<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>prompt injection</title>
	<atom:link href="https://axisofeasy.com/tag/prompt-injection/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 17 Apr 2026 16:38:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>prompt injection</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 446: Internet Content Regulation Is Coming To Canada</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?pk_campaign=feed&#038;pk_kwd=axisofeasy-446-internet-content-regulation-is-coming-to-canada&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-446-internet-content-regulation-is-coming-to-canada</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?pk_campaign=feed&#038;pk_kwd=axisofeasy-446-internet-content-regulation-is-coming-to-canada#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 22:00:47 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI agents]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[antivirus evasion]]></category>
		<category><![CDATA[API keys]]></category>
		<category><![CDATA[APT41]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[banking malware]]></category>
		<category><![CDATA[C2 persistence]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Claude AI]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Copilot]]></category>
		<category><![CDATA[court order]]></category>
		<category><![CDATA[credential harvesting]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[delusions]]></category>
		<category><![CDATA[DLL sideloading]]></category>
		<category><![CDATA[Electron malware]]></category>
		<category><![CDATA[email phishing]]></category>
		<category><![CDATA[First Amendment]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[Gemini]]></category>
		<category><![CDATA[GitHub Actions]]></category>
		<category><![CDATA[government policy]]></category>
		<category><![CDATA[InfoStealer]]></category>
		<category><![CDATA[internet regulation]]></category>
		<category><![CDATA[ISP monitoring]]></category>
		<category><![CDATA[JanelaRAT]]></category>
		<category><![CDATA[Latin America attacks]]></category>
		<category><![CDATA[legal case]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft update scam]]></category>
		<category><![CDATA[Mirax trojan]]></category>
		<category><![CDATA[n8n abuse]]></category>
		<category><![CDATA[obfuscation]]></category>
		<category><![CDATA[Online Harms]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PlugX]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[Python payloads]]></category>
		<category><![CDATA[Rockstar Games]]></category>
		<category><![CDATA[SharePoint exploit]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[social media ban]]></category>
		<category><![CDATA[spoofed software]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[threat actors]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[workflow automation]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33713</guid>

					<description><![CDATA[Internet Content Regulation is Coming To Canada,
Court Orders OpenAI to Block User in ChatGPT Case Raising Free Speech Concerns,
Fake Claude “Pro” Site Spreads PlugX Malware via DLL Sideloading... this and more in AofE  #446<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-446-internet-content-regulation-is-coming-to-canada%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-446-internet-content-regulation-is-coming-to-canada&amp;action_name=%23AxisOfEasy%20446%3A%20Internet%20Content%20Regulation%20Is%20Coming%20To%20Canada&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?pk_campaign=feed&#038;pk_kwd=axisofeasy-446-internet-content-regulation-is-coming-to-canada/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 442: Canada Introduces Bill C-22 For Mandatory Metadata Retention</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 20 Mar 2026 22:00:54 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI music]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Bill C-22]]></category>
		<category><![CDATA[C2 framework]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Claude AI]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[Crypto Wallets]]></category>
		<category><![CDATA[CSIS]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DarkSword]]></category>
		<category><![CDATA[data brokers]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[evasion]]></category>
		<category><![CDATA[exploit kit]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Fourth Amendment]]></category>
		<category><![CDATA[geolocation tracking]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Glassworm]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Handala hackers]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[Interlock]]></category>
		<category><![CDATA[iOS vulnerabilities]]></category>
		<category><![CDATA[Lawful Access]]></category>
		<category><![CDATA[Linux security]]></category>
		<category><![CDATA[location data]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[metadata retention]]></category>
		<category><![CDATA[Npm]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RCMP]]></category>
		<category><![CDATA[real estate]]></category>
		<category><![CDATA[root access]]></category>
		<category><![CDATA[snapd]]></category>
		<category><![CDATA[SnappyClient]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[stolen credentials]]></category>
		<category><![CDATA[Stryker breach]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[systemd]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<category><![CDATA[Unicode obfuscation]]></category>
		<category><![CDATA[virtual band]]></category>
		<category><![CDATA[warrants]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33472</guid>

