<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ShinyHunters</title>
	<atom:link href="https://axisofeasy.com/tag/shinyhunters/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 17 Apr 2026 16:38:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>ShinyHunters</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 446: Internet Content Regulation Is Coming To Canada</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?pk_campaign=feed&#038;pk_kwd=axisofeasy-446-internet-content-regulation-is-coming-to-canada&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-446-internet-content-regulation-is-coming-to-canada</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?pk_campaign=feed&#038;pk_kwd=axisofeasy-446-internet-content-regulation-is-coming-to-canada#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 22:00:47 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI agents]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[antivirus evasion]]></category>
		<category><![CDATA[API keys]]></category>
		<category><![CDATA[APT41]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[banking malware]]></category>
		<category><![CDATA[C2 persistence]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Claude AI]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Copilot]]></category>
		<category><![CDATA[court order]]></category>
		<category><![CDATA[credential harvesting]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[delusions]]></category>
		<category><![CDATA[DLL sideloading]]></category>
		<category><![CDATA[Electron malware]]></category>
		<category><![CDATA[email phishing]]></category>
		<category><![CDATA[First Amendment]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[Gemini]]></category>
		<category><![CDATA[GitHub Actions]]></category>
		<category><![CDATA[government policy]]></category>
		<category><![CDATA[InfoStealer]]></category>
		<category><![CDATA[internet regulation]]></category>
		<category><![CDATA[ISP monitoring]]></category>
		<category><![CDATA[JanelaRAT]]></category>
		<category><![CDATA[Latin America attacks]]></category>
		<category><![CDATA[legal case]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft update scam]]></category>
		<category><![CDATA[Mirax trojan]]></category>
		<category><![CDATA[n8n abuse]]></category>
		<category><![CDATA[obfuscation]]></category>
		<category><![CDATA[Online Harms]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PlugX]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[Python payloads]]></category>
		<category><![CDATA[Rockstar Games]]></category>
		<category><![CDATA[SharePoint exploit]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[social media ban]]></category>
		<category><![CDATA[spoofed software]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[threat actors]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[workflow automation]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33713</guid>

					<description><![CDATA[Internet Content Regulation is Coming To Canada,
Court Orders OpenAI to Block User in ChatGPT Case Raising Free Speech Concerns,
Fake Claude “Pro” Site Spreads PlugX Malware via DLL Sideloading... this and more in AofE  #446<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-446-internet-content-regulation-is-coming-to-canada%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-446-internet-content-regulation-is-coming-to-canada&amp;action_name=%23AxisOfEasy%20446%3A%20Internet%20Content%20Regulation%20Is%20Coming%20To%20Canada&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?pk_campaign=feed&#038;pk_kwd=axisofeasy-446-internet-content-regulation-is-coming-to-canada/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 443: Apple Becomes The UK Government&#8217;s Favorite Compliance Officer</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer/?pk_campaign=feed&#038;pk_kwd=axisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer/?pk_campaign=feed&#038;pk_kwd=axisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 27 Mar 2026 22:00:27 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[agentic computing]]></category>
		<category><![CDATA[AI agents]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple patching]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[censorship circumvention]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[content restrictions]]></category>
		<category><![CDATA[credential harvesting]]></category>
		<category><![CDATA[Crunchyroll]]></category>
		<category><![CDATA[DarkSword]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[digital ID]]></category>
		<category><![CDATA[DNS automation]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[GCP credentials]]></category>
		<category><![CDATA[Ghostblade]]></category>
		<category><![CDATA[Ghostknife]]></category>
		<category><![CDATA[Ghostsaber]]></category>
		<category><![CDATA[GitHub leak]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[iOS 26.4]]></category>
		<category><![CDATA[iOS exploit]]></category>
		<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[LiteLLM]]></category>
		<category><![CDATA[Loblaw]]></category>
