<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>social engineering</title>
	<atom:link href="https://axisofeasy.com/tag/social-engineering/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 13 Mar 2026 16:12:40 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>social engineering</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 441: Canada Allows TikTok To Continue Operations With New Safeguards</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards/?pk_campaign=feed&#038;pk_kwd=axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards/?pk_campaign=feed&#038;pk_kwd=axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 13 Mar 2026 22:00:36 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Android Trojan]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[backups]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[Browser Extensions]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[certificate automation]]></category>
		<category><![CDATA[certificates]]></category>
		<category><![CDATA[China relations]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[CVE-2026-0628]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data loss]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Gemini]]></category>
		<category><![CDATA[GitHub supply chain]]></category>
		<category><![CDATA[government policy]]></category>
		<category><![CDATA[infrastructure security]]></category>
		<category><![CDATA[internet infrastructure]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[messaging apps]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[open web]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PKI]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[restore testing]]></category>
		<category><![CDATA[router malware]]></category>
		<category><![CDATA[Russian hackers]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[signal]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[technology policy]]></category>
		<category><![CDATA[Terraform]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[TLS]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[website operations]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[WordPress security]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33412</guid>

					<description><![CDATA[Canada Allows TikTok to Continue Operations with New Safeguards,
Russian government hackers targeting Signal and WhatsApp users, Dutch spies warn, 
Canadian Tire Data Breach Hits Millions... this and more in AofE  #441<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards&amp;action_name=%23AxisOfEasy%20441%3A%20Canada%20Allows%20TikTok%20To%20Continue%20Operations%20With%20New%20Safeguards&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards/?pk_campaign=feed&#038;pk_kwd=axisofeasy-441-canada-allows-tiktok-to-continue-operations-with-new-safeguards/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 437: Discord Is Asking For Your ID</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-437-discord-is-asking-for-your-id/?pk_campaign=feed&#038;pk_kwd=axisofeasy-437-discord-is-asking-for-your-id&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-437-discord-is-asking-for-your-id</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-437-discord-is-asking-for-your-id/?pk_campaign=feed&#038;pk_kwd=axisofeasy-437-discord-is-asking-for-your-id#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 13 Feb 2026 23:00:01 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[algorithmic limits]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[biometric authentication]]></category>
		<category><![CDATA[biometric data]]></category>
		<category><![CDATA[botnet activity]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[camera surveillance]]></category>
		<category><![CDATA[child protection]]></category>
		<category><![CDATA[corporate accountability]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[cryptocurrency theft]]></category>
		<category><![CDATA[cybercrime tactics]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[dependency auditing]]></category>
		<category><![CDATA[device fingerprinting]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[direct deposit fraud]]></category>
		<category><![CDATA[dns hijacking]]></category>
		<category><![CDATA[employee data exposure]]></category>
		<category><![CDATA[exposed emails]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[FTC enforcement]]></category>
		<category><![CDATA[GPS tracking]]></category>
		<category><![CDATA[healthcare breach]]></category>
		<category><![CDATA[ID upload]]></category>
		<category><![CDATA[identity perimeter]]></category>
		<category><![CDATA[internal systems]]></category>
		<category><![CDATA[iOS spyware]]></category>
		<category><![CDATA[IRC command and control]]></category>
		<category><![CDATA[keystroke logging]]></category>
		<category><![CDATA[Kids Off Social Media Act]]></category>
		<category><![CDATA[metadata exposure]]></category>
		<category><![CDATA[MFA bypass]]></category>
		<category><![CDATA[microphone access]]></category>
		<category><![CDATA[NPM compromise]]></category>
