<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Salt Typhoon</title>
	<atom:link href="https://axisofeasy.com/tag/salt-typhoon/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 29 Aug 2025 22:11:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>Salt Typhoon</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 415: PromptLock Signals The Arrival Of AI Powered Ransomware</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 29 Aug 2025 22:00:33 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[4Chan]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI crimewave]]></category>
		<category><![CDATA[AI enhancements]]></category>
		<category><![CDATA[algorithmic mediation]]></category>
		<category><![CDATA[Android Trojan]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[authenticity]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Banks]]></category>
		<category><![CDATA[Base64]]></category>
		<category><![CDATA[Bill C-11]]></category>
		<category><![CDATA[Bill C-13]]></category>
		<category><![CDATA[bitcoin ransom]]></category>
		<category><![CDATA[Broadcasting Act]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Claude Code]]></category>
		<category><![CDATA[court case]]></category>
		<category><![CDATA[creator backlash]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[defense contractors]]></category>
		<category><![CDATA[EDR evasion]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[extraterritoriality]]></category>
		<category><![CDATA[Farmers Insurance]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[filename parsing]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[GoLang]]></category>
		<category><![CDATA[Google Pixel]]></category>
		<category><![CDATA[GPT-OSS]]></category>
		<category><![CDATA[guardrails]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hospitals]]></category>
		<category><![CDATA[hybrid cloud]]></category>
		<category><![CDATA[io_uring]]></category>
		<category><![CDATA[Kiwi Farms]]></category>
		<category><![CDATA[legislative error]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Netflix]]></category>
		<category><![CDATA[Ofcom]]></category>
		<category><![CDATA[Ollama]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PromptLock]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RingReaper]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[shell injection]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Shorts]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Storm-0501]]></category>
		<category><![CDATA[trust]]></category>
		<category><![CDATA[U.S. Constitution]]></category>
		<category><![CDATA[UNC5174]]></category>
		<category><![CDATA[VShell]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Youtube]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32136</guid>

					<description><![CDATA[PromptLock Signals the Arrival of AI Powered Ransomware,
Phishing Campaign Exploits Linux Filename Parsing to Deliver VShell Backdoor,
Government Error Erases Privacy Rights from Broadcasting Act ...this and more in AofE  #415<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware&amp;action_name=%23AxisOfEasy%20415%3A%20PromptLock%20Signals%20The%20Arrival%20Of%20AI%20Powered%20Ransomware&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 406: Chinese State Hackers Exploit Unpatched Cisco Flaw to Breach Canadian Telecom Network</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network/?pk_campaign=feed&#038;pk_kwd=axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network/?pk_campaign=feed&#038;pk_kwd=axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 27 Jun 2025 22:00:39 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Aflac]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI copyright]]></category>
		<category><![CDATA[AI innovation]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[biometrics]]></category>
		<category><![CDATA[Books3]]></category>
		<category><![CDATA[Brother printers]]></category>
		<category><![CDATA[call center compromise]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Canadian Centre for Cyber Security]]></category>
		<category><![CDATA[certificate spoofing]]></category>
		<category><![CDATA[children's data]]></category>
		<category><![CDATA[Chinese hackers]]></category>
		<category><![CDATA[Cisco IOS XE]]></category>
		<category><![CDATA[Cisco patching]]></category>
		<category><![CDATA[CITYLIGHT MEDIA]]></category>
		<category><![CDATA[Cloudflare impersonation]]></category>
		<category><![CDATA[COPPA 2.0]]></category>
		<category><![CDATA[crypto mining]]></category>
		<category><![CDATA[CVE-2018-0171]]></category>
		<category><![CDATA[CVE-2023-20198]]></category>
		<category><![CDATA[CVE-2023-20273]]></category>
		<category><![CDATA[CVE-2024-20399]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity negligence]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data collection]]></category>
		<category><![CDATA[data misuse]]></category>
		<category><![CDATA[Docker misconfiguration]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[fair use]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[GitHub vulnerability]]></category>
		<category><![CDATA[Google v. Oracle]]></category>
		<category><![CDATA[GRE tunnel]]></category>
		<category><![CDATA[hacker collective]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[insurance sector]]></category>
		<category><![CDATA[Judge William Alsup]]></category>
		<category><![CDATA[lawful intercept]]></category>
		<category><![CDATA[legal exposure]]></category>
		<category><![CDATA[LibGen]]></category>
		<category><![CDATA[LLM training]]></category>
		<category><![CDATA[malicious infrastructure]]></category>
		<category><![CDATA[Microsoft Entra ID]]></category>
		<category><![CDATA[NetExtender]]></category>
		<category><![CDATA[nOAuth vulnerability]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[PiLiMi]]></category>
		<category><![CDATA[pirated data]]></category>
		<category><![CDATA[platform liability]]></category>
		<category><![CDATA[PRC-backed operations]]></category>
		<category><![CDATA[printer vulnerability]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[Senate bill]]></category>
		<category><![CDATA[SEO Poisoning]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[SSNs]]></category>
		<category><![CDATA[State-sponsored hacking]]></category>
		<category><![CDATA[summary judgment]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[telecom breach]]></category>
		<category><![CDATA[Trojanized installer]]></category>
		<category><![CDATA[unintended surveillance]]></category>
		<category><![CDATA[universal age checks]]></category>
		<category><![CDATA[unpatchable bug]]></category>
		<category><![CDATA[unpatched vulnerabilities]]></category>
		<category><![CDATA[VPN credential theft]]></category>
		<category><![CDATA[wiretap monitoring]]></category>
		<category><![CDATA[WordPress malware]]></category>
		<category><![CDATA[youth privacy]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31748</guid>

