<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>phishing</title>
	<atom:link href="https://axisofeasy.com/tag/phishing/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 17 Apr 2026 16:38:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>phishing</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 446: Internet Content Regulation Is Coming To Canada</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?pk_campaign=feed&#038;pk_kwd=axisofeasy-446-internet-content-regulation-is-coming-to-canada&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-446-internet-content-regulation-is-coming-to-canada</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?pk_campaign=feed&#038;pk_kwd=axisofeasy-446-internet-content-regulation-is-coming-to-canada#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 22:00:47 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI agents]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[antivirus evasion]]></category>
		<category><![CDATA[API keys]]></category>
		<category><![CDATA[APT41]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[banking malware]]></category>
		<category><![CDATA[C2 persistence]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Claude AI]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Copilot]]></category>
		<category><![CDATA[court order]]></category>
		<category><![CDATA[credential harvesting]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[delusions]]></category>
		<category><![CDATA[DLL sideloading]]></category>
		<category><![CDATA[Electron malware]]></category>
		<category><![CDATA[email phishing]]></category>
		<category><![CDATA[First Amendment]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[Gemini]]></category>
		<category><![CDATA[GitHub Actions]]></category>
		<category><![CDATA[government policy]]></category>
		<category><![CDATA[InfoStealer]]></category>
		<category><![CDATA[internet regulation]]></category>
		<category><![CDATA[ISP monitoring]]></category>
		<category><![CDATA[JanelaRAT]]></category>
		<category><![CDATA[Latin America attacks]]></category>
		<category><![CDATA[legal case]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft update scam]]></category>
		<category><![CDATA[Mirax trojan]]></category>
		<category><![CDATA[n8n abuse]]></category>
		<category><![CDATA[obfuscation]]></category>
		<category><![CDATA[Online Harms]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PlugX]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[Python payloads]]></category>
		<category><![CDATA[Rockstar Games]]></category>
		<category><![CDATA[SharePoint exploit]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[social media ban]]></category>
		<category><![CDATA[spoofed software]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[threat actors]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[workflow automation]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33713</guid>

					<description><![CDATA[Internet Content Regulation is Coming To Canada,
Court Orders OpenAI to Block User in ChatGPT Case Raising Free Speech Concerns,
Fake Claude “Pro” Site Spreads PlugX Malware via DLL Sideloading... this and more in AofE  #446<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-446-internet-content-regulation-is-coming-to-canada%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-446-internet-content-regulation-is-coming-to-canada&amp;action_name=%23AxisOfEasy%20446%3A%20Internet%20Content%20Regulation%20Is%20Coming%20To%20Canada&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?pk_campaign=feed&#038;pk_kwd=axisofeasy-446-internet-content-regulation-is-coming-to-canada/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 441: Canada Allows TikTok To Continue Operations With New Safeguards</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards/?pk_campaign=feed&#038;pk_kwd=axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards/?pk_campaign=feed&#038;pk_kwd=axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 13 Mar 2026 22:00:36 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Android Trojan]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[backups]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[Browser Extensions]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[certificate automation]]></category>
		<category><![CDATA[certificates]]></category>
		<category><![CDATA[China relations]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[CVE-2026-0628]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data loss]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Gemini]]></category>
		<category><![CDATA[GitHub supply chain]]></category>
		<category><![CDATA[government policy]]></category>
		<category><![CDATA[infrastructure security]]></category>
		<category><![CDATA[internet infrastructure]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[messaging apps]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[open web]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PKI]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[restore testing]]></category>
		<category><![CDATA[router malware]]></category>
		<category><![CDATA[Russian hackers]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[signal]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[technology policy]]></category>
		<category><![CDATA[Terraform]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[TLS]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[website operations]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[WordPress security]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33412</guid>

