<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>password theft</title>
	<atom:link href="https://axisofeasy.com/tag/password-theft/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 11 Jul 2025 15:56:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>password theft</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 408: Scammers Are Ready To Strike As Amazon Prime Day Begins Tomorrow</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/?pk_campaign=feed&#038;pk_kwd=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/?pk_campaign=feed&#038;pk_kwd=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 11 Jul 2025 22:00:17 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[130 vulnerabilities]]></category>
		<category><![CDATA[AI bots]]></category>
		<category><![CDATA[AI malware]]></category>
		<category><![CDATA[Amazon Prime Day]]></category>
		<category><![CDATA[AMOS]]></category>
		<category><![CDATA[Apple Keychain]]></category>
		<category><![CDATA[Bill C-63]]></category>
		<category><![CDATA[bot blocking]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[browser data theft]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship law]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Chinese hacker]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[content monetization]]></category>
		<category><![CDATA[COVID research theft]]></category>
		<category><![CDATA[crypto users]]></category>
		<category><![CDATA[CVE-2024-12856]]></category>
		<category><![CDATA[CVE-2024-3721]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[data scraping]]></category>
		<category><![CDATA[DDoS attacks]]></category>
		<category><![CDATA[email fraud]]></category>
		<category><![CDATA[encrypted malware]]></category>
		<category><![CDATA[fake domains]]></category>
		<category><![CDATA[fake Zoom invites]]></category>
		<category><![CDATA[firmware vulnerabilities]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[Four-Faith routers]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[government overreach]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[internet restrictions]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[macOS backdoor]]></category>
		<category><![CDATA[macOS malware]]></category>
		<category><![CDATA[Mark Carney]]></category>
		<category><![CDATA[Matthew Prince]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Defender evasion]]></category>
		<category><![CDATA[Minecraft disguise]]></category>
		<category><![CDATA[NimDoor]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Nova Scotia Power]]></category>
		<category><![CDATA[Online Harms Bill]]></category>
		<category><![CDATA[password theft]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[pay-per-crawl]]></category>
		<category><![CDATA[permission-first model]]></category>
		<category><![CDATA[persistent threats]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[proxy devices]]></category>
		<category><![CDATA[RondoDox]]></category>
		<category><![CDATA[Russian hackers]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[SentinelOne]]></category>
		<category><![CDATA[smart meters]]></category>
		<category><![CDATA[stealth attacks]]></category>
		<category><![CDATA[TBK DVRs]]></category>
		<category><![CDATA[Telegram attacks]]></category>
		<category><![CDATA[website control]]></category>
		<category><![CDATA[Xu Zewei]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31849</guid>

					<description><![CDATA[Scammers Are Ready to Strike as Amazon Prime Day Begins Tomorrow,
New Malware Turns Security Devices Into Silent Weapons for Cyber Attacks,
AI Bots Face a Toll as Cloudflare Makes Them Pay to Scrape Websites ...this and more in AofE  #408<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow&amp;action_name=%23AxisOfEasy%20408%3A%20Scammers%20Are%20Ready%20To%20Strike%20As%20Amazon%20Prime%20Day%20Begins%20Tomorrow&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/?pk_campaign=feed&#038;pk_kwd=axisofeasy-408-scammers-are-ready-to-strike-as-amazon-prime-day-begins-tomorrow/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 400: North Korean Hackers Infiltrate U.S. Tech Jobs With Fake Identities And Remote Access</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 16 May 2025 22:00:57 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[account compromise]]></category>
		<category><![CDATA[Albania]]></category>
		<category><![CDATA[AnyDesk]]></category>
		<category><![CDATA[Baby Box Info]]></category>
		<category><![CDATA[Belgium]]></category>
		<category><![CDATA[birthdate]]></category>
		<category><![CDATA[breach detection]]></category>
		<category><![CDATA[breach monetization]]></category>
		<category><![CDATA[call centers]]></category>
		<category><![CDATA[Co-Op]]></category>
		<category><![CDATA[compromised credentials]]></category>
		<category><![CDATA[coordinated raids]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[Cubix Tech US]]></category>
		<category><![CDATA[Customer Data Breach]]></category>
		<category><![CDATA[cyber fraud]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybercrime ring]]></category>
		<category><![CDATA[cybercrime statistics]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity response]]></category>
		<category><![CDATA[Cyprus]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[decryption mandate]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[Digital Safety]]></category>
		<category><![CDATA[DOJ indictment]]></category>
		<category><![CDATA[DPRK]]></category>
		<category><![CDATA[DragonForce]]></category>
		<category><![CDATA[Dubai]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[electronic seizures]]></category>
		<category><![CDATA[electronics shipping]]></category>
		<category><![CDATA[encryption backdoor]]></category>
		<category><![CDATA[encryption debate]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[English-Korean]]></category>
		<category><![CDATA[Eurojust]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[fake identities]]></category>
		<category><![CDATA[fake investment schemes]]></category>
		<category><![CDATA[fake resumes]]></category>
		<category><![CDATA[FBI report]]></category>
		<category><![CDATA[financial fraud]]></category>
		<category><![CDATA[Flashpoint]]></category>
		<category><![CDATA[Florida bill]]></category>
		<category><![CDATA[fraud prosecution]]></category>
		<category><![CDATA[fraudulent employment]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Google Translate]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Harrods]]></category>
		<category><![CDATA[Helix US]]></category>
		<category><![CDATA[home address]]></category>
		<category><![CDATA[HR verification scripts]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[incident disclosure]]></category>
		<category><![CDATA[infostealer logs]]></category>
		<category><![CDATA[internal hierarchy]]></category>
		<category><![CDATA[international operation]]></category>
		<category><![CDATA[investment fraud]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[job references]]></category>
		<category><![CDATA[jsilver617]]></category>
		<category><![CDATA[judicial oversight]]></category>
		<category><![CDATA[Lahore Pakistan]]></category>
		<category><![CDATA[Latvia]]></category>
		<category><![CDATA[law enforcement access]]></category>
		<category><![CDATA[legislative overreach]]></category>
		<category><![CDATA[London Stock Exchange update]]></category>
		<category><![CDATA[M&S]]></category>
		<category><![CDATA[Marks and Spencer]]></category>
		<category><![CDATA[minors online safety]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[Nickel Tapestry]]></category>
		<category><![CDATA[NIgeria]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[online gaming]]></category>
		<category><![CDATA[online orders]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[online shopping]]></category>
		<category><![CDATA[OTP codes]]></category>
		<category><![CDATA[password change]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[password reset]]></category>
		<category><![CDATA[password theft]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[phishing risk]]></category>
		<category><![CDATA[phishing risks]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[phone numbers]]></category>
		<category><![CDATA[pig butchering scam]]></category>
		<category><![CDATA[platform security]]></category>
		<category><![CDATA[platform vulnerability]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[professionalized hacking]]></category>
		<category><![CDATA[profit dashboard]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware-as-a-service]]></category>
		<category><![CDATA[remote access]]></category>
		<category><![CDATA[retail cybersecurity]]></category>
		<category><![CDATA[scam brokers]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Steam]]></category>
		<category><![CDATA[stolen identities]]></category>
		<category><![CDATA[subpoena access]]></category>
		<category><![CDATA[surveillance tools]]></category>
		<category><![CDATA[tech legislation]]></category>
		<category><![CDATA[Two-Factor Authentication]]></category>
		<category><![CDATA[U.S. infrastructure infiltration]]></category>
		<category><![CDATA[U.S. tech jobs]]></category>
		<category><![CDATA[UK retailers]]></category>
		<category><![CDATA[user accounts]]></category>
		<category><![CDATA[user privacy]]></category>
		<category><![CDATA[Valve]]></category>
		<category><![CDATA[victim grooming]]></category>
		<category><![CDATA[webcam avoidance]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31552</guid>