		<category><![CDATA[online safety]]></category>
		<category><![CDATA[payroll fraud]]></category>
		<category><![CDATA[phishing campaigns]]></category>
		<category><![CDATA[phone numbers]]></category>
		<category><![CDATA[privacy backlash]]></category>
		<category><![CDATA[pseudonymity]]></category>
		<category><![CDATA[PyPI malware]]></category>
		<category><![CDATA[ransomware groups]]></category>
		<category><![CDATA[remote access trojan]]></category>
		<category><![CDATA[shared mailboxes]]></category>
		<category><![CDATA[smishing attacks]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Social Media Regulation]]></category>
		<category><![CDATA[spyware toolkit]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[teen accounts]]></category>
		<category><![CDATA[trojanized apps]]></category>
		<category><![CDATA[unauthorized access]]></category>
		<category><![CDATA[vendor breach]]></category>
		<category><![CDATA[wallet seed phrases]]></category>
		<category><![CDATA[Workday compromise]]></category>
		<category><![CDATA[zero-day exploits]]></category>
		<category><![CDATA[ZeroDayRAT]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33140</guid>

					<description><![CDATA[Discord Is Asking For Your ID. The Backlash Is About More Than Privacy,
Hackers Hijack Physician’s Paycheck in Social Engineering Payroll Scam,
Substack Confirms Data Breach Exposing User Contact Information ... this and more in AofE  #437<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-437-discord-is-asking-for-your-id%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-437-discord-is-asking-for-your-id&amp;action_name=%23AxisOfEasy%20437%3A%20Discord%20Is%20Asking%20For%20Your%20ID&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-437-discord-is-asking-for-your-id/?pk_campaign=feed&#038;pk_kwd=axisofeasy-437-discord-is-asking-for-your-id/feed/</wfw:commentRss>
			<slash:comments>7</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 435: FBI Accesses Microsoft BitLocker Keys In Guam Fraud Case</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/?pk_campaign=feed&#038;pk_kwd=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/?pk_campaign=feed&#038;pk_kwd=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 30 Jan 2026 23:00:30 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI prompt collection]]></category>
		<category><![CDATA[AI-assisted attacks]]></category>
		<category><![CDATA[BitLocker encryption]]></category>
		<category><![CDATA[CI/CD pipeline compromise]]></category>
		<category><![CDATA[cloud key escrow]]></category>
		<category><![CDATA[container image risk]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[critical infrastructure attacks]]></category>
		<category><![CDATA[CVE exposure]]></category>
		<category><![CDATA[cybercrime forums]]></category>
		<category><![CDATA[dark web seizures]]></category>
		<category><![CDATA[data localization]]></category>
		<category><![CDATA[device encryption backdoors]]></category>
		<category><![CDATA[DOJ cybercrime enforcement]]></category>
		<category><![CDATA[energy grid cyberattacks]]></category>
		<category><![CDATA[enterprise data breaches]]></category>
		<category><![CDATA[extortion groups]]></category>
		<category><![CDATA[FBI takedowns]]></category>
		<category><![CDATA[FBI warrant]]></category>
		<category><![CDATA[Fortinet exploits]]></category>
		<category><![CDATA[fraud investigation]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Guam unemployment fraud]]></category>
		<category><![CDATA[high-severity vulnerabilities]]></category>
		<category><![CDATA[initial access brokers]]></category>
		<category><![CDATA[JavaScript supply chain flaws]]></category>
		<category><![CDATA[joint venture governance]]></category>
		<category><![CDATA[Lapsus$ affiliates]]></category>
		<category><![CDATA[law enforcement access]]></category>
		<category><![CDATA[malicious packages]]></category>
		<category><![CDATA[Maven Central]]></category>
		<category><![CDATA[MFA fatigue]]></category>
		<category><![CDATA[Microsoft cloud keys]]></category>
		<category><![CDATA[namespace confusion]]></category>
		<category><![CDATA[nation-state hacking]]></category>
		<category><![CDATA[network device compromise]]></category>
		<category><![CDATA[Nike data theft]]></category>
		<category><![CDATA[npm ecosystem]]></category>
		<category><![CDATA[NuGet vulnerabilities]]></category>
		<category><![CDATA[Okta impersonation]]></category>
		<category><![CDATA[open source supply chain attacks]]></category>
		<category><![CDATA[operational disruption]]></category>
		<category><![CDATA[Oracle cloud hosting]]></category>
		<category><![CDATA[PackageGate]]></category>
		<category><![CDATA[platform surveillance]]></category>
		<category><![CDATA[precise location tracking]]></category>
		<category><![CDATA[Privacy Risks]]></category>
		<category><![CDATA[PyPI threats]]></category>
		<category><![CDATA[RAMP marketplace]]></category>
		<category><![CDATA[ransomware extortion]]></category>
		<category><![CDATA[ransomware gangs]]></category>
		<category><![CDATA[RCE vulnerabilities]]></category>