					<description><![CDATA[Canada Introduces Bill C-22 For Mandatory Metadata Retention
Meta is Ending Instagram Direct Message End-to-End Encryption
Invisible Unicode Supply-Chain Attack Hits GitHub Ecosystem... this and more in AofE  #442<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention&amp;action_name=%23AxisOfEasy%20442%3A%20Canada%20Introduces%20Bill%20C-22%20For%20Mandatory%20Metadata%20Retention&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisofEasy 434: Ireland Moves To Expand Digital Surveillance Powers</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 23 Jan 2026 23:00:52 +0000</pubDate>
				<category><![CDATA[AI malware]]></category>
		<category><![CDATA[Biometric Verification]]></category>
		<category><![CDATA[calendar vulnerability]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[cybersecurity update]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[digital ID]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Google Gemini]]></category>
		<category><![CDATA[government data breach]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Ireland surveillance bill]]></category>
		<category><![CDATA[KOSMA bill]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Concerns]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security threats]]></category>
		<category><![CDATA[social media age verification]]></category>
		<category><![CDATA[Supreme Court hack]]></category>
		<category><![CDATA[tech news]]></category>
		<category><![CDATA[VoidLink]]></category>
		<category><![CDATA[weekly security news]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=33022</guid>

					<description><![CDATA[Ireland ramps up surveillance powers while AI builds malware in days. KOSMA demands digital ID age checks. Google Gemini flaw exposes calendars. Supreme Court hacked. Your privacy under attack.<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers%2F&amp;action_name=%23AxisofEasy%20434%3A%20Ireland%20Moves%20To%20Expand%20Digital%20Surveillance%20Powers&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 433: Australia Moves To Enact Sweeping New Hate Speech And Extremism Laws</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 23:00:28 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[agentic AI]]></category>
		<category><![CDATA[AI impact]]></category>
		<category><![CDATA[AI model reconnaissance]]></category>
		<category><![CDATA[AI Red Teaming]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[AI Tooling Risks]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[antisemitism]]></category>
		<category><![CDATA[AsyncRAT]]></category>
		<category><![CDATA[australia]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[blockchain abuse]]></category>
		<category><![CDATA[burden of proof]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[C2 evasion]]></category>
		<category><![CDATA[Check Point Research]]></category>
		<category><![CDATA[Chinese threat actors]]></category>
		<category><![CDATA[Cisco Talos]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cloudflare abuse]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[cyber extortion]]></category>
		<category><![CDATA[cybercrime-as-a-service]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[data breaches]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[DeadLock]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[developer layoffs]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[extremism legislation]]></category>
		<category><![CDATA[fintech security]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[generative AI abuse]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[government censorship]]></category>
		<category><![CDATA[Group-IB]]></category>
		<category><![CDATA[Hacker News]]></category>
		<category><![CDATA[hate speech laws]]></category>
		<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[law enforcement powers]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[LLM Exploits]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[micropayments]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Model Isolation Failures]]></category>
		<category><![CDATA[online speech]]></category>
		<category><![CDATA[open source software]]></category>
		<category><![CDATA[OS command injection]]></category>
		<category><![CDATA[parliament]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing campaigns]]></category>
		<category><![CDATA[Polygon]]></category>
		<category><![CDATA[Privacy & PII]]></category>
		<category><![CDATA[prohibited groups]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reclaim The Net]]></category>
		<category><![CDATA[RedVDS]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Secure AI Design]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[software sustainability]]></category>
		<category><![CDATA[SSH key theft]]></category>
		<category><![CDATA[SSRF attacks]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[supply-chain risk]]></category>
		<category><![CDATA[Tailwind CSS]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[voice cloning]]></category>
		<category><![CDATA[VoidLink]]></category>
		<category><![CDATA[Windows security patches]]></category>
		<category><![CDATA[X402 protocol]]></category>
		<category><![CDATA[zero-day vulnerabilities]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32970</guid>

					<description><![CDATA[Australia Moves to Enact Sweeping New Hate Speech and Extremism Laws,
Can x402 micropayments save Open Source Software?
Claude Cowork Exfiltrates Files ... this and more in AofE  #433<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws&amp;action_name=%23AxisOfEasy%20433%3A%20Australia%20Moves%20To%20Enact%20Sweeping%20New%20Hate%20Speech%20And%20Extremism%20Laws&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?pk_campaign=feed&#038;pk_kwd=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 433: Australia Moves To Enact Sweeping New Hate Speech And Extremism Laws</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/#comments</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 23:00:09 +0000</pubDate>
				<category><![CDATA[AI security]]></category>
		<category><![CDATA[attack analysis]]></category>
		<category><![CDATA[Australia hate speech law]]></category>
		<category><![CDATA[BEC]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[Claude Cowork]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[CVE-2025-64155]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[DeadLock]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[FortiSIEM]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[January 2026]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[micropayments]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RCE]]></category>
		<category><![CDATA[RedVDS]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[VoidLink]]></category>
		<category><![CDATA[x402]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32986</guid>