					<description><![CDATA[Canada Allows TikTok to Continue Operations with New Safeguards,
Russian government hackers targeting Signal and WhatsApp users, Dutch spies warn, 
Canadian Tire Data Breach Hits Millions... this and more in AofE  #441<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards&amp;action_name=%23AxisOfEasy%20441%3A%20Canada%20Allows%20TikTok%20To%20Continue%20Operations%20With%20New%20Safeguards&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards/?pk_campaign=feed&#038;pk_kwd=axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 433: Australia Moves To Enact Sweeping New Hate Speech And Extremism Laws</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 23:00:28 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[agentic AI]]></category>
		<category><![CDATA[AI impact]]></category>
		<category><![CDATA[AI model reconnaissance]]></category>
		<category><![CDATA[AI Red Teaming]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[AI Tooling Risks]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[antisemitism]]></category>
		<category><![CDATA[AsyncRAT]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[blockchain abuse]]></category>
		<category><![CDATA[burden of proof]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[C2 evasion]]></category>
		<category><![CDATA[Check Point Research]]></category>
		<category><![CDATA[Chinese threat actors]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cloudflare abuse]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[cyber extortion]]></category>
		<category><![CDATA[cybercrime-as-a-service]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[data breaches]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[DeadLock]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[developer layoffs]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[extremism legislation]]></category>
		<category><![CDATA[fintech security]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[generative AI abuse]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[government censorship]]></category>
		<category><![CDATA[Group-IB]]></category>
		<category><![CDATA[Hacker News]]></category>
		<category><![CDATA[hate speech laws]]></category>
		<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[law enforcement powers]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[LLM Exploits]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[micropayments]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Model Isolation Failures]]></category>
		<category><![CDATA[online speech]]></category>
		<category><![CDATA[open source software]]></category>
		<category><![CDATA[OS command injection]]></category>
		<category><![CDATA[parliament]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing campaigns]]></category>
		<category><![CDATA[Polygon]]></category>
		<category><![CDATA[Privacy & PII]]></category>
		<category><![CDATA[prohibited groups]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reclaim The Net]]></category>
		<category><![CDATA[RedVDS]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Secure AI Design]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[software sustainability]]></category>
		<category><![CDATA[SSH key theft]]></category>
		<category><![CDATA[SSRF attacks]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[supply-chain risk]]></category>
		<category><![CDATA[Tailwind CSS]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[voice cloning]]></category>
		<category><![CDATA[VoidLink]]></category>
		<category><![CDATA[Windows security patches]]></category>
		<category><![CDATA[X402 protocol]]></category>
		<category><![CDATA[zero-day vulnerabilities]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32970</guid>

					<description><![CDATA[Australia Moves to Enact Sweeping New Hate Speech and Extremism Laws,
Can x402 micropayments save Open Source Software?
Claude Cowork Exfiltrates Files ... this and more in AofE  #433<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&amp;action_name=%23AxisOfEasy%20433%3A%20Australia%20Moves%20To%20Enact%20Sweeping%20New%20Hate%20Speech%20And%20Extremism%20Laws&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 431: UK Moves Toward Mandatory Phone Surveillance</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 19 Dec 2025 23:00:04 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple developer account disabled]]></category>
		<category><![CDATA[Apple ID bricked devices]]></category>
		<category><![CDATA[APT28 Ukraine phishing]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Axis Of Easy]]></category>
		<category><![CDATA[AxisOfEasy]]></category>
		<category><![CDATA[Bill C-9 hate speech]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[Canada religious speech protections]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[Charles Hugh Smith]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CSAM scanning bill]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[government overreach]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[mandatory device scanning]]></category>
		<category><![CDATA[Mark E. Jeftovic]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phone security]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[PornHub data breach]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[ShinyHunters extortion]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tech news]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[twitter]]></category>
		<category><![CDATA[uk government]]></category>
		<category><![CDATA[UK phone surveillance]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32898</guid>

