDATA[IDs]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Indian Cyber Crime Coordination Centre]]></category>
		<category><![CDATA[Insikt Group]]></category>
		<category><![CDATA[IT Act 2000]]></category>
		<category><![CDATA[Ivanti Connect Secure]]></category>
		<category><![CDATA[Joey Temprile]]></category>
		<category><![CDATA[Justice M Nagaprasanna]]></category>
		<category><![CDATA[Karnataka High Court]]></category>
		<category><![CDATA[Klopatra]]></category>
		<category><![CDATA[LESLIELOADER]]></category>
		<category><![CDATA[Line Dancer]]></category>
		<category><![CDATA[Line Runner]]></category>
		<category><![CDATA[loyalty programs]]></category>
		<category><![CDATA[Mark Jeftovic]]></category>
		<category><![CDATA[MCP server]]></category>
		<category><![CDATA[Melanie Joly]]></category>
		<category><![CDATA[Ministry of Home Affairs]]></category>
		<category><![CDATA[mitigation]]></category>
		<category><![CDATA[Montreal]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[Net-Star malware]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[online misuse]]></category>
		<category><![CDATA[Outlook Web Access]]></category>
		<category><![CDATA[Panama]]></category>
		<category><![CDATA[Pantegana]]></category>
		<category><![CDATA[passports]]></category>
		<category><![CDATA[peace bonds]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[Phantom Taurus]]></category>
		<category><![CDATA[phone hijacking]]></category>
		<category><![CDATA[PoC exploits]]></category>
		<category><![CDATA[Qantas]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Recorded Future]]></category>
		<category><![CDATA[RedNovember]]></category>
		<category><![CDATA[Rialto Theatre]]></category>
		<category><![CDATA[ROM manipulation]]></category>
		<category><![CDATA[Sahyog portal]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[Sean Fraser]]></category>
		<category><![CDATA[secrets]]></category>
		<category><![CDATA[Section 69A]]></category>
		<category><![CDATA[Secure Firewall]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[SparkRAT]]></category>
		<category><![CDATA[spearphishing]]></category>
		<category><![CDATA[state-sponsored]]></category>
		<category><![CDATA[Steven Guilbeault]]></category>
		<category><![CDATA[Storm-1849]]></category>
		<category><![CDATA[Storm-2077]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[surveillance bills]]></category>
		<category><![CDATA[TAG-100]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[transportation networks]]></category>
		<category><![CDATA[twitter]]></category>
		<category><![CDATA[U.S. defense contractors]]></category>
		<category><![CDATA[UAT4356]]></category>
		<category><![CDATA[VNC]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[WestJet]]></category>
		<category><![CDATA[women’s safety]]></category>
		<category><![CDATA[X Corp]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32373</guid>

					<description><![CDATA[... this and more in AofE  #420<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-420-rednovembers-global-cyber-espionage-blitz%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-420-rednovembers-global-cyber-espionage-blitz&amp;action_name=%23AxisOfEasy%20420%3A%20RedNovember%26%238217%3Bs%20Global%20Cyber-Espionage%20Blitz&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 409: Adoption Data Breach Exposes Sensitive Records From Texas Nonprofit</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 18 Jul 2025 22:00:04 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[access brokers]]></category>
		<category><![CDATA[Adoption]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AxisOfEasy]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[Black Basta]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[Bluesky]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[C2 infrastructure]]></category>
		<category><![CDATA[Chatbot]]></category>
		<category><![CDATA[child protection]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cloud misconfiguration]]></category>
		<category><![CDATA[CRM migration]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cypherpunk]]></category>
		<category><![CDATA[Cypherpunk movement]]></category>
		<category><![CDATA[Dark Reading]]></category>
		<category><![CDATA[data access]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data sovereignty]]></category>
		<category><![CDATA[data storage]]></category>
		<category><![CDATA[decentralization]]></category>
		<category><![CDATA[Decentralized systems]]></category>
		<category><![CDATA[deep learning]]></category>
		<category><![CDATA[Developing Countries]]></category>
		<category><![CDATA[Digital dystopia]]></category>