		<category><![CDATA[lockdown mode]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[MCP]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[nordvpn]]></category>
		<category><![CDATA[octoDNS]]></category>
		<category><![CDATA[Ofcom]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[OpenClaw]]></category>
		<category><![CDATA[outsourcing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Proton VPN]]></category>
		<category><![CDATA[pypi attack]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[systemd persistence]]></category>
		<category><![CDATA[Telus Digital]]></category>
		<category><![CDATA[third-party risk]]></category>
		<category><![CDATA[uk online safety act]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33524</guid>

					<description><![CDATA[Apple Becomes the UK Government's Favorite Compliance Officer,
easyDNS releases MCP server and skills for AI agents,
The Petabyte Pivot: Why Your Anime Habits are Now a Telco Tragedy... this and more in AofE  #443<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer&amp;action_name=%23AxisOfEasy%20443%3A%20Apple%20Becomes%20The%20UK%20Government%26%238217%3Bs%20Favorite%20Compliance%20Officer&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer/?pk_campaign=feed&#038;pk_kwd=axisofeasy-443-apple-becomes-the-uk-governments-favorite-compliance-officer/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 439: OpenAI Suppressed Warnings On Mass Shooter Months Before Spree</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree/?pk_campaign=feed&#038;pk_kwd=axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree/?pk_campaign=feed&#038;pk_kwd=axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 27 Feb 2026 23:00:38 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[abundance]]></category>
		<category><![CDATA[active exploitation]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI espionage]]></category>
		<category><![CDATA[AI governance]]></category>
		<category><![CDATA[AI revolution]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[BeaverTail]]></category>
		<category><![CDATA[biometric surveillance]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Canadian law enforcement]]></category>
		<category><![CDATA[child data protection]]></category>
		<category><![CDATA[Chrome zero-day]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Contagious Interview]]></category>
		<category><![CDATA[CVE-2026-2441]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exposure]]></category>
		<category><![CDATA[dji romo]]></category>
		<category><![CDATA[duty to report]]></category>
		<category><![CDATA[Evan Solomon]]></category>
		<category><![CDATA[fake IT workers]]></category>
		<category><![CDATA[GitLab]]></category>
		<category><![CDATA[gun violence]]></category>
		<category><![CDATA[hacking tools]]></category>
		<category><![CDATA[IoT vulnerability]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[mass shooting]]></category>
		<category><![CDATA[MCP worm]]></category>
		<category><![CDATA[model distillation]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[npm supply chain attack]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Ottercookie]]></category>
		<category><![CDATA[Persona]]></category>
		<category><![CDATA[pre-crime ethics]]></category>
		<category><![CDATA[privacy vs security]]></category>
		<category><![CDATA[red flag laws]]></category>
		<category><![CDATA[Reddit fine]]></category>
		<category><![CDATA[root code execution]]></category>
		<category><![CDATA[Russia cybercrime]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[smart home surveillance]]></category>
		<category><![CDATA[SolarWinds Serv-U]]></category>
		<category><![CDATA[supply chain security]]></category>
		<category><![CDATA[synthetic identities]]></category>
		<category><![CDATA[tumbler ridge]]></category>
		<category><![CDATA[UK ICO]]></category>
		<category><![CDATA[use-after-free]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33269</guid>

					<description><![CDATA[OpenAI Flagged Tumbler Ridge Shooter's Chat Sessions, But Did Nothing,
GitLab Disrupts North Korean "Contagious Interview" and Fake IT Worker Networks,
DJI Robot Vacuum Flaw Exposed 7,000 Homes... this and more in AofE  #439<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree&amp;action_name=%23AxisOfEasy%20439%3A%20OpenAI%20Suppressed%20Warnings%20On%20Mass%20Shooter%20Months%20Before%20Spree&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree/?pk_campaign=feed&#038;pk_kwd=axisofeasy-439-openai-suppressed-warnings-on-mass-shooter-months-before-spree/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisofEasy 435: FBI Accesses Microsoft BitLocker Keys In Guam Fraud Case</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/#respond</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 30 Jan 2026 23:00:33 +0000</pubDate>
				<category><![CDATA[BitLocker encryption backdoor]]></category>
		<category><![CDATA[BitLocker FBI]]></category>
		<category><![CDATA[encryption and law enforcement]]></category>
		<category><![CDATA[FBI ransomware operations]]></category>
		<category><![CDATA[Lapsus vishing attacks]]></category>