					<description><![CDATA[UK pushes mandatory phone surveillance on all devices—plus Apple bricks developer's $30K ecosystem, PornHub extortion, &#038; Canada strips religious speech protections. #AxisOfEasy weekly digest<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-431-uk-moves-toward-mandatory-phone-surveillance%2F&amp;action_name=%23AxisOfEasy%20431%3A%20UK%20Moves%20Toward%20Mandatory%20Phone%20Surveillance&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 425: Microsoft Teams Security Flaws Show How Easily Digital Trust Can Be Exploited</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/?pk_campaign=feed&#038;pk_kwd=axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/?pk_campaign=feed&#038;pk_kwd=axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 07 Nov 2025 23:00:46 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[ai browser]]></category>
		<category><![CDATA[ai companions]]></category>
		<category><![CDATA[AI governance]]></category>
		<category><![CDATA[ai threat surface]]></category>
		<category><![CDATA[antonio guterres]]></category>
		<category><![CDATA[california ai law]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[character.ai]]></category>
		<category><![CDATA[chatgpt atlas]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[cisa kev]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[code injection]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[csrf exploit]]></category>
		<category><![CDATA[cve-2025-24893]]></category>
		<category><![CDATA[cybercrime treaty]]></category>
		<category><![CDATA[cybersecurity tech accord]]></category>
		<category><![CDATA[daniel de freitas]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[dentsu merkle]]></category>
		<category><![CDATA[dia browser]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[discord tokens]]></category>
		<category><![CDATA[DoJ]]></category>
		<category><![CDATA[edge browser]]></category>
		<category><![CDATA[EFF]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[global cybersecurity]]></category>
		<category><![CDATA[human rights watch]]></category>
		<category><![CDATA[hydra communications]]></category>
		<category><![CDATA[indicators of compromise]]></category>
		<category><![CDATA[josh hawley]]></category>
		<category><![CDATA[L3Harris]]></category>
		<category><![CDATA[lawsuits]]></category>
		<category><![CDATA[layerx security]]></category>
		<category><![CDATA[legal risk]]></category>
		<category><![CDATA[mental health]]></category>
		<category><![CDATA[Microsoft Azure]]></category>
		<category><![CDATA[neuraltrust]]></category>
		<category><![CDATA[noam shazeer]]></category>
		<category><![CDATA[npm packages]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[payroll breach]]></category>
		<category><![CDATA[perplexit comet]]></category>
		<category><![CDATA[persistent memory]]></category>
		<category><![CDATA[peter williams]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[redtiger infostealer]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Richard Blumenthal]]></category>
		<category><![CDATA[russian buyer]]></category>
		<category><![CDATA[senate legislation]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[solr search vulnerability]]></category>
		<category><![CDATA[suicide prevention]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tata motors]]></category>
		<category><![CDATA[tcrond coinminer]]></category>
		<category><![CDATA[TechCrunch]]></category>
		<category><![CDATA[teen safety]]></category>
		<category><![CDATA[Trade Secrets]]></category>
		<category><![CDATA[united nations]]></category>
		<category><![CDATA[unodc]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[vulncheck]]></category>
		<category><![CDATA[xwiki]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32597</guid>

					<description><![CDATA[Microsoft Teams Security Flaws Show How Easily Digital Trust Can Be Exploited,
DHS Plans to Collect Biometrics from Immigrants and US Citizens Alike, 
Threat Actors Have Turned the OpenAI Assistants API Into a Stealthy Malware Control Channel .. this and more in AofE  #425<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited&amp;action_name=%23AxisOfEasy%20425%3A%20Microsoft%20Teams%20Security%20Flaws%20Show%20How%20Easily%20Digital%20Trust%20Can%20Be%20Exploited&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/?pk_campaign=feed&#038;pk_kwd=axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 424: ChatGPT Atlas Exploit Exposes Persistent Memory Vulnerability In AI Browsers</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 31 Oct 2025 22:00:51 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[ai browser]]></category>
		<category><![CDATA[ai companions]]></category>
		<category><![CDATA[AI governance]]></category>
		<category><![CDATA[ai threat surface]]></category>
		<category><![CDATA[antonio guterres]]></category>
		<category><![CDATA[california ai law]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[character.ai]]></category>
		<category><![CDATA[chatgpt atlas]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[cisa kev]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[code injection]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[csrf exploit]]></category>
		<category><![CDATA[cve-2025-24893]]></category>
		<category><![CDATA[cybercrime treaty]]></category>
		<category><![CDATA[cybersecurity tech accord]]></category>
		<category><![CDATA[daniel de freitas]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[dentsu merkle]]></category>
		<category><![CDATA[dia browser]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[discord tokens]]></category>
		<category><![CDATA[DoJ]]></category>