					<description><![CDATA[Chinese State Hackers Exploit Unpatched Cisco Flaw to Breach Canadian Telecom Network
Senate Bill Expands Youth Privacy Rules and Raises Concerns Over Online Surveillance
Aflac Reports Data Breach Affecting Customers and Employees...this and more in AofE  #406<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network&amp;action_name=%23AxisOfEasy%20406%3A%20Chinese%20State%20Hackers%20Exploit%20Unpatched%20Cisco%20Flaw%20to%20Breach%20Canadian%20Telecom%20Network&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network/?pk_campaign=feed&#038;pk_kwd=axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network/feed/</wfw:commentRss>
			<slash:comments>7</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 379: China Hacks US Telecom Giants In Massive Espionage Operation</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 06 Dec 2024 23:00:36 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[ASIC]]></category>
		<category><![CDATA[AT&T]]></category>
		<category><![CDATA[Bluesky]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[CALEA]]></category>
		<category><![CDATA[Campaign]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Computational Power]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[cyberespionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Digital Services Act]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[Encrypted Apps]]></category>
		<category><![CDATA[Encrypted Platforms]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Future Ventures]]></category>
		<category><![CDATA[GPU]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Jeff Greene]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[Lumen Technologies]]></category>
		<category><![CDATA[Matrix]]></category>
		<category><![CDATA[Metadata]]></category>
		<category><![CDATA[Moore’s Law]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<category><![CDATA[NVidia]]></category>
		<category><![CDATA[Operation]]></category>
		<category><![CDATA[Pegasus]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Regulatory Compliance]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<category><![CDATA[Senator Ron Wyden]]></category>
		<category><![CDATA[signal]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Stephen Jurvetson]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Tech Regulation]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[Verizon]]></category>
		<category><![CDATA[VLOP]]></category>
		<category><![CDATA[Washington D.C.]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[X]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=30703</guid>

					<description><![CDATA[China Hacks US Telecom Giants in Massive Espionage Operation,
Bluesky Gains Traction Amid Political Shifts,
Matrix Exposed in Europol’s Operation Against Encrypted Platforms ... this and more in AofE  #379<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation&amp;action_name=%23AxisOfEasy%20379%3A%20China%20Hacks%20US%20Telecom%20Giants%20In%20Massive%20Espionage%20Operation&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-379-china-hacks-us-telecom-giants-in-massive-espionage-operation/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 377: The Rising Cost Of Ransomware Payouts Predicted To Reach 113 Million</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-377-the-rising-cost-of-ransomware-payouts-predicted-to-reach-113-million/?pk_campaign=feed&#038;pk_kwd=axisofeasy-377-the-rising-cost-of-ransomware-payouts-predicted-to-reach-113-million&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-377-the-rising-cost-of-ransomware-payouts-predicted-to-reach-113-million</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-377-the-rising-cost-of-ransomware-payouts-predicted-to-reach-113-million/?pk_campaign=feed&#038;pk_kwd=axisofeasy-377-the-rising-cost-of-ransomware-payouts-predicted-to-reach-113-million#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 22 Nov 2024 23:00:26 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI competition]]></category>
		<category><![CDATA[antitrust]]></category>
		<category><![CDATA[Chinese cyberespionage]]></category>
		<category><![CDATA[cybercrime prosecution.]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DNS vulnerabilities]]></category>
		<category><![CDATA[drinking water cybersecurity risks]]></category>
		<category><![CDATA[global cybercrime]]></category>
		<category><![CDATA[google chrome]]></category>
		<category><![CDATA[healthcare breaches]]></category>
		<category><![CDATA[IoT exploitation]]></category>
		<category><![CDATA[Justice Department]]></category>
		<category><![CDATA[LockBit]]></category>
		<category><![CDATA[NSO Group]]></category>
		<category><![CDATA[Operation Lunar Peek]]></category>
		<category><![CDATA[Pegasus spyware]]></category>
		<category><![CDATA[Pegasus spyware ethical concerns]]></category>
		<category><![CDATA[Phobos ransomware]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware payouts]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<category><![CDATA[spyware market]]></category>
		<category><![CDATA[telecom cyberattacks]]></category>
		<category><![CDATA[TikTok divestment]]></category>
		<category><![CDATA[U.S. government cybersecurity]]></category>
		<category><![CDATA[Ubuntu security flaws]]></category>
		<category><![CDATA[zero-trust cybersecurity]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=30650</guid>

					<description><![CDATA[The Rising Cost of Ransomware Payouts Predicted to Reach 113 Million,
Justice Department Targets Google Chrome in Landmark Antitrust Case,
International Justice Brings Phobos Ransomware Mastermind to Trial... this and more in AofE  #377<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-377-the-rising-cost-of-ransomware-payouts-predicted-to-reach-113-million%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-377-the-rising-cost-of-ransomware-payouts-predicted-to-reach-113-million&amp;action_name=%23AxisOfEasy%20377%3A%20The%20Rising%20Cost%20Of%20Ransomware%20Payouts%20Predicted%20To%20Reach%20113%20Million&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-377-the-rising-cost-of-ransomware-payouts-predicted-to-reach-113-million/?pk_campaign=feed&#038;pk_kwd=axisofeasy-377-the-rising-cost-of-ransomware-payouts-predicted-to-reach-113-million/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