					<description><![CDATA[Australia is moving to criminalize speech based on hypothetical harm. Meanwhile, Claude Co-Work is exfiltrating your files, and six critical attack stories expose systematic infrastructure failure - this is #AxisofEasy 433<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws%2F&amp;action_name=%23AxisOfEasy%20433%3A%20Australia%20Moves%20To%20Enact%20Sweeping%20New%20Hate%20Speech%20And%20Extremism%20Laws&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 428: Samsung Faces Renewed Scrutiny Over Hidden Spyware Claims On Its Budget Phones</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-428-samsung-faces-renewed-scrutiny-over-hidden-spyware-claims-on-its-budget-phones/?pk_campaign=feed&#038;pk_kwd=axisofeasy-428-samsung-faces-renewed-scrutiny-over-hidden-spyware-claims-on-its-budget-phones&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-428-samsung-faces-renewed-scrutiny-over-hidden-spyware-claims-on-its-budget-phones</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-428-samsung-faces-renewed-scrutiny-over-hidden-spyware-claims-on-its-budget-phones/?pk_campaign=feed&#038;pk_kwd=axisofeasy-428-samsung-faces-renewed-scrutiny-over-hidden-spyware-claims-on-its-budget-phones#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 28 Nov 2025 23:00:34 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI jailbreak]]></category>
		<category><![CDATA[AppCloud]]></category>
		<category><![CDATA[banking vendor]]></category>
		<category><![CDATA[biometric data]]></category>
		<category><![CDATA[browser manipulation]]></category>
		<category><![CDATA[brute-force IDs]]></category>
		<category><![CDATA[Cloudflare ruling]]></category>
		<category><![CDATA[CodeRED breach]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[data compromise]]></category>
		<category><![CDATA[dependency attack]]></category>
		<category><![CDATA[ENS]]></category>
		<category><![CDATA[explorer.exe]]></category>
		<category><![CDATA[Gainsight breach]]></category>
		<category><![CDATA[GitHub repos]]></category>
		<category><![CDATA[HashJack]]></category>
		<category><![CDATA[IoT attacks]]></category>
		<category><![CDATA[ironSource]]></category>
		<category><![CDATA[judicial software]]></category>
		<category><![CDATA[juror data leak]]></category>
		<category><![CDATA[KB5062553]]></category>
		<category><![CDATA[LLM guardrails]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[NPM compromise]]></category>
		<category><![CDATA[PII exposure]]></category>
		<category><![CDATA[poetry attacks]]></category>
		<category><![CDATA[preinstalled apps]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[provisioning]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Salesforce exposure]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[ShadowV2 botnet]]></category>
		<category><![CDATA[Shai Hulud]]></category>
		<category><![CDATA[SitusAMC breach]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[supply-chain risk]]></category>
		<category><![CDATA[system crash]]></category>
		<category><![CDATA[Tyler Technologies]]></category>
		<category><![CDATA[Unity]]></category>
		<category><![CDATA[VDI]]></category>
		<category><![CDATA[windows 11]]></category>
		<category><![CDATA[XAML]]></category>
		<category><![CDATA[Zapier]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32745</guid>