		<category><![CDATA[edge browser]]></category>
		<category><![CDATA[EFF]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[global cybersecurity]]></category>
		<category><![CDATA[human rights watch]]></category>
		<category><![CDATA[hydra communications]]></category>
		<category><![CDATA[indicators of compromise]]></category>
		<category><![CDATA[josh hawley]]></category>
		<category><![CDATA[L3Harris]]></category>
		<category><![CDATA[lawsuits]]></category>
		<category><![CDATA[layerx security]]></category>
		<category><![CDATA[legal risk]]></category>
		<category><![CDATA[mental health]]></category>
		<category><![CDATA[Microsoft Azure]]></category>
		<category><![CDATA[neuraltrust]]></category>
		<category><![CDATA[noam shazeer]]></category>
		<category><![CDATA[npm packages]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[payroll breach]]></category>
		<category><![CDATA[perplexit comet]]></category>
		<category><![CDATA[persistent memory]]></category>
		<category><![CDATA[peter williams]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[redtiger infostealer]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Richard Blumenthal]]></category>
		<category><![CDATA[russian buyer]]></category>
		<category><![CDATA[senate legislation]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[solr search vulnerability]]></category>
		<category><![CDATA[suicide prevention]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tata motors]]></category>
		<category><![CDATA[tcrond coinminer]]></category>
		<category><![CDATA[TechCrunch]]></category>
		<category><![CDATA[teen safety]]></category>
		<category><![CDATA[Trade Secrets]]></category>
		<category><![CDATA[united nations]]></category>
		<category><![CDATA[unodc]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[vulncheck]]></category>
		<category><![CDATA[xwiki]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32557</guid>

					<description><![CDATA[ChatGPT Atlas Exploit Exposes Persistent Memory Vulnerability in AI Browsers,
CharacterAI Restricts Teen Access Amid Legal and Regulatory Backlash Over AI Chat Risks,
XWiki Servers Under Active Attack Through Critical Solr Search Vulnerability... this and more in AofE  #424<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers&amp;action_name=%23AxisOfEasy%20424%3A%20ChatGPT%20Atlas%20Exploit%20Exposes%20Persistent%20Memory%20Vulnerability%20In%20AI%20Browsers&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 423: Amazon Web Services Outage Disrupts Major Online Platforms</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms/?pk_campaign=feed&#038;pk_kwd=axisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms/?pk_campaign=feed&#038;pk_kwd=axisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 24 Oct 2025 22:00:38 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Alexa]]></category>
		<category><![CDATA[algorithmic risk models]]></category>
		<category><![CDATA[Amazon Web Services]]></category>
		<category><![CDATA[Amnesty International]]></category>
		<category><![CDATA[Anti-Money Laundering]]></category>
		<category><![CDATA[Apple security alert]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[AWS outage]]></category>
		<category><![CDATA[Bill C-2]]></category>
		<category><![CDATA[Bill C-8]]></category>
		<category><![CDATA[Bill C-9]]></category>
		<category><![CDATA[Bitter APT]]></category>
		<category><![CDATA[BMO]]></category>
		<category><![CDATA[Citizen Lab]]></category>
		<category><![CDATA[cloud infrastructure]]></category>
		<category><![CDATA[customer rights]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity law]]></category>
		<category><![CDATA[debanking]]></category>
		<category><![CDATA[digital dependency]]></category>
		<category><![CDATA[DNS failure]]></category>
		<category><![CDATA[Epic Games]]></category>
		<category><![CDATA[fake news]]></category>
		<category><![CDATA[financial surveillance]]></category>
		<category><![CDATA[Fortnite]]></category>
		<category><![CDATA[Freedom of Speech]]></category>
		<category><![CDATA[Google Ads scams]]></category>
		<category><![CDATA[L3Harris]]></category>
		<category><![CDATA[malware campaign]]></category>
		<category><![CDATA[mercenary surveillance]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[MuddyWater]]></category>
		<category><![CDATA[NSO Group]]></category>
		<category><![CDATA[online hate]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[Perplexity]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[RBC]]></category>
		<category><![CDATA[risk controls]]></category>
		<category><![CDATA[Scotiabank]]></category>
		<category><![CDATA[service disruption]]></category>
		<category><![CDATA[SIM box fraud]]></category>
		<category><![CDATA[Snapchat]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[spyware litigation]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[system resilience]]></category>
		<category><![CDATA[TD Bank]]></category>
		<category><![CDATA[Trenchant]]></category>
		<category><![CDATA[Ukraine aid]]></category>
		<category><![CDATA[US-EAST-1]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[zero-day exploits]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32516</guid>

					<description><![CDATA[Amazon Web Services Outage Disrupts Major Online Platforms,
Banks End Client Relationships Without Explanation Amid Rising Risk Controls,