		<category><![CDATA[digital economy]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[digital resilience]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[documentation]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[ECC]]></category>
		<category><![CDATA[emerging markets]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Episource]]></category>
		<category><![CDATA[existential risk]]></category>
		<category><![CDATA[facial scanning]]></category>
		<category><![CDATA[financial innovation]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[GDDR6]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GPUhammer]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hardware security]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[HexEval]]></category>
		<category><![CDATA[in-memory execution]]></category>
		<category><![CDATA[internal tooling]]></category>
		<category><![CDATA[Internet freedom]]></category>
		<category><![CDATA[Irish DPC]]></category>
		<category><![CDATA[Kid Web Services]]></category>
		<category><![CDATA[leapfrogging]]></category>
		<category><![CDATA[LOLBin]]></category>
		<category><![CDATA[long-form content]]></category>
		<category><![CDATA[Louis Vuitton]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[malware-as-a-service]]></category>
		<category><![CDATA[Matanbuchus]]></category>
		<category><![CDATA[medical imaging]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Teams]]></category>
		<category><![CDATA[monetary fine]]></category>
		<category><![CDATA[monetary sovereignty]]></category>
		<category><![CDATA[nonprofit]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[NVidia]]></category>
		<category><![CDATA[online identity]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[patient data]]></category>
		<category><![CDATA[payload delivery]]></category>
		<category><![CDATA[payments infrastructure]]></category>
		<category><![CDATA[Peer-to-peer networks]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[retail]]></category>
		<category><![CDATA[reverse shell]]></category>
		<category><![CDATA[Rowhammer]]></category>
		<category><![CDATA[SMA 100]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[support automation]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tech philosophy]]></category>
		<category><![CDATA[technological foresight]]></category>
		<category><![CDATA[Texas]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[UK regulation]]></category>
		<category><![CDATA[Usenix]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Web3]]></category>
		<category><![CDATA[XORIndex]]></category>
		<category><![CDATA[zero-day]]></category>
		<category><![CDATA[Zero-Day Exploit]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31883</guid>

					<description><![CDATA[ Adoption Data Breach Exposes Sensitive Records from Texas Nonprofit,
Matanbuchus 3.0 Expands Stealth Tactics with Teams Lures and Advanced Loader Features,
Bluesky Implements UK Age Checks Amid Privacy Backlash Over Online Safety Law...this and more in AofE  #409<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&amp;action_name=%23AxisOfEasy%20409%3A%20Adoption%20Data%20Breach%20Exposes%20Sensitive%20Records%20From%20Texas%20Nonprofit&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 408: Scammers Are Ready To Strike As Amazon Prime Day Begins Tomorrow</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/?pk_campaign=feed&#038;pk_kwd=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/?pk_campaign=feed&#038;pk_kwd=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 11 Jul 2025 22:00:17 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[130 vulnerabilities]]></category>
		<category><![CDATA[AI bots]]></category>
		<category><![CDATA[AI malware]]></category>
		<category><![CDATA[Amazon Prime Day]]></category>
		<category><![CDATA[AMOS]]></category>
		<category><![CDATA[Apple Keychain]]></category>
		<category><![CDATA[Bill C-63]]></category>
		<category><![CDATA[bot blocking]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[browser data theft]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship law]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Chinese hacker]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[content monetization]]></category>
		<category><![CDATA[COVID research theft]]></category>
		<category><![CDATA[crypto users]]></category>
		<category><![CDATA[CVE-2024-12856]]></category>
		<category><![CDATA[CVE-2024-3721]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[data scraping]]></category>
		<category><![CDATA[DDoS attacks]]></category>
		<category><![CDATA[email fraud]]></category>
		<category><![CDATA[encrypted malware]]></category>
		<category><![CDATA[fake domains]]></category>
