<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>PseudoManuscrypt</title>
	<atom:link href="https://axisofeasy.com/tag/pseudomanuscrypt/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Tue, 21 Dec 2021 22:35:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>PseudoManuscrypt</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 225:  Threat Actors Exploit The Second Log4j Vulnerability As A Third Flaw Is Discovered</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered/?pk_campaign=feed&#038;pk_kwd=axisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered/?pk_campaign=feed&#038;pk_kwd=axisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Tue, 21 Dec 2021 23:00:19 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Binance]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[Log4j]]></category>
		<category><![CDATA[NSO]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[Pingdom]]></category>
		<category><![CDATA[PseudoManuscrypt]]></category>
		<category><![CDATA[SIM]]></category>
		<category><![CDATA[Wire Fraud]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=25150</guid>

					<description><![CDATA[63,000 websites suffer outages as users report issues with the AWS,
Apple sues NSO Group, putting the organization in financial trouble,
Threat actors exploit the second Log4j vulnerability as a third flaw is discovered...this and more in Axis of Easy 225.<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered&amp;action_name=%23AxisOfEasy%20225%3A%20%20Threat%20Actors%20Exploit%20The%20Second%20Log4j%20Vulnerability%20As%20A%20Third%20Flaw%20Is%20Discovered&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered/?pk_campaign=feed&#038;pk_kwd=axisofeasy-225-threat-actors-exploit-the-second-log4j-vulnerability-as-a-third-flaw-is-discovered/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
	</channel>
</rss>