					<description><![CDATA[Samsung faces renewed scrutiny over hidden spyware claims on its budget phones,
Windows 11 Update Causes Major Disruption for Virtual Desktop and First Time Users,
Hackers Breach Major Banking Vendor Compromising Client and Customer Data... this and more in AofE  #428<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-428-samsung-faces-renewed-scrutiny-over-hidden-spyware-claims-on-its-budget-phones%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-428-samsung-faces-renewed-scrutiny-over-hidden-spyware-claims-on-its-budget-phones&amp;action_name=%23AxisOfEasy%20428%3A%20Samsung%20Faces%20Renewed%20Scrutiny%20Over%20Hidden%20Spyware%20Claims%20On%20Its%20Budget%20Phones&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-428-samsung-faces-renewed-scrutiny-over-hidden-spyware-claims-on-its-budget-phones/?pk_campaign=feed&#038;pk_kwd=axisofeasy-428-samsung-faces-renewed-scrutiny-over-hidden-spyware-claims-on-its-budget-phones/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 425: Microsoft Teams Security Flaws Show How Easily Digital Trust Can Be Exploited</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/?pk_campaign=feed&#038;pk_kwd=axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/?pk_campaign=feed&#038;pk_kwd=axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 07 Nov 2025 23:00:46 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[ai browser]]></category>
		<category><![CDATA[ai companions]]></category>
		<category><![CDATA[AI governance]]></category>
		<category><![CDATA[ai threat surface]]></category>
		<category><![CDATA[antonio guterres]]></category>
		<category><![CDATA[california ai law]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[character.ai]]></category>
		<category><![CDATA[chatgpt atlas]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[cisa kev]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[code injection]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[csrf exploit]]></category>
		<category><![CDATA[cve-2025-24893]]></category>
		<category><![CDATA[cybercrime treaty]]></category>
		<category><![CDATA[cybersecurity tech accord]]></category>
		<category><![CDATA[daniel de freitas]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[dentsu merkle]]></category>
		<category><![CDATA[dia browser]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[discord tokens]]></category>
		<category><![CDATA[DoJ]]></category>
		<category><![CDATA[edge browser]]></category>
		<category><![CDATA[EFF]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[global cybersecurity]]></category>
		<category><![CDATA[human rights watch]]></category>
		<category><![CDATA[hydra communications]]></category>
		<category><![CDATA[indicators of compromise]]></category>
		<category><![CDATA[josh hawley]]></category>
		<category><![CDATA[L3Harris]]></category>
		<category><![CDATA[lawsuits]]></category>
		<category><![CDATA[layerx security]]></category>
		<category><![CDATA[legal risk]]></category>
		<category><![CDATA[mental health]]></category>
		<category><![CDATA[Microsoft Azure]]></category>
		<category><![CDATA[neuraltrust]]></category>
		<category><![CDATA[noam shazeer]]></category>
		<category><![CDATA[npm packages]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[payroll breach]]></category>
		<category><![CDATA[perplexit comet]]></category>
		<category><![CDATA[persistent memory]]></category>
		<category><![CDATA[peter williams]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[redtiger infostealer]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Richard Blumenthal]]></category>
		<category><![CDATA[russian buyer]]></category>
		<category><![CDATA[senate legislation]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[solr search vulnerability]]></category>
		<category><![CDATA[suicide prevention]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tata motors]]></category>
		<category><![CDATA[tcrond coinminer]]></category>
		<category><![CDATA[TechCrunch]]></category>
		<category><![CDATA[teen safety]]></category>
		<category><![CDATA[Trade Secrets]]></category>
		<category><![CDATA[united nations]]></category>
		<category><![CDATA[unodc]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[vulncheck]]></category>
		<category><![CDATA[xwiki]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32597</guid>

					<description><![CDATA[Microsoft Teams Security Flaws Show How Easily Digital Trust Can Be Exploited,
DHS Plans to Collect Biometrics from Immigrants and US Citizens Alike, 
Threat Actors Have Turned the OpenAI Assistants API Into a Stealthy Malware Control Channel .. this and more in AofE  #425<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited&amp;action_name=%23AxisOfEasy%20425%3A%20Microsoft%20Teams%20Security%20Flaws%20Show%20How%20Easily%20Digital%20Trust%20Can%20Be%20Exploited&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/?pk_campaign=feed&#038;pk_kwd=axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 424: ChatGPT Atlas Exploit Exposes Persistent Memory Vulnerability In AI Browsers</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 31 Oct 2025 22:00:51 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[ai browser]]></category>
		<category><![CDATA[ai companions]]></category>
		<category><![CDATA[AI governance]]></category>
		<category><![CDATA[ai threat surface]]></category>
		<category><![CDATA[antonio guterres]]></category>
		<category><![CDATA[california ai law]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[character.ai]]></category>
		<category><![CDATA[chatgpt atlas]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[cisa kev]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[code injection]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[csrf exploit]]></category>
		<category><![CDATA[cve-2025-24893]]></category>
		<category><![CDATA[cybercrime treaty]]></category>
		<category><![CDATA[cybersecurity tech accord]]></category>
		<category><![CDATA[daniel de freitas]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[dentsu merkle]]></category>
		<category><![CDATA[dia browser]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[discord tokens]]></category>
		<category><![CDATA[DoJ]]></category>
		<category><![CDATA[edge browser]]></category>
		<category><![CDATA[EFF]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[global cybersecurity]]></category>
		<category><![CDATA[human rights watch]]></category>
		<category><![CDATA[hydra communications]]></category>
		<category><![CDATA[indicators of compromise]]></category>
		<category><![CDATA[josh hawley]]></category>
		<category><![CDATA[L3Harris]]></category>
		<category><![CDATA[lawsuits]]></category>
		<category><![CDATA[layerx security]]></category>
		<category><![CDATA[legal risk]]></category>
		<category><![CDATA[mental health]]></category>
		<category><![CDATA[Microsoft Azure]]></category>
		<category><![CDATA[neuraltrust]]></category>
		<category><![CDATA[noam shazeer]]></category>
		<category><![CDATA[npm packages]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[payroll breach]]></category>
		<category><![CDATA[perplexit comet]]></category>
		<category><![CDATA[persistent memory]]></category>
		<category><![CDATA[peter williams]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[redtiger infostealer]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Richard Blumenthal]]></category>
		<category><![CDATA[russian buyer]]></category>
		<category><![CDATA[senate legislation]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[solr search vulnerability]]></category>
		<category><![CDATA[suicide prevention]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tata motors]]></category>
		<category><![CDATA[tcrond coinminer]]></category>
		<category><![CDATA[TechCrunch]]></category>
		<category><![CDATA[teen safety]]></category>
		<category><![CDATA[Trade Secrets]]></category>
		<category><![CDATA[united nations]]></category>
		<category><![CDATA[unodc]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[vulncheck]]></category>
		<category><![CDATA[xwiki]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32557</guid>