		<category><![CDATA[fake Zoom invites]]></category>
		<category><![CDATA[firmware vulnerabilities]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[Four-Faith routers]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[government overreach]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[internet restrictions]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[macOS backdoor]]></category>
		<category><![CDATA[macOS malware]]></category>
		<category><![CDATA[Mark Carney]]></category>
		<category><![CDATA[Matthew Prince]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Defender evasion]]></category>
		<category><![CDATA[Minecraft disguise]]></category>
		<category><![CDATA[NimDoor]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Nova Scotia Power]]></category>
		<category><![CDATA[Online Harms Bill]]></category>
		<category><![CDATA[password theft]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[pay-per-crawl]]></category>
		<category><![CDATA[permission-first model]]></category>
		<category><![CDATA[persistent threats]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[proxy devices]]></category>
		<category><![CDATA[RondoDox]]></category>
		<category><![CDATA[Russian hackers]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[SentinelOne]]></category>
		<category><![CDATA[smart meters]]></category>
		<category><![CDATA[stealth attacks]]></category>
		<category><![CDATA[TBK DVRs]]></category>
		<category><![CDATA[Telegram attacks]]></category>
		<category><![CDATA[website control]]></category>
		<category><![CDATA[Xu Zewei]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31849</guid>

					<description><![CDATA[Scammers Are Ready to Strike as Amazon Prime Day Begins Tomorrow,
New Malware Turns Security Devices Into Silent Weapons for Cyber Attacks,
AI Bots Face a Toll as Cloudflare Makes Them Pay to Scrape Websites ...this and more in AofE  #408<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow&amp;action_name=%23AxisOfEasy%20408%3A%20Scammers%20Are%20Ready%20To%20Strike%20As%20Amazon%20Prime%20Day%20Begins%20Tomorrow&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/?pk_campaign=feed&#038;pk_kwd=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 407: Brazil Holds Tech Platforms Liable For User Content In Landmark Ruling</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling/?pk_campaign=feed&#038;pk_kwd=axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling/?pk_campaign=feed&#038;pk_kwd=axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 04 Jul 2025 22:00:46 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Aeza Group]]></category>
		<category><![CDATA[airline breach]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[API vulnerability]]></category>
		<category><![CDATA[Blind Eagle]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[bulletproof hosting]]></category>
		<category><![CDATA[Call Center]]></category>
		<category><![CDATA[Catwatchful]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cold wallets]]></category>
		<category><![CDATA[content moderation]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[crypto theft]]></category>
		<category><![CDATA[CSV]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[digital surveillance]]></category>
		<category><![CDATA[G_mic]]></category>
		<category><![CDATA[geolocation data]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Firebase]]></category>
		<category><![CDATA[hate speech]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[identity verification]]></category>
		<category><![CDATA[JSON]]></category>
		<category><![CDATA[legal compliance]]></category>
		<category><![CDATA[Mailchimp]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Nim malware]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Omar Soca Charcov]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing attack]]></category>
		<category><![CDATA[platform liability]]></category>
		<category><![CDATA[political speech]]></category>
		<category><![CDATA[Proton66]]></category>
		<category><![CDATA[Qantas]]></category>
		<category><![CDATA[sanctions]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[seed phrase]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Stalkerware]]></category>
		<category><![CDATA[support system abuse]]></category>
		<category><![CDATA[Supreme Court]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[systemic failure]]></category>
		<category><![CDATA[T-Mobile]]></category>
		<category><![CDATA[third-party risk]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[Trezor]]></category>
		<category><![CDATA[Verizon]]></category>
		<category><![CDATA[Web3]]></category>