		<category><![CDATA[malicious npm packages]]></category>
		<category><![CDATA[MFA bypass vishing]]></category>
		<category><![CDATA[Microsoft BitLocker keys]]></category>
		<category><![CDATA[open source supply chain attack]]></category>
		<category><![CDATA[RAMP cybercrime forum]]></category>
		<category><![CDATA[ransomware marketplace takedown]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[SLSH alliance]]></category>
		<category><![CDATA[Sonatype State of the Software Supply Chain]]></category>
		<category><![CDATA[TikTok data collection 2026]]></category>
		<category><![CDATA[TikTok location tracking]]></category>
		<category><![CDATA[TikTok privacy]]></category>
		<category><![CDATA[TikTok USDS joint venture]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=33071</guid>

					<description><![CDATA[In this issue: FBI Accesses Microsoft BitLocker Keys in Guam Fraud Case Open Source Supply Chains Under Attack: Malicious Packages Surge Cybercrime Alliance Hits 100+ Global Organisations with Vishing Attacks US Seizes RAMP Cybercrime Forum, Disrupting Ransomware Hub TikTok US Expands Data Access Under New Joint Venture In this issue: FBI Accesses Microsoft BitLocker Keys [&#8230;]<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case%2F&amp;action_name=%23AxisofEasy%20435%3A%20FBI%20Accesses%20Microsoft%20BitLocker%20Keys%20In%20Guam%20Fraud%20Case&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 435: FBI Accesses Microsoft BitLocker Keys In Guam Fraud Case</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/?pk_campaign=feed&#038;pk_kwd=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/?pk_campaign=feed&#038;pk_kwd=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 30 Jan 2026 23:00:30 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI prompt collection]]></category>
		<category><![CDATA[AI-assisted attacks]]></category>
		<category><![CDATA[BitLocker encryption]]></category>
		<category><![CDATA[CI/CD pipeline compromise]]></category>
		<category><![CDATA[cloud key escrow]]></category>
		<category><![CDATA[container image risk]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[critical infrastructure attacks]]></category>
		<category><![CDATA[CVE exposure]]></category>
		<category><![CDATA[cybercrime forums]]></category>
		<category><![CDATA[dark web seizures]]></category>
		<category><![CDATA[data localization]]></category>
		<category><![CDATA[device encryption backdoors]]></category>
		<category><![CDATA[DOJ cybercrime enforcement]]></category>
		<category><![CDATA[energy grid cyberattacks]]></category>
		<category><![CDATA[enterprise data breaches]]></category>
		<category><![CDATA[extortion groups]]></category>
		<category><![CDATA[FBI takedowns]]></category>
		<category><![CDATA[FBI warrant]]></category>
		<category><![CDATA[Fortinet exploits]]></category>
		<category><![CDATA[fraud investigation]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Guam unemployment fraud]]></category>
		<category><![CDATA[high-severity vulnerabilities]]></category>
		<category><![CDATA[initial access brokers]]></category>
		<category><![CDATA[JavaScript supply chain flaws]]></category>
		<category><![CDATA[joint venture governance]]></category>
		<category><![CDATA[Lapsus$ affiliates]]></category>
		<category><![CDATA[law enforcement access]]></category>
		<category><![CDATA[malicious packages]]></category>
		<category><![CDATA[Maven Central]]></category>
		<category><![CDATA[MFA fatigue]]></category>
		<category><![CDATA[Microsoft cloud keys]]></category>
		<category><![CDATA[namespace confusion]]></category>
		<category><![CDATA[nation-state hacking]]></category>
		<category><![CDATA[network device compromise]]></category>
		<category><![CDATA[Nike data theft]]></category>
		<category><![CDATA[npm ecosystem]]></category>
		<category><![CDATA[NuGet vulnerabilities]]></category>
		<category><![CDATA[Okta impersonation]]></category>
		<category><![CDATA[open source supply chain attacks]]></category>
		<category><![CDATA[operational disruption]]></category>
		<category><![CDATA[Oracle cloud hosting]]></category>
		<category><![CDATA[PackageGate]]></category>
		<category><![CDATA[platform surveillance]]></category>
		<category><![CDATA[precise location tracking]]></category>
		<category><![CDATA[Privacy Risks]]></category>
		<category><![CDATA[PyPI threats]]></category>
		<category><![CDATA[RAMP marketplace]]></category>
		<category><![CDATA[ransomware extortion]]></category>
		<category><![CDATA[ransomware gangs]]></category>
		<category><![CDATA[RCE vulnerabilities]]></category>
		<category><![CDATA[recommendation algorithms]]></category>
		<category><![CDATA[repository abuse]]></category>
		<category><![CDATA[Russian intelligence operations]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Slack impersonation]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[software supply chain security]]></category>
		<category><![CDATA[SSO bypass]]></category>
		<category><![CDATA[Teams abuse]]></category>
		<category><![CDATA[threat actor migration]]></category>
		<category><![CDATA[TikTok US data collection]]></category>