		<category><![CDATA[recommendation algorithms]]></category>
		<category><![CDATA[repository abuse]]></category>
		<category><![CDATA[Russian intelligence operations]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Slack impersonation]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[software supply chain security]]></category>
		<category><![CDATA[SSO bypass]]></category>
		<category><![CDATA[Teams abuse]]></category>
		<category><![CDATA[threat actor migration]]></category>
		<category><![CDATA[TikTok US data collection]]></category>
		<category><![CDATA[typosquatting attacks]]></category>
		<category><![CDATA[US-China tech tensions]]></category>
		<category><![CDATA[vishing attacks]]></category>
		<category><![CDATA[voice phishing]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33045</guid>

					<description><![CDATA[FBI Accesses Microsoft BitLocker Keys in Guam Fraud Case,
Open Source Supply Chains Under Attack: Malicious Packages Surge,
Cybercrime Alliance Hits 100+ Global Organisations with Vishing Attacks ... this and more in AofE  #435<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case&amp;action_name=%23AxisOfEasy%20435%3A%20FBI%20Accesses%20Microsoft%20BitLocker%20Keys%20In%20Guam%20Fraud%20Case&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/?pk_campaign=feed&#038;pk_kwd=axisofeasy-435-fbi-accesses-microsoft-bitlocker-keys-in-guam-fraud-case/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 433: Australia Moves To Enact Sweeping New Hate Speech And Extremism Laws</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/#comments</comments>
		
		<dc:creator><![CDATA[Joey Tweets]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 23:00:09 +0000</pubDate>
				<category><![CDATA[AI security]]></category>
		<category><![CDATA[attack analysis]]></category>
		<category><![CDATA[Australia hate speech law]]></category>
		<category><![CDATA[BEC]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[Claude Cowork]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[CVE-2025-64155]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[DeadLock]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[FortiSIEM]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[January 2026]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[micropayments]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RCE]]></category>
		<category><![CDATA[RedVDS]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[VoidLink]]></category>
		<category><![CDATA[x402]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=32986</guid>

					<description><![CDATA[Australia is moving to criminalize speech based on hypothetical harm. Meanwhile, Claude Co-Work is exfiltrating your files, and six critical attack stories expose systematic infrastructure failure - this is #AxisofEasy 433<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws%2F&amp;action_name=%23AxisOfEasy%20433%3A%20Australia%20Moves%20To%20Enact%20Sweeping%20New%20Hate%20Speech%20And%20Extremism%20Laws&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-433-australia-moves-to-enact-sweeping-new-hate-speech-and-extremism-laws/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 429: Edmonton’s New Police Pilot Brings Facial Recognition Into Officers’ Line Of Sight</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight/?pk_campaign=feed&#038;pk_kwd=axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight/?pk_campaign=feed&#038;pk_kwd=axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 05 Dec 2025 23:00:13 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Akira ransomware]]></category>
		<category><![CDATA[algorithmic policing]]></category>
		<category><![CDATA[Apple compliance]]></category>
		<category><![CDATA[Axon cameras]]></category>
		<category><![CDATA[banking cybersecurity]]></category>
		<category><![CDATA[biometric databases]]></category>
		<category><![CDATA[body cameras]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[ClickFix attack]]></category>
		<category><![CDATA[cloud application security]]></category>
		<category><![CDATA[CodeRED shutdown]]></category>
		<category><![CDATA[compliance platforms]]></category>
		<category><![CDATA[continuous monitoring]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[Crisis24 breach]]></category>
		<category><![CDATA[cross-platform threats]]></category>
		<category><![CDATA[CVE-2025-55182]]></category>
		<category><![CDATA[CVE-2025-66478]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data retention]]></category>
		<category><![CDATA[device surveillance]]></category>
		<category><![CDATA[emergency alert system outage]]></category>
		<category><![CDATA[EPS Edmonton]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[fake ChatGPT installers]]></category>
		<category><![CDATA[financial data exposure]]></category>
		<category><![CDATA[framework patching]]></category>
		<category><![CDATA[government tracking app]]></category>
		<category><![CDATA[human factor risks]]></category>
		<category><![CDATA[IMSI tracking]]></category>
		<category><![CDATA[India smartphone mandate]]></category>
