<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>parliament</title>
	<atom:link href="https://axisofeasy.com/tag/parliament/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 16 Jan 2026 19:32:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>parliament</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 433: Australia Moves To Enact Sweeping New Hate Speech And Extremism Laws</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 23:00:28 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[agentic AI]]></category>
		<category><![CDATA[AI impact]]></category>
		<category><![CDATA[AI model reconnaissance]]></category>
		<category><![CDATA[AI Red Teaming]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[AI Tooling Risks]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[antisemitism]]></category>
		<category><![CDATA[AsyncRAT]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[blockchain abuse]]></category>
		<category><![CDATA[burden of proof]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[C2 evasion]]></category>
		<category><![CDATA[Check Point Research]]></category>
		<category><![CDATA[Chinese threat actors]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cloudflare abuse]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[cyber extortion]]></category>
		<category><![CDATA[cybercrime-as-a-service]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[data breaches]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[DeadLock]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[developer layoffs]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[extremism legislation]]></category>
		<category><![CDATA[fintech security]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[generative AI abuse]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[government censorship]]></category>
		<category><![CDATA[Group-IB]]></category>
		<category><![CDATA[Hacker News]]></category>
		<category><![CDATA[hate speech laws]]></category>
		<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[law enforcement powers]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[LLM Exploits]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[micropayments]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Model Isolation Failures]]></category>
		<category><![CDATA[online speech]]></category>
		<category><![CDATA[open source software]]></category>
		<category><![CDATA[OS command injection]]></category>
		<category><![CDATA[parliament]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing campaigns]]></category>
		<category><![CDATA[Polygon]]></category>
		<category><![CDATA[Privacy & PII]]></category>
		<category><![CDATA[prohibited groups]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reclaim The Net]]></category>
		<category><![CDATA[RedVDS]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Secure AI Design]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[software sustainability]]></category>
		<category><![CDATA[SSH key theft]]></category>
		<category><![CDATA[SSRF attacks]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[supply-chain risk]]></category>
		<category><![CDATA[Tailwind CSS]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[voice cloning]]></category>
		<category><![CDATA[VoidLink]]></category>
		<category><![CDATA[Windows security patches]]></category>
		<category><![CDATA[X402 protocol]]></category>
		<category><![CDATA[zero-day vulnerabilities]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32970</guid>

					<description><![CDATA[Australia Moves to Enact Sweeping New Hate Speech and Extremism Laws,
Can x402 micropayments save Open Source Software?
Claude Cowork Exfiltrates Files ... this and more in AofE  #433<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&amp;action_name=%23AxisOfEasy%20433%3A%20Australia%20Moves%20To%20Enact%20Sweeping%20New%20Hate%20Speech%20And%20Extremism%20Laws&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 417: Nepal Goes Offline, Then Up In Flames</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-417-nepal-goes-offline-then-up-in-flames</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 12 Sep 2025 22:00:20 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[Adobe]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[Ascension]]></category>
		<category><![CDATA[Asia]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[BitLocker]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[Bugcrowd]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[chalk]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chitwan]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[color-convert]]></category>
		<category><![CDATA[Commerce]]></category>
		<category><![CDATA[connectivity]]></category>
		<category><![CDATA[corruption]]></category>
		<category><![CDATA[crypto-clipper]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[dependencies]]></category>
		<category><![CDATA[DES]]></category>
		<category><![CDATA[Detection]]></category>
		<category><![CDATA[Drift]]></category>
		<category><![CDATA[EggStreme]]></category>
		<category><![CDATA[embassies]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[error-ex]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[Ethereum]]></category>
		<category><![CDATA[Etherscan]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[fileless malware]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Gulf]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[IMEWE]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[Jaguar Land Rover]]></category>
		<category><![CDATA[Janakpur]]></category>
		<category><![CDATA[Jeddah]]></category>
		<category><![CDATA[K.P. Sharma Oli]]></category>
		<category><![CDATA[Kathmandu]]></category>
		<category><![CDATA[Kerberoasting]]></category>
		<category><![CDATA[Kerberos]]></category>
		<category><![CDATA[latency]]></category>
		<category><![CDATA[lockfiles]]></category>
		<category><![CDATA[Magento]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mandiant]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[migration]]></category>
		<category><![CDATA[negligence]]></category>
		<category><![CDATA[nepal]]></category>
		<category><![CDATA[NetBlocks]]></category>
		<category><![CDATA[Node.js]]></category>
		<category><![CDATA[Npm]]></category>
		<category><![CDATA[OAuth]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[outages]]></category>
		<category><![CDATA[package.json]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Palo Alto Networks]]></category>
		<category><![CDATA[parliament]]></category>
		<category><![CDATA[patches.]]></category>
		<category><![CDATA[Philippines]]></category>
		<category><![CDATA[Proofpoint]]></category>
		<category><![CDATA[protests]]></category>
		<category><![CDATA[qix]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RC4]]></category>
		<category><![CDATA[red sea]]></category>
		<category><![CDATA[repair]]></category>
		<category><![CDATA[riot police]]></category>
		<category><![CDATA[Ron Wyden]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salesloft]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[SEA-ME-WE-4]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[SMB]]></category>
		<category><![CDATA[Snowflake]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[strip-ansi]]></category>
		<category><![CDATA[students]]></category>
		<category><![CDATA[submarine cables]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[Tenable]]></category>
		<category><![CDATA[tokens]]></category>
		<category><![CDATA[trust]]></category>
		<category><![CDATA[UNC6395]]></category>
		<category><![CDATA[unemployment]]></category>
		<category><![CDATA[US lawmakers]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[WeChat]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[Windows Server 2025]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32257</guid>

					<description><![CDATA[ Nepal Goes Offline, Then Up in Flames,
Wyden Targets Microsoft Over RC4 Use in Ransomware-Fueled Healthcare Breach,
Salesloft Breach Exposes OAuth Supply Chain Weakness Across Major Tech Platforms...this and more in AofE  #417<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-417-nepal-goes-offline-then-up-in-flames%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-417-nepal-goes-offline-then-up-in-flames&amp;action_name=%23AxisOfEasy%20417%3A%20Nepal%20Goes%20Offline%2C%20Then%20Up%20In%20Flames&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
	</channel>
</rss>