		<category><![CDATA[typosquatting attacks]]></category>
		<category><![CDATA[US-China tech tensions]]></category>
		<category><![CDATA[vishing attacks]]></category>
		<category><![CDATA[voice phishing]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33045</guid>

					<description><![CDATA[FBI Accesses Microsoft BitLocker Keys in Guam Fraud Case,
Open Source Supply Chains Under Attack: Malicious Packages Surge,
Cybercrime Alliance Hits 100+ Global Organisations with Vishing Attacks ... this and more in AofE  #435<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case&amp;action_name=%23AxisOfEasy%20435%3A%20FBI%20Accesses%20Microsoft%20BitLocker%20Keys%20In%20Guam%20Fraud%20Case&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/?pk_campaign=feed&#038;pk_kwd=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 431: UK Moves Toward Mandatory Phone Surveillance</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance/?pk_campaign=feed&#038;pk_kwd=axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance/?pk_campaign=feed&#038;pk_kwd=axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 19 Dec 2025 23:00:37 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[analytics breach]]></category>
		<category><![CDATA[Apple account termination]]></category>
		<category><![CDATA[Apple ID lockout]]></category>
		<category><![CDATA[APT28]]></category>
		<category><![CDATA[Bill C-9]]></category>
		<category><![CDATA[Canadian hate speech law]]></category>
		<category><![CDATA[Children’s Wellbeing and Schools Bill]]></category>
		<category><![CDATA[client-side scanning]]></category>
		<category><![CDATA[cloud credential theft]]></category>
		<category><![CDATA[Consumer Protection]]></category>
		<category><![CDATA[credential harvesting]]></category>
		<category><![CDATA[criminal code amendments]]></category>
		<category><![CDATA[cryptomining attacks]]></category>
		<category><![CDATA[CSAM detection]]></category>
		<category><![CDATA[developer rights]]></category>
		<category><![CDATA[device bricking]]></category>
		<category><![CDATA[digital surveillance]]></category>
		<category><![CDATA[encryption backdoors]]></category>
		<category><![CDATA[extortion campaign]]></category>
		<category><![CDATA[Fancy Bear]]></category>
		<category><![CDATA[financial fraud rings]]></category>
		<category><![CDATA[free expression]]></category>
		<category><![CDATA[government overreach]]></category>
		<category><![CDATA[iCloud access loss]]></category>
		<category><![CDATA[large-scale data breaches]]></category>
		<category><![CDATA[phishing campaigns]]></category>
		<category><![CDATA[phone surveillance]]></category>
		<category><![CDATA[platform power]]></category>
		<category><![CDATA[poisoned packages]]></category>
		<category><![CDATA[PornHub data breach]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[ransomware-as-a-service]]></category>
		<category><![CDATA[religious freedom]]></category>
		<category><![CDATA[Russian Cyber Operations]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[social media restrictions]]></category>
		<category><![CDATA[supply chain security]]></category>
		<category><![CDATA[targeted phishing]]></category>
		<category><![CDATA[UK surveillance law]]></category>
		<category><![CDATA[Ukraine cyberwar]]></category>
		<category><![CDATA[user activity data]]></category>
		<category><![CDATA[VPN regulation]]></category>
		<category><![CDATA[webmail security]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32860</guid>

					<description><![CDATA[UK moves toward mandatory phone surveillance,
Apple Permanently Disables Longtime Developer’s Account, Bricking Devices,
PornHub Extorted After Historical Data Breach by ShinyHunters... this and more in AofE  #431<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-431-uk-moves-toward-mandatory-phone-surveillance%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-431-uk-moves-toward-mandatory-phone-surveillance&amp;action_name=%23AxisOfEasy%20431%3A%20UK%20Moves%20Toward%20Mandatory%20Phone%20Surveillance&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance/?pk_campaign=feed&#038;pk_kwd=axisofeasy-431-uk-moves-toward-mandatory-phone-surveillance/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 417: Nepal Goes Offline, Then Up In Flames</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-417-nepal-goes-offline-then-up-in-flames</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 12 Sep 2025 22:00:20 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[Adobe]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[Ascension]]></category>
		<category><![CDATA[Asia]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[BitLocker]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[Bugcrowd]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[chalk]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chitwan]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[color-convert]]></category>
		<category><![CDATA[Commerce]]></category>
		<category><![CDATA[connectivity]]></category>
		<category><![CDATA[corruption]]></category>
		<category><![CDATA[crypto-clipper]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[dependencies]]></category>