		<category><![CDATA[insecure deserialization]]></category>
		<category><![CDATA[Iranian hackers TA450]]></category>
		<category><![CDATA[ISP account termination]]></category>
		<category><![CDATA[law enforcement technology]]></category>
		<category><![CDATA[macOS privilege escalation]]></category>
		<category><![CDATA[malicious Rust crate]]></category>
		<category><![CDATA[malicious websites]]></category>
		<category><![CDATA[Marquis Fintech]]></category>
		<category><![CDATA[Next.js vulnerability]]></category>
		<category><![CDATA[NGO cyber targeting]]></category>
		<category><![CDATA[North Korean hackers TA427]]></category>
		<category><![CDATA[npm malicious packages]]></category>
		<category><![CDATA[OtterCookie malware]]></category>
		<category><![CDATA[phishing campaigns]]></category>
		<category><![CDATA[piracy policy]]></category>
		<category><![CDATA[police surveillance]]></category>
		<category><![CDATA[Privacy Concerns]]></category>
		<category><![CDATA[privacy regulation]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RCE]]></category>
		<category><![CDATA[React 19 vulnerability]]></category>
		<category><![CDATA[React Server Components]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Russian hackers TA422]]></category>
		<category><![CDATA[Russian hacking group]]></category>
		<category><![CDATA[Sanchar Saathi]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[software supply chain]]></category>
		<category><![CDATA[SonicWall exploit]]></category>
		<category><![CDATA[Star Blizzard]]></category>
		<category><![CDATA[supply-chain malware]]></category>
		<category><![CDATA[Supreme Court case]]></category>
		<category><![CDATA[telecom regulation]]></category>
		<category><![CDATA[terminal command attacks]]></category>
		<category><![CDATA[third-party risk]]></category>
		<category><![CDATA[user identification]]></category>
		<category><![CDATA[web application security]]></category>
		<category><![CDATA[Web3 malware]]></category>
		<category><![CDATA[Zero-day vulnerability]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32783</guid>

					<description><![CDATA[Edmonton’s new police pilot brings facial recognition into officers’ line of sight,
Marquis Fintech Confirms Ransomware Attack That Exposed Data of Hundreds of Thousands of Bank Customers,
React and Next.js Servers Face Critical Remote Code Execution Vulnerability... this and more in AofE  #429<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight&amp;action_name=%23AxisOfEasy%20429%3A%20Edmonton%E2%80%99s%20New%20Police%20Pilot%20Brings%20Facial%20Recognition%20Into%20Officers%E2%80%99%20Line%20Of%20Sight&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight/?pk_campaign=feed&#038;pk_kwd=axisofeasy-429-edmontons-new-police-pilot-brings-facial-recognition-into-officers-line-of-sight/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 427: Cloudflare’s Internal Failure Briefly Turns The Internet’s Biggest Platforms Dark</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark/?pk_campaign=feed&#038;pk_kwd=axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark/?pk_campaign=feed&#038;pk_kwd=axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 21 Nov 2025 23:00:45 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[7-Zip]]></category>
		<category><![CDATA[AI-driven cyberattack]]></category>
		<category><![CDATA[Ariantel]]></category>
		<category><![CDATA[autonomous hacking]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[Blockchain.com]]></category>
		<category><![CDATA[Bot Management System]]></category>
		<category><![CDATA[centralized infrastructure]]></category>
		<category><![CDATA[Chat]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Chinese state actors]]></category>
		<category><![CDATA[CIPA]]></category>
		<category><![CDATA[Citizen Lab]]></category>
		<category><![CDATA[Cl0p ransomware]]></category>
		<category><![CDATA[Claude Code]]></category>
		<category><![CDATA[cloud DDoS attack]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[Coinbase]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data access]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[database error]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[DDoSecrets]]></category>
		<category><![CDATA[decentralization]]></category>
		<category><![CDATA[deceptive practices]]></category>
		<category><![CDATA[deep packet inspection]]></category>
		<category><![CDATA[DoorDash breach]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[Ethereum]]></category>
		<category><![CDATA[fake IT workers]]></category>
		<category><![CDATA[FIN11]]></category>
		<category><![CDATA[financial sector]]></category>
		<category><![CDATA[Freedom of Speech]]></category>
		<category><![CDATA[FTSE 100 credentials]]></category>
		<category><![CDATA[Gemini AI]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[internet outage]]></category>
		<category><![CDATA[Logitech]]></category>
		<category><![CDATA[Meet]]></category>
		<category><![CDATA[Model Context Protocol]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Oracle EBS]]></category>