					<description><![CDATA[North Korean Hackers Infiltrate U.S. Tech Jobs with Fake Identities and Remote Access,
Steam Breach Exposes 89 Million Accounts in Dark Web Data Sale, 
Marks and Spencer Cyberattack Exposes Customer Data and Halts Online Orders (update from AoE #397)... this and more in AofE  #400<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access&amp;action_name=%23AxisOfEasy%20400%3A%20North%20Korean%20Hackers%20Infiltrate%20U.S.%20Tech%20Jobs%20With%20Fake%20Identities%20And%20Remote%20Access&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 399: Hackers Break Into Government Messaging App And Steal Sensitive Data</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data/?pk_campaign=feed&#038;pk_kwd=axisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data/?pk_campaign=feed&#038;pk_kwd=axisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 09 May 2025 22:00:58 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[account suspension]]></category>
		<category><![CDATA[AI app]]></category>
		<category><![CDATA[AI moderation]]></category>
		<category><![CDATA[AirBorne]]></category>
		<category><![CDATA[AirPlay]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[Apple devices]]></category>
		<category><![CDATA[Arctic Wolf Labs]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[business data leak]]></category>
		<category><![CDATA[CarPlay]]></category>
		<category><![CDATA[chat archive]]></category>
		<category><![CDATA[ClickFunnels]]></category>
		<category><![CDATA[Coinbase]]></category>
		<category><![CDATA[ComfyUI_LLMVISION]]></category>
		<category><![CDATA[content bans]]></category>
		<category><![CDATA[Customs and Border Protection]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Discord server]]></category>
		<category><![CDATA[Disney hack]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[fake resumes]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[federal charges]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[HR scam]]></category>
		<category><![CDATA[iPad]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[malware spread]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[Mike Waltz]]></category>
		<category><![CDATA[More_eggs]]></category>
		<category><![CDATA[NordPass]]></category>
		<category><![CDATA[NSO Group]]></category>
		<category><![CDATA[Oligo]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[password theft]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Pinterest]]></category>
		<category><![CDATA[public Wi-Fi]]></category>
		<category><![CDATA[reddit]]></category>
		<category><![CDATA[router security]]></category>
		<category><![CDATA[Scotiabank]]></category>
		<category><![CDATA[signal]]></category>
		<category><![CDATA[Smarsh]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[TeleMessage]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[U.S. Government]]></category>
		<category><![CDATA[Venom Spider]]></category>
		<category><![CDATA[vpnMentor]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[X (Twitter)]]></category>
		<category><![CDATA[Zero-click]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31515</guid>

					<description><![CDATA[Hackers Break Into Government Messaging App and Steal Sensitive Data,
Hackers Are Tricking Recruiters With Fake Resumes and It’s Working, 
Disney Hacker Used Fake AI App to Steal Over 1TB of Secrets... this and more in AofE  #399<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data&amp;action_name=%23AxisOfEasy%20399%3A%20Hackers%20Break%20Into%20Government%20Messaging%20App%20And%20Steal%20Sensitive%20Data&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data/?pk_campaign=feed&#038;pk_kwd=axisofeasy-399-hackers-break-into-government-messaging-app-and-steal-sensitive-data/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