		<category><![CDATA[X]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31786</guid>

					<description><![CDATA[Brazil Holds Tech Platforms Liable for User Content in Landmark Ruling,
Catwatchful Breach Exposes Stalkerware Users, Victims, and Developer,
Verizon and T-Mobile Customer Data Breach Exposes 116 Million Records for Sale in 2025 Leak ...this and more in AofE  #407<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling&amp;action_name=%23AxisOfEasy%20407%3A%20Brazil%20Holds%20Tech%20Platforms%20Liable%20For%20User%20Content%20In%20Landmark%20Ruling&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling/?pk_campaign=feed&#038;pk_kwd=axisofeasy-407-brazil-holds-tech-platforms-liable-for-user-content-in-landmark-ruling/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 400: North Korean Hackers Infiltrate U.S. Tech Jobs With Fake Identities And Remote Access</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 16 May 2025 22:00:57 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[account compromise]]></category>
		<category><![CDATA[Albania]]></category>
		<category><![CDATA[AnyDesk]]></category>
		<category><![CDATA[Baby Box Info]]></category>
		<category><![CDATA[Belgium]]></category>
		<category><![CDATA[birthdate]]></category>
		<category><![CDATA[breach detection]]></category>
		<category><![CDATA[breach monetization]]></category>
		<category><![CDATA[call centers]]></category>
		<category><![CDATA[Co-Op]]></category>
		<category><![CDATA[compromised credentials]]></category>
		<category><![CDATA[coordinated raids]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[Cubix Tech US]]></category>
		<category><![CDATA[Customer Data Breach]]></category>
		<category><![CDATA[cyber fraud]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybercrime ring]]></category>
		<category><![CDATA[cybercrime statistics]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity response]]></category>
		<category><![CDATA[Cyprus]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[decryption mandate]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[Digital Safety]]></category>
		<category><![CDATA[DOJ indictment]]></category>
		<category><![CDATA[DPRK]]></category>
		<category><![CDATA[DragonForce]]></category>
		<category><![CDATA[Dubai]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[electronic seizures]]></category>
		<category><![CDATA[electronics shipping]]></category>
		<category><![CDATA[encryption backdoor]]></category>
		<category><![CDATA[encryption debate]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[English-Korean]]></category>
		<category><![CDATA[Eurojust]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[fake identities]]></category>
		<category><![CDATA[fake investment schemes]]></category>
		<category><![CDATA[fake resumes]]></category>
		<category><![CDATA[FBI report]]></category>
		<category><![CDATA[financial fraud]]></category>
		<category><![CDATA[Flashpoint]]></category>
		<category><![CDATA[Florida bill]]></category>
		<category><![CDATA[fraud prosecution]]></category>
		<category><![CDATA[fraudulent employment]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Google Translate]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Harrods]]></category>
		<category><![CDATA[Helix US]]></category>
		<category><![CDATA[home address]]></category>
		<category><![CDATA[HR verification scripts]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[incident disclosure]]></category>
		<category><![CDATA[infostealer logs]]></category>
		<category><![CDATA[internal hierarchy]]></category>
		<category><![CDATA[international operation]]></category>
		<category><![CDATA[investment fraud]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[job references]]></category>
		<category><![CDATA[jsilver617]]></category>
		<category><![CDATA[judicial oversight]]></category>
		<category><![CDATA[Lahore Pakistan]]></category>
		<category><![CDATA[Latvia]]></category>
		<category><![CDATA[law enforcement access]]></category>
		<category><![CDATA[legislative overreach]]></category>
		<category><![CDATA[London Stock Exchange update]]></category>
		<category><![CDATA[M&S]]></category>
		<category><![CDATA[Marks and Spencer]]></category>
		<category><![CDATA[minors online safety]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[Nickel Tapestry]]></category>
		<category><![CDATA[NIgeria]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[online gaming]]></category>
		<category><![CDATA[online orders]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[online shopping]]></category>
		<category><![CDATA[OTP codes]]></category>
		<category><![CDATA[password change]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[password reset]]></category>