		<category><![CDATA[political persecution]]></category>
		<category><![CDATA[privacy lawsuit]]></category>
		<category><![CDATA[Protei]]></category>
		<category><![CDATA[ransomware campaign]]></category>
		<category><![CDATA[RCE vulnerability]]></category>
		<category><![CDATA[SOC automation]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SORM]]></category>
		<category><![CDATA[Stored Communications Act]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[symbolic link exploit]]></category>
		<category><![CDATA[telecom interception]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Trustless Manifesto]]></category>
		<category><![CDATA[Venezuela]]></category>
		<category><![CDATA[vulnerability assessment]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[X]]></category>
		<category><![CDATA[Zero-day vulnerability]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32662</guid>

					<description><![CDATA[Cloudflare’s internal failure briefly turns the internet’s biggest platforms dark
Protei is hacked and its surveillance data spills into public view
AI runs most of a state-backed cyberattack and forces OpenAI to sound the alarm... this and more in AofE  #427<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark&amp;action_name=%23AxisOfEasy%20427%3A%20Cloudflare%E2%80%99s%20Internal%20Failure%20Briefly%20Turns%20The%20Internet%E2%80%99s%20Biggest%20Platforms%20Dark&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark/?pk_campaign=feed&#038;pk_kwd=axisofeasy-427-cloudflares-internal-failure-briefly-turns-the-internets-biggest-platforms-dark/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 425: Microsoft Teams Security Flaws Show How Easily Digital Trust Can Be Exploited</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/?pk_campaign=feed&#038;pk_kwd=axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/?pk_campaign=feed&#038;pk_kwd=axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 07 Nov 2025 23:00:46 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[ai browser]]></category>
		<category><![CDATA[ai companions]]></category>
		<category><![CDATA[AI governance]]></category>
		<category><![CDATA[ai threat surface]]></category>
		<category><![CDATA[antonio guterres]]></category>
		<category><![CDATA[california ai law]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[character.ai]]></category>
		<category><![CDATA[chatgpt atlas]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[cisa kev]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[code injection]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[csrf exploit]]></category>
		<category><![CDATA[cve-2025-24893]]></category>
		<category><![CDATA[cybercrime treaty]]></category>
		<category><![CDATA[cybersecurity tech accord]]></category>
		<category><![CDATA[daniel de freitas]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[dentsu merkle]]></category>
		<category><![CDATA[dia browser]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[discord tokens]]></category>
		<category><![CDATA[DoJ]]></category>
		<category><![CDATA[edge browser]]></category>
		<category><![CDATA[EFF]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[global cybersecurity]]></category>
		<category><![CDATA[human rights watch]]></category>
		<category><![CDATA[hydra communications]]></category>
		<category><![CDATA[indicators of compromise]]></category>
		<category><![CDATA[josh hawley]]></category>
		<category><![CDATA[L3Harris]]></category>
		<category><![CDATA[lawsuits]]></category>
		<category><![CDATA[layerx security]]></category>
		<category><![CDATA[legal risk]]></category>
		<category><![CDATA[mental health]]></category>
		<category><![CDATA[Microsoft Azure]]></category>
		<category><![CDATA[neuraltrust]]></category>
		<category><![CDATA[noam shazeer]]></category>
		<category><![CDATA[npm packages]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[payroll breach]]></category>
		<category><![CDATA[perplexit comet]]></category>
		<category><![CDATA[persistent memory]]></category>
		<category><![CDATA[peter williams]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[redtiger infostealer]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Richard Blumenthal]]></category>
		<category><![CDATA[russian buyer]]></category>
		<category><![CDATA[senate legislation]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[solr search vulnerability]]></category>
		<category><![CDATA[suicide prevention]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tata motors]]></category>
		<category><![CDATA[tcrond coinminer]]></category>
		<category><![CDATA[TechCrunch]]></category>
		<category><![CDATA[teen safety]]></category>
		<category><![CDATA[Trade Secrets]]></category>
		<category><![CDATA[united nations]]></category>
		<category><![CDATA[unodc]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[vulncheck]]></category>
		<category><![CDATA[xwiki]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32597</guid>

					<description><![CDATA[Microsoft Teams Security Flaws Show How Easily Digital Trust Can Be Exploited,
DHS Plans to Collect Biometrics from Immigrants and US Citizens Alike, 