		<category><![CDATA[DES]]></category>
		<category><![CDATA[Detection]]></category>
		<category><![CDATA[Drift]]></category>
		<category><![CDATA[EggStreme]]></category>
		<category><![CDATA[embassies]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[error-ex]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[Ethereum]]></category>
		<category><![CDATA[Etherscan]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[fileless malware]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Gulf]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[IMEWE]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[Jaguar Land Rover]]></category>
		<category><![CDATA[Janakpur]]></category>
		<category><![CDATA[Jeddah]]></category>
		<category><![CDATA[K.P. Sharma Oli]]></category>
		<category><![CDATA[Kathmandu]]></category>
		<category><![CDATA[Kerberoasting]]></category>
		<category><![CDATA[Kerberos]]></category>
		<category><![CDATA[latency]]></category>
		<category><![CDATA[lockfiles]]></category>
		<category><![CDATA[Magento]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mandiant]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[migration]]></category>
		<category><![CDATA[negligence]]></category>
		<category><![CDATA[nepal]]></category>
		<category><![CDATA[NetBlocks]]></category>
		<category><![CDATA[Node.js]]></category>
		<category><![CDATA[Npm]]></category>
		<category><![CDATA[OAuth]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[outages]]></category>
		<category><![CDATA[package.json]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Palo Alto Networks]]></category>
		<category><![CDATA[parliament]]></category>
		<category><![CDATA[patches.]]></category>
		<category><![CDATA[Philippines]]></category>
		<category><![CDATA[Proofpoint]]></category>
		<category><![CDATA[protests]]></category>
		<category><![CDATA[qix]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RC4]]></category>
		<category><![CDATA[red sea]]></category>
		<category><![CDATA[repair]]></category>
		<category><![CDATA[riot police]]></category>
		<category><![CDATA[Ron Wyden]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salesloft]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[SEA-ME-WE-4]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[SMB]]></category>
		<category><![CDATA[Snowflake]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[strip-ansi]]></category>
		<category><![CDATA[students]]></category>
		<category><![CDATA[submarine cables]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[Tenable]]></category>
		<category><![CDATA[tokens]]></category>
		<category><![CDATA[trust]]></category>
		<category><![CDATA[UNC6395]]></category>
		<category><![CDATA[unemployment]]></category>
		<category><![CDATA[US lawmakers]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[WeChat]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[Windows Server 2025]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32257</guid>

					<description><![CDATA[ Nepal Goes Offline, Then Up in Flames,
Wyden Targets Microsoft Over RC4 Use in Ransomware-Fueled Healthcare Breach,
Salesloft Breach Exposes OAuth Supply Chain Weakness Across Major Tech Platforms...this and more in AofE  #417<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-417-nepal-goes-offline-then-up-in-flames%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-417-nepal-goes-offline-then-up-in-flames&amp;action_name=%23AxisOfEasy%20417%3A%20Nepal%20Goes%20Offline%2C%20Then%20Up%20In%20Flames&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 415: PromptLock Signals The Arrival Of AI Powered Ransomware</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 29 Aug 2025 22:00:33 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[4Chan]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI crimewave]]></category>
		<category><![CDATA[AI enhancements]]></category>
		<category><![CDATA[algorithmic mediation]]></category>
		<category><![CDATA[Android Trojan]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[authenticity]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Banks]]></category>
		<category><![CDATA[Base64]]></category>
		<category><![CDATA[Bill C-11]]></category>
		<category><![CDATA[Bill C-13]]></category>
		<category><![CDATA[bitcoin ransom]]></category>
		<category><![CDATA[Broadcasting Act]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Claude Code]]></category>
		<category><![CDATA[court case]]></category>
		<category><![CDATA[creator backlash]]></category>
		<category><![CDATA[CRTC]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[defense contractors]]></category>
		<category><![CDATA[EDR evasion]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[extraterritoriality]]></category>
		<category><![CDATA[Farmers Insurance]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[filename parsing]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[GoLang]]></category>
		<category><![CDATA[Google Pixel]]></category>
		<category><![CDATA[GPT-OSS]]></category>
		<category><![CDATA[guardrails]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hospitals]]></category>