		<category><![CDATA[password theft]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[phishing risk]]></category>
		<category><![CDATA[phishing risks]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[phone numbers]]></category>
		<category><![CDATA[pig butchering scam]]></category>
		<category><![CDATA[platform security]]></category>
		<category><![CDATA[platform vulnerability]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[professionalized hacking]]></category>
		<category><![CDATA[profit dashboard]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware-as-a-service]]></category>
		<category><![CDATA[remote access]]></category>
		<category><![CDATA[retail cybersecurity]]></category>
		<category><![CDATA[scam brokers]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Steam]]></category>
		<category><![CDATA[stolen identities]]></category>
		<category><![CDATA[subpoena access]]></category>
		<category><![CDATA[surveillance tools]]></category>
		<category><![CDATA[tech legislation]]></category>
		<category><![CDATA[Two-Factor Authentication]]></category>
		<category><![CDATA[U.S. infrastructure infiltration]]></category>
		<category><![CDATA[U.S. tech jobs]]></category>
		<category><![CDATA[UK retailers]]></category>
		<category><![CDATA[user accounts]]></category>
		<category><![CDATA[user privacy]]></category>
		<category><![CDATA[Valve]]></category>
		<category><![CDATA[victim grooming]]></category>
		<category><![CDATA[webcam avoidance]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31552</guid>

					<description><![CDATA[North Korean Hackers Infiltrate U.S. Tech Jobs with Fake Identities and Remote Access,
Steam Breach Exposes 89 Million Accounts in Dark Web Data Sale, 
Marks and Spencer Cyberattack Exposes Customer Data and Halts Online Orders (update from AoE #397)... this and more in AofE  #400<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access&amp;action_name=%23AxisOfEasy%20400%3A%20North%20Korean%20Hackers%20Infiltrate%20U.S.%20Tech%20Jobs%20With%20Fake%20Identities%20And%20Remote%20Access&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 372: North Korean Hackers Use Linux Malware In Global ATM Heists</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-372-north-korean-hackers-use-linux-malware-in-global-atm-heists/?pk_campaign=feed&#038;pk_kwd=axisofeasy-372-north-korean-hackers-use-linux-malware-in-global-atm-heists&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-372-north-korean-hackers-use-linux-malware-in-global-atm-heists</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-372-north-korean-hackers-use-linux-malware-in-global-atm-heists/?pk_campaign=feed&#038;pk_kwd=axisofeasy-372-north-korean-hackers-use-linux-malware-in-global-atm-heists#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 18 Oct 2024 22:00:03 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AirBnB]]></category>
		<category><![CDATA[America First Legal]]></category>
		<category><![CDATA[ATM Heists]]></category>
		<category><![CDATA[Biden Administration]]></category>
		<category><![CDATA[Booking.com]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[Child Abuse Law]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[FOIA]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[Global Censorship]]></category>
		<category><![CDATA[Government Transparency]]></category>
		<category><![CDATA[Legal Battle]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy Concerns]]></category>
		<category><![CDATA[Telegram]]></category>
		<category><![CDATA[Telekopye Scam]]></category>
		<category><![CDATA[Trademark Dispute]]></category>
		<category><![CDATA[Travel Safety]]></category>
		<category><![CDATA[US Agencies]]></category>
		<category><![CDATA[WordPress]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=30489</guid>

					<description><![CDATA[North Korean Hackers Use Linux Malware in Global ATM Heists,
Telekopye Scam Network Targets Booking.com and Airbnb Users,
WordPress War Heats Up as WP Engine Faces Legal Showdown ... this and more in AofE  #372<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-372-north-korean-hackers-use-linux-malware-in-global-atm-heists%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-372-north-korean-hackers-use-linux-malware-in-global-atm-heists&amp;action_name=%23AxisOfEasy%20372%3A%20North%20Korean%20Hackers%20Use%20Linux%20Malware%20In%20Global%20ATM%20Heists&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-372-north-korean-hackers-use-linux-malware-in-global-atm-heists/?pk_campaign=feed&#038;pk_kwd=axisofeasy-372-north-korean-hackers-use-linux-malware-in-global-atm-heists/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