Threat Actors Have Turned the OpenAI Assistants API Into a Stealthy Malware Control Channel .. this and more in AofE  #425<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited&amp;action_name=%23AxisOfEasy%20425%3A%20Microsoft%20Teams%20Security%20Flaws%20Show%20How%20Easily%20Digital%20Trust%20Can%20Be%20Exploited&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/?pk_campaign=feed&#038;pk_kwd=axisofeasy-425-microsoft-teams-security-flaws-show-how-easily-digital-trust-can-be-exploited/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 424: ChatGPT Atlas Exploit Exposes Persistent Memory Vulnerability In AI Browsers</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 31 Oct 2025 22:00:51 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[ai browser]]></category>
		<category><![CDATA[ai companions]]></category>
		<category><![CDATA[AI governance]]></category>
		<category><![CDATA[ai threat surface]]></category>
		<category><![CDATA[antonio guterres]]></category>
		<category><![CDATA[california ai law]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[character.ai]]></category>
		<category><![CDATA[chatgpt atlas]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[cisa kev]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[code injection]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[csrf exploit]]></category>
		<category><![CDATA[cve-2025-24893]]></category>
		<category><![CDATA[cybercrime treaty]]></category>
		<category><![CDATA[cybersecurity tech accord]]></category>
		<category><![CDATA[daniel de freitas]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[dentsu merkle]]></category>
		<category><![CDATA[dia browser]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[discord tokens]]></category>
		<category><![CDATA[DoJ]]></category>
		<category><![CDATA[edge browser]]></category>
		<category><![CDATA[EFF]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[global cybersecurity]]></category>
		<category><![CDATA[human rights watch]]></category>
		<category><![CDATA[hydra communications]]></category>
		<category><![CDATA[indicators of compromise]]></category>
		<category><![CDATA[josh hawley]]></category>
		<category><![CDATA[L3Harris]]></category>
		<category><![CDATA[lawsuits]]></category>
		<category><![CDATA[layerx security]]></category>
		<category><![CDATA[legal risk]]></category>
		<category><![CDATA[mental health]]></category>
		<category><![CDATA[Microsoft Azure]]></category>
		<category><![CDATA[neuraltrust]]></category>
		<category><![CDATA[noam shazeer]]></category>
		<category><![CDATA[npm packages]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[payroll breach]]></category>
		<category><![CDATA[perplexit comet]]></category>
		<category><![CDATA[persistent memory]]></category>
		<category><![CDATA[peter williams]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[redtiger infostealer]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Richard Blumenthal]]></category>
		<category><![CDATA[russian buyer]]></category>
		<category><![CDATA[senate legislation]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[solr search vulnerability]]></category>
		<category><![CDATA[suicide prevention]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tata motors]]></category>
		<category><![CDATA[tcrond coinminer]]></category>
		<category><![CDATA[TechCrunch]]></category>
		<category><![CDATA[teen safety]]></category>
		<category><![CDATA[Trade Secrets]]></category>
		<category><![CDATA[united nations]]></category>
		<category><![CDATA[unodc]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[vulncheck]]></category>
		<category><![CDATA[xwiki]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32557</guid>

					<description><![CDATA[ChatGPT Atlas Exploit Exposes Persistent Memory Vulnerability in AI Browsers,
CharacterAI Restricts Teen Access Amid Legal and Regulatory Backlash Over AI Chat Risks,
XWiki Servers Under Active Attack Through Critical Solr Search Vulnerability... this and more in AofE  #424<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers&amp;action_name=%23AxisOfEasy%20424%3A%20ChatGPT%20Atlas%20Exploit%20Exposes%20Persistent%20Memory%20Vulnerability%20In%20AI%20Browsers&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-424-chatgpt-atlas-exploit-exposes-persistent-memory-vulnerability-in-ai-browsers/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 421: Is Your Data Safe After the Discord Hack?</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-421-is-your-data-safe-after-the-discord-hack/?pk_campaign=feed&#038;pk_kwd=axisofeasy-421-is-your-data-safe-after-the-discord-hack&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-421-is-your-data-safe-after-the-discord-hack</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-421-is-your-data-safe-after-the-discord-hack/?pk_campaign=feed&#038;pk_kwd=axisofeasy-421-is-your-data-safe-after-the-discord-hack#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 10 Oct 2025 22:00:49 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[52 Division]]></category>
		<category><![CDATA[Aadhaar]]></category>