					<description><![CDATA[ChatGPT Atlas Exploit Exposes Persistent Memory Vulnerability in AI Browsers,
CharacterAI Restricts Teen Access Amid Legal and Regulatory Backlash Over AI Chat Risks,
XWiki Servers Under Active Attack Through Critical Solr Search Vulnerability... this and more in AofE  #424<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers&amp;action_name=%23AxisOfEasy%20424%3A%20ChatGPT%20Atlas%20Exploit%20Exposes%20Persistent%20Memory%20Vulnerability%20In%20AI%20Browsers&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 410: Can AI Chatbots Be Hacked Via DNS?</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/?pk_campaign=feed&#038;pk_kwd=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/?pk_campaign=feed&#038;pk_kwd=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 25 Jul 2025 22:00:59 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI agent]]></category>
		<category><![CDATA[AI chatbots]]></category>
		<category><![CDATA[AI fraud]]></category>
		<category><![CDATA[authentication keys]]></category>
		<category><![CDATA[autonomous agents]]></category>
		<category><![CDATA[bug bounty]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[cloud compromise]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[crypto mining]]></category>
		<category><![CDATA[CVE-2025-53770]]></category>
		<category><![CDATA[cybercrime forum]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity regulations]]></category>
		<category><![CDATA[database deletion]]></category>
		<category><![CDATA[debug code]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[Education Department]]></category>
		<category><![CDATA[ExpressVPN]]></category>
		<category><![CDATA[G5 portal]]></category>
		<category><![CDATA[Ghostwriter]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Hello Internet Corp]]></category>
		<category><![CDATA[Interlock ransomware]]></category>
		<category><![CDATA[IP address exposure]]></category>
		<category><![CDATA[JavaScript exfiltration]]></category>
		<category><![CDATA[lateral movement]]></category>
		<category><![CDATA[layoffs]]></category>
		<category><![CDATA[Magento]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[production error]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[RDP leak]]></category>
		<category><![CDATA[Replit]]></category>
		<category><![CDATA[SharePoint]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[txt records]]></category>
		<category><![CDATA[Ukraine arrest]]></category>
		<category><![CDATA[Vibe Coding Test]]></category>
		<category><![CDATA[voiceprint authentication]]></category>
		<category><![CDATA[VPN tunnel]]></category>
		<category><![CDATA[water utilities]]></category>
		<category><![CDATA[XSS.is]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31916</guid>

					<description><![CDATA[Can AI Chatbots Be Hacked Via DNS?
SharePoint Zero Day Exploit Hits U.S. Agencies and Exposes Microsoft’s Persistent Security Gaps
ExpressVPN Patch Fixes RDP Traffic Leak That Exposed User IP Addresses ...this and more in AofE  #410<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-410-can-ai-chatbots-be-hacked-via-dns%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-410-can-ai-chatbots-be-hacked-via-dns&amp;action_name=%23AxisOfEasy%20410%3A%20Can%20AI%20Chatbots%20Be%20Hacked%20Via%20DNS%3F&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/?pk_campaign=feed&#038;pk_kwd=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