Freedom Under Fire? New Bills, New Problems... this and more in AofE  #423<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms&amp;action_name=%23AxisOfEasy%20423%3A%20Amazon%20Web%20Services%20Outage%20Disrupts%20Major%20Online%20Platforms&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms/?pk_campaign=feed&#038;pk_kwd=axisofeasy-423-amazon-web-services-outage-disrupts-major-online-platforms/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 422: Why Treating AI As A Tool Is A Dangerous Illusion</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 17 Oct 2025 22:00:38 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[alignment]]></category>
		<category><![CDATA[Android flaw]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Astaroth Trojan]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Axis Of Easy]]></category>
		<category><![CDATA[Bill C-8]]></category>
		<category><![CDATA[BYOVD]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Claude Sonnet 4.5]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[credential dumping]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[Dufresne]]></category>
		<category><![CDATA[Earth Alux]]></category>
		<category><![CDATA[ECHOAC]]></category>
		<category><![CDATA[economic impact]]></category>
		<category><![CDATA[email rules]]></category>
		<category><![CDATA[emergent behavior]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ethical AI]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[existential risk]]></category>
		<category><![CDATA[Federal Reserve]]></category>
		<category><![CDATA[FIDO]]></category>
		<category><![CDATA[Gelsemium]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[Harvard University]]></category>
		<category><![CDATA[House of Commons]]></category>
		<category><![CDATA[HR systems]]></category>
		<category><![CDATA[initial access]]></category>
		<category><![CDATA[Italy]]></category>
		<category><![CDATA[Jack Clark]]></category>
		<category><![CDATA[Jewelbug]]></category>
		<category><![CDATA[Lucky Mouse]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[Mechanize]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Mimikatz]]></category>
		<category><![CDATA[misaligned optimization]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Oracle EBS]]></category>
		<category><![CDATA[Paragon]]></category>
		<category><![CDATA[passkeys]]></category>
		<category><![CDATA[Payroll Pirate]]></category>
		<category><![CDATA[persistence]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Pixnapping]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Commissioner]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reclaim The Net]]></category>
		<category><![CDATA[REF7707]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[reward hacking]]></category>
		<category><![CDATA[RMM]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[safety data]]></category>
		<category><![CDATA[ScreenConnect]]></category>
		<category><![CDATA[ShadowPad]]></category>
		<category><![CDATA[situational awareness]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Symantec]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[TechCrunch]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[The Hacker News]]></category>
		<category><![CDATA[threat actors]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[universities]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[warrantless access]]></category>
		<category><![CDATA[Workday]]></category>
		<category><![CDATA[Yandex Cloud]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32461</guid>

					<description><![CDATA[Why Treating AI as a Tool Is a Dangerous Illusion,
Chinese Espionage Group Expands Into Russia Through Jewelbug Cyber Campaign,
Cabinet Push for Secret Telecom Cutoffs Raises Privacy Concerns... this and more in AofE  #422<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion&amp;action_name=%23AxisOfEasy%20422%3A%20Why%20Treating%20AI%20As%20A%20Tool%20Is%20A%20Dangerous%20Illusion&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 420: RedNovember&#8217;s Global Cyber-Espionage Blitz</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-420-rednovembers-global-cyber-espionage-blitz</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 03 Oct 2025 22:00:20 +0000</pubDate>
				<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[C11]]></category>
		<category><![CDATA[C18]]></category>
		<category><![CDATA[Canadian Legislation]]></category>
		<category><![CDATA[Canadian Privacy Laws]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[IT Privacy]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Security Software]]></category>
		<category><![CDATA[Social Media Censorship]]></category>
		<category><![CDATA[Surveillance]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32398</guid>

					<description><![CDATA[RedNovember's Global Cyber-Espionage Blitz<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-420-rednovembers-global-cyber-espionage-blitz%2F&amp;action_name=%23AxisOfEasy%20420%3A%20RedNovember%26%238217%3Bs%20Global%20Cyber-Espionage%20Blitz&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 418: DHS Misconfiguration Exposes Surveillance Data To Thousands Of Unauthorized Users</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/?pk_campaign=feed&#038;pk_kwd=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/?pk_campaign=feed&#038;pk_kwd=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 22:00:26 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Acronis TikTok]]></category>
		<category><![CDATA[AI-generated images]]></category>
		<category><![CDATA[AI-powered scripts]]></category>
		<category><![CDATA[Alexander McQueen]]></category>
		<category><![CDATA[algorithm control]]></category>
		<category><![CDATA[American First Finance]]></category>
		<category><![CDATA[Andreessen Horowitz]]></category>
		<category><![CDATA[anomaly detection]]></category>
		<category><![CDATA[antivirus evasion TA558]]></category>