		<category><![CDATA[age appeal process]]></category>
		<category><![CDATA[airport outage]]></category>
		<category><![CDATA[ANTSWORD]]></category>
		<category><![CDATA[Asahi Group]]></category>
		<category><![CDATA[Billy Bishop]]></category>
		<category><![CDATA[biometric authentication]]></category>
		<category><![CDATA[border control]]></category>
		<category><![CDATA[C2 server]]></category>
		<category><![CDATA[CAFC]]></category>
		<category><![CDATA[caller ID spoofing]]></category>
		<category><![CDATA[CBSA]]></category>
		<category><![CDATA[Chinese hackers]]></category>
		<category><![CDATA[Clop hackers]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cryptocurrency scam]]></category>
		<category><![CDATA[customer support]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cyber Risk]]></category>
		<category><![CDATA[cyberattack denial]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[digital fraud]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[Discord]]></category>
		<category><![CDATA[DNS failure]]></category>
		<category><![CDATA[Doug Ford]]></category>
		<category><![CDATA[EU surveillance law]]></category>
		<category><![CDATA[extortion]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[fake investment]]></category>
		<category><![CDATA[fee scam]]></category>
		<category><![CDATA[fingerprints]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[German government]]></category>
		<category><![CDATA[Gh0st RAT]]></category>
		<category><![CDATA[Global Fintech Festival]]></category>
		<category><![CDATA[GoAnywhere MFT vulnerability]]></category>
		<category><![CDATA[government ID images]]></category>
		<category><![CDATA[Guelph]]></category>
		<category><![CDATA[Guelph Police]]></category>
		<category><![CDATA[Hong Kong]]></category>
		<category><![CDATA[Huntress]]></category>
		<category><![CDATA[impersonation]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[investor awareness]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[kiosk failure]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[law enforcement impersonation]]></category>
		<category><![CDATA[malware campaign]]></category>
		<category><![CDATA[Medusa Ransomware]]></category>
		<category><![CDATA[Microsoft Defender]]></category>
		<category><![CDATA[Microsoft exploitation]]></category>
		<category><![CDATA[misdirection]]></category>
		<category><![CDATA[Nezha]]></category>
		<category><![CDATA[NPCI]]></category>
		<category><![CDATA[online identity verification]]></category>
		<category><![CDATA[Oracle EBS zero-day]]></category>
		<category><![CDATA[payments]]></category>
		<category><![CDATA[phone spoofing]]></category>
		<category><![CDATA[phpMyAdmin]]></category>
		<category><![CDATA[PowerShell]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Concerns]]></category>
		<category><![CDATA[Qilin ransomware]]></category>
		<category><![CDATA[regulatory framework]]></category>
		<category><![CDATA[Renault]]></category>
		<category><![CDATA[Reserve Bank of India]]></category>
		<category><![CDATA[scam detection]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[social media fraud]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[technical maintenance]]></category>
		<category><![CDATA[third-party vendor]]></category>
		<category><![CDATA[Toronto Pearson]]></category>
		<category><![CDATA[Toronto Police Services]]></category>
		<category><![CDATA[travel disruption]]></category>
		<category><![CDATA[Trust & Safety]]></category>
		<category><![CDATA[UPI]]></category>
		<category><![CDATA[vehicle data theft]]></category>
		<category><![CDATA[VOIP]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32423</guid>

					<description><![CDATA[Vendor Breach Exposes Discord Support Data and ID Images,
India Turns Every Face and Finger into a Payment Key,
Airport Outage Sparks Delays as CBSA Rules Out Cyberattack... this and more in AofE  #421<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-421-is-your-data-safe-after-the-discord-hack%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-421-is-your-data-safe-after-the-discord-hack&amp;action_name=%23AxisOfEasy%20421%3A%20Is%20Your%20Data%20Safe%20After%20the%20Discord%20Hack%3F&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-421-is-your-data-safe-after-the-discord-hack/?pk_campaign=feed&#038;pk_kwd=axisofeasy-421-is-your-data-safe-after-the-discord-hack/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 420: RedNovember&#8217;s Global Cyber-Espionage Blitz</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-420-rednovembers-global-cyber-espionage-blitz</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 03 Oct 2025 22:00:48 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[1.2 million passengers]]></category>
		<category><![CDATA[1500 organizations]]></category>
		<category><![CDATA[ACSC]]></category>
		<category><![CDATA[Africa]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[arbitrary code execution]]></category>
		<category><![CDATA[ArcaneDoor]]></category>
		<category><![CDATA[ASA]]></category>
		<category><![CDATA[authentication bypass]]></category>