		<category><![CDATA[hybrid cloud]]></category>
		<category><![CDATA[io_uring]]></category>
		<category><![CDATA[Kiwi Farms]]></category>
		<category><![CDATA[legislative error]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Netflix]]></category>
		<category><![CDATA[Ofcom]]></category>
		<category><![CDATA[Ollama]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[PromptLock]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RingReaper]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[shell injection]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Shorts]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Storm-0501]]></category>
		<category><![CDATA[trust]]></category>
		<category><![CDATA[U.S. Constitution]]></category>
		<category><![CDATA[UNC5174]]></category>
		<category><![CDATA[VShell]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Youtube]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32136</guid>

					<description><![CDATA[PromptLock Signals the Arrival of AI Powered Ransomware,
Phishing Campaign Exploits Linux Filename Parsing to Deliver VShell Backdoor,
Government Error Erases Privacy Rights from Broadcasting Act ...this and more in AofE  #415<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware&amp;action_name=%23AxisOfEasy%20415%3A%20PromptLock%20Signals%20The%20Arrival%20Of%20AI%20Powered%20Ransomware&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/?pk_campaign=feed&#038;pk_kwd=axisofeasy-415-promptlock-signals-the-arrival-of-ai-powered-ransomware/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 414: Popular VPN Apps Exposed As Security Risk After Shocking Report</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report/?pk_campaign=feed&#038;pk_kwd=axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report/?pk_campaign=feed&#038;pk_kwd=axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 22 Aug 2025 22:00:13 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[1.1 million customers]]></category>
		<category><![CDATA[280000 emails]]></category>
		<category><![CDATA[ActBlue]]></category>
		<category><![CDATA[Advanced Data Protection]]></category>
		<category><![CDATA[AI update]]></category>
		<category><![CDATA[Allianz Life]]></category>
		<category><![CDATA[allow lists]]></category>
		<category><![CDATA[AML compliance]]></category>
		<category><![CDATA[app stores]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[authoritarian regimes]]></category>
		<category><![CDATA[Autumn Breeze]]></category>
		<category><![CDATA[Bank for International Settlements]]></category>
		<category><![CDATA[Benjamin Mixon-Baca]]></category>
		<category><![CDATA[BIS]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[brain-dead]]></category>
		<category><![CDATA[campaign emails]]></category>
		<category><![CDATA[Canadian Regulator]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[ChatGPT-5]]></category>
		<category><![CDATA[child safety]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[citations]]></category>
		<category><![CDATA[Citizen Lab]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[customer accounts]]></category>
		<category><![CDATA[D-Squared]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[digital ID]]></category>
		<category><![CDATA[duty of care]]></category>
		<category><![CDATA[Dylan T. Davis]]></category>
		<category><![CDATA[employees]]></category>
		<category><![CDATA[encryption backdoor]]></category>
		<category><![CDATA[fake ChatGPT app]]></category>
		<category><![CDATA[financial firms]]></category>
		<category><![CDATA[global attack]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[GOP]]></category>
		<category><![CDATA[hacked data]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Have I Been Pwned]]></category>
		<category><![CDATA[Hidden Links]]></category>
		<category><![CDATA[hidden tricks]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[iiNet]]></category>
		<category><![CDATA[Innovative Connecting]]></category>
		<category><![CDATA[Investigatory Powers Act]]></category>
		<category><![CDATA[ISP]]></category>
		<category><![CDATA[Jedidiah Crandall]]></category>
		<category><![CDATA[Jeffrey Knockel]]></category>
		<category><![CDATA[José Castañeda]]></category>
		<category><![CDATA[Know Your Customer]]></category>
		<category><![CDATA[KYC]]></category>
		<category><![CDATA[Lemon Clove]]></category>
		<category><![CDATA[Louisiana]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mark E. Jeftovic]]></category>
		<category><![CDATA[Marsha Blackburn]]></category>
		<category><![CDATA[non-custodial wallets]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Pandora]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[PipeMagic]]></category>
		<category><![CDATA[political bias]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[prompt optimizer]]></category>
		<category><![CDATA[Qantas]]></category>
		<category><![CDATA[Qihoo 360]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Republican fundraising]]></category>
		<category><![CDATA[Roblox]]></category>
		<category><![CDATA[routing engine]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salesforce hack]]></category>