		<category><![CDATA[Balenciaga]]></category>
		<category><![CDATA[bitcoin ransom]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[browsers]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[Cartier]]></category>
		<category><![CDATA[chalk]]></category>
		<category><![CDATA[Chinese hacking]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[ClickFix]]></category>
		<category><![CDATA[cloud apps]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[credentials theft]]></category>
		<category><![CDATA[crypto hijacking]]></category>
		<category><![CDATA[Crypto Wallets]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[customer impact]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exposure]]></category>
		<category><![CDATA[data sovereignty]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[debug]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[disruption]]></category>
		<category><![CDATA[divestment deadline]]></category>
		<category><![CDATA[duckdb]]></category>
		<category><![CDATA[ecosystem fragility FileFix]]></category>
		<category><![CDATA[email compromise Raven Stealer]]></category>
		<category><![CDATA[email leaks]]></category>
		<category><![CDATA[export controls]]></category>
		<category><![CDATA[Facebook phishing]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[FOIA]]></category>
		<category><![CDATA[foreign cyber operations]]></category>
		<category><![CDATA[fusion centers]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[General Atlantic]]></category>
		<category><![CDATA[Gucci]]></category>
		<category><![CDATA[hardware keys]]></category>
		<category><![CDATA[high-end cyberattacks]]></category>
		<category><![CDATA[Homeland Security]]></category>
		<category><![CDATA[hospitality sector TA415]]></category>
		<category><![CDATA[hotels]]></category>
		<category><![CDATA[HSIN-Intel]]></category>
		<category><![CDATA[impersonation]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[javascript]]></category>
		<category><![CDATA[KKR]]></category>
		<category><![CDATA[lawmaker phishing FinWise Bank]]></category>
		<category><![CDATA[Lazarus Group]]></category>
		<category><![CDATA[legislation Kering]]></category>
		<category><![CDATA[local law enforcement]]></category>
		<category><![CDATA[Louis Vuitton]]></category>
		<category><![CDATA[luxury brands]]></category>
		<category><![CDATA[malicious packages]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Maven Central]]></category>
		<category><![CDATA[messaging platforms]]></category>
		<category><![CDATA[misconfiguration]]></category>
		<category><![CDATA[mr. d0x]]></category>
		<category><![CDATA[multi-language]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[NCTC]]></category>
		<category><![CDATA[npm support impersonation]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[Oracle]]></category>
		<category><![CDATA[oversight]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[payment data]]></category>
		<category><![CDATA[personally identifiable information]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing campaign]]></category>
		<category><![CDATA[phishing-as-a-service]]></category>
		<category><![CDATA[policy debate Microsoft]]></category>
		<category><![CDATA[PowerShell injection]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Protecting Americans from Foreign Adversary Controlled Applications Act]]></category>
		<category><![CDATA[protest surveillance]]></category>
		<category><![CDATA[PyPI]]></category>
		<category><![CDATA[RaccoonO365]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[recommendation system]]></category>
		<category><![CDATA[registries]]></category>
		<category><![CDATA[RubyGems]]></category>
		<category><![CDATA[Salesforce credentials]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[secondary scams]]></category>
		<category><![CDATA[Shiny Hunters]]></category>
		<category><![CDATA[Silver Lake]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Spain]]></category>
		<category><![CDATA[StealC infostealer]]></category>
		<category><![CDATA[steganography]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Susquehanna]]></category>
		<category><![CDATA[Telegram]]></category>
		<category><![CDATA[thousands of organizations]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[two-factor authentication npm]]></category>
		<category><![CDATA[U.S. consortium]]></category>
		<category><![CDATA[U.S. organizations]]></category>
		<category><![CDATA[U.S. ownership]]></category>
		<category><![CDATA[U.S.-China relations]]></category>
		<category><![CDATA[UK NCSC]]></category>
		<category><![CDATA[unauthorized access]]></category>
		<category><![CDATA[UNC6040]]></category>
		<category><![CDATA[VPNs]]></category>
		<category><![CDATA[VS Code backdoor]]></category>
		<category><![CDATA[Windows Explorer exploit]]></category>
		<category><![CDATA[zero-day response]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32305</guid>

					<description><![CDATA[DHS Misconfiguration Exposes Surveillance Data to Thousands of Unauthorized Users,
Kering Suffers Data Breach Targeting Luxury Shoppers Amid Surge in High-End Cyberattacks,
Phishing Breach Exposes Fragility of the JavaScript Ecosystem...this and more in AofE  #418<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users&amp;action_name=%23AxisOfEasy%20418%3A%20DHS%20Misconfiguration%20Exposes%20Surveillance%20Data%20To%20Thousands%20Of%20Unauthorized%20Users&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/?pk_campaign=feed&#038;pk_kwd=axisofeasy-418-dhs-misconfiguration-exposes-surveillance-data-to-thousands-of-unauthorized-users/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