		<category><![CDATA[aviation]]></category>
		<category><![CDATA[banking trojan]]></category>
		<category><![CDATA[BCC]]></category>
		<category><![CDATA[Bill C-36]]></category>
		<category><![CDATA[Bill C-8]]></category>
		<category><![CDATA[Bill C-9]]></category>
		<category><![CDATA[Bitcoin Treasury]]></category>
		<category><![CDATA[C-2]]></category>
		<category><![CDATA[C-26]]></category>
		<category><![CDATA[C-8]]></category>
		<category><![CDATA[C-9]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Canadian Bitcoin Conference]]></category>
		<category><![CDATA[Canadian Bitcoin Podcast]]></category>
		<category><![CDATA[Canadian Human Rights Act]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[Central Asia]]></category>
		<category><![CDATA[Charter of Rights and Freedoms]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Cisco ASA]]></category>
		<category><![CDATA[Citizen Lab]]></category>
		<category><![CDATA[Cobalt Strike]]></category>
		<category><![CDATA[command-and-control]]></category>
		<category><![CDATA[Criminal Code]]></category>
		<category><![CDATA[CVE-2025-20333]]></category>
		<category><![CDATA[CVE-2025-20362]]></category>
		<category><![CDATA[cyber campaign]]></category>
		<category><![CDATA[cyber defense]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[developer data]]></category>
		<category><![CDATA[Digital Safety Commission]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[F5 BIG-IP]]></category>
		<category><![CDATA[fake recruiters]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[FTD]]></category>
		<category><![CDATA[genocide]]></category>
		<category><![CDATA[geopolitics]]></category>
		<category><![CDATA[harmful online content]]></category>
		<category><![CDATA[hate speech]]></category>
		<category><![CDATA[IDs]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Indian Cyber Crime Coordination Centre]]></category>
		<category><![CDATA[Insikt Group]]></category>
		<category><![CDATA[IT Act 2000]]></category>
		<category><![CDATA[Ivanti Connect Secure]]></category>
		<category><![CDATA[Joey Temprile]]></category>
		<category><![CDATA[Justice M Nagaprasanna]]></category>
		<category><![CDATA[Karnataka High Court]]></category>
		<category><![CDATA[Klopatra]]></category>
		<category><![CDATA[LESLIELOADER]]></category>
		<category><![CDATA[Line Dancer]]></category>
		<category><![CDATA[Line Runner]]></category>
		<category><![CDATA[loyalty programs]]></category>
		<category><![CDATA[Mark Jeftovic]]></category>
		<category><![CDATA[MCP server]]></category>
		<category><![CDATA[Melanie Joly]]></category>
		<category><![CDATA[Ministry of Home Affairs]]></category>
		<category><![CDATA[mitigation]]></category>
		<category><![CDATA[Montreal]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[Net-Star malware]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[online misuse]]></category>
		<category><![CDATA[Outlook Web Access]]></category>
		<category><![CDATA[Panama]]></category>
		<category><![CDATA[Pantegana]]></category>
		<category><![CDATA[passports]]></category>
		<category><![CDATA[peace bonds]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[Phantom Taurus]]></category>
		<category><![CDATA[phone hijacking]]></category>
		<category><![CDATA[PoC exploits]]></category>
		<category><![CDATA[Qantas]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Recorded Future]]></category>
		<category><![CDATA[RedNovember]]></category>
		<category><![CDATA[Rialto Theatre]]></category>
		<category><![CDATA[ROM manipulation]]></category>
		<category><![CDATA[Sahyog portal]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[Sean Fraser]]></category>
		<category><![CDATA[secrets]]></category>
		<category><![CDATA[Section 69A]]></category>
		<category><![CDATA[Secure Firewall]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[SparkRAT]]></category>
		<category><![CDATA[spearphishing]]></category>
		<category><![CDATA[state-sponsored]]></category>
		<category><![CDATA[Steven Guilbeault]]></category>
		<category><![CDATA[Storm-1849]]></category>
		<category><![CDATA[Storm-2077]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[surveillance bills]]></category>
		<category><![CDATA[TAG-100]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[transportation networks]]></category>
		<category><![CDATA[twitter]]></category>
		<category><![CDATA[U.S. defense contractors]]></category>
		<category><![CDATA[UAT4356]]></category>
		<category><![CDATA[VNC]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[WestJet]]></category>
		<category><![CDATA[women’s safety]]></category>
		<category><![CDATA[X Corp]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32373</guid>

					<description><![CDATA[... this and more in AofE  #420<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-420-rednovembers-global-cyber-espionage-blitz%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-420-rednovembers-global-cyber-espionage-blitz&amp;action_name=%23AxisOfEasy%20420%3A%20RedNovember%26%238217%3Bs%20Global%20Cyber-Espionage%20Blitz&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