		<category><![CDATA[scandal]]></category>
		<category><![CDATA[security risk]]></category>
		<category><![CDATA[Shadowsocks]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Snap VPN]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Social Security numbers]]></category>
		<category><![CDATA[spam filter]]></category>
		<category><![CDATA[stablecoin]]></category>
		<category><![CDATA[Steve Scalise]]></category>
		<category><![CDATA[stolen data]]></category>
		<category><![CDATA[structured prompts]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[transaction scoring]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[Tulsi Gabbard]]></category>
		<category><![CDATA[Turbo VPN]]></category>
		<category><![CDATA[U.K. government]]></category>
		<category><![CDATA[U.S. pressure]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[VPN Monster]]></category>
		<category><![CDATA[wallets]]></category>
		<category><![CDATA[weak encryption]]></category>
		<category><![CDATA[widespread breach]]></category>
		<category><![CDATA[WinRed]]></category>
		<category><![CDATA[Workday]]></category>
		<category><![CDATA[XML tags]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32099</guid>

					<description><![CDATA[Popular VPN Apps Exposed as Security Risk After Shocking Report,
UK Retreats After US Pressure Forces End to Apple Encryption Backdoor Plan,
BIS Proposes Transaction Scoring System to Enforce Crypto AML Compliance ...this and more in AofE  #414<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report&amp;action_name=%23AxisOfEasy%20414%3A%20Popular%20VPN%20Apps%20Exposed%20As%20Security%20Risk%20After%20Shocking%20Report&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report/?pk_campaign=feed&#038;pk_kwd=axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 413: Lenovo Webcams Turn Into Hacking Tools In Shocking New Discovery</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery/?pk_campaign=feed&#038;pk_kwd=axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery/?pk_campaign=feed&#038;pk_kwd=axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 15 Aug 2025 22:00:00 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[and concepts: Lenovo]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[aviation]]></category>
		<category><![CDATA[BadUSB]]></category>
		<category><![CDATA[BYOVD]]></category>
		<category><![CDATA[capturing the most important entities]]></category>
		<category><![CDATA[Charon ransomware]]></category>
		<category><![CDATA[Connex Credit Union]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data brokers]]></category>
		<category><![CDATA[DEF CON 33]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[DLL sideloading]]></category>
		<category><![CDATA[Donald Trump]]></category>
		<category><![CDATA[Earth Baxia]]></category>
		<category><![CDATA[Eclypsium]]></category>
		<category><![CDATA[EDR evasion]]></category>
		<category><![CDATA[Efimer trojan]]></category>
		<category><![CDATA[European Media Freedom Act]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[fake legal emails]]></category>
		<category><![CDATA[firmware]]></category>
		<category><![CDATA[hardware hacking]]></category>
		<category><![CDATA[Here’s the comma-separated tag cloud generated from your provided articles]]></category>
		<category><![CDATA[Interlock Group]]></category>
		<category><![CDATA[journalism]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Manpower]]></category>
		<category><![CDATA[media ownership]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[NodeSnake]]></category>
		<category><![CDATA[operational technology]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[press freedom]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[ransomware attack]]></category>
		<category><![CDATA[ransomware trends]]></category>
		<category><![CDATA[RCE vulnerability]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[sealed records]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[SigmaStar]]></category>
		<category><![CDATA[stolen data]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[topics]]></category>
		<category><![CDATA[torrents]]></category>
		<category><![CDATA[Ukraine war]]></category>
		<category><![CDATA[Ursula von der Leyen]]></category>
		<category><![CDATA[US federal courts]]></category>
		<category><![CDATA[Vladimir Putin]]></category>
		<category><![CDATA[webcams]]></category>
		<category><![CDATA[WinRAR vulnerability]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32052</guid>

					<description><![CDATA[Lenovo Webcams Turn into Hacking Tools in Shocking New Discovery,
EU Law Meant to Protect Press Gives Governments Power to Arrest Journalists,
Charon Ransomware Targets Middle East Aviation Using Advanced APT Tradecraft ...this and more in AofE  #413<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery&amp;action_name=%23AxisOfEasy%20413%3A%20Lenovo%20Webcams%20Turn%20Into%20Hacking%20Tools%20In%20Shocking%20New%20Discovery&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery/?pk_campaign=feed&#038;pk_kwd=axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
	</channel>
</rss>
