<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Social Media</title>
	<atom:link href="https://axisofeasy.com/tag/social-media/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 20 Mar 2026 16:14:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>Social Media</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 442: Canada Introduces Bill C-22 For Mandatory Metadata Retention</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 20 Mar 2026 22:00:54 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI music]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Bill C-22]]></category>
		<category><![CDATA[C2 framework]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Claude AI]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[Crypto Wallets]]></category>
		<category><![CDATA[CSIS]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DarkSword]]></category>
		<category><![CDATA[data brokers]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[evasion]]></category>
		<category><![CDATA[exploit kit]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Fourth Amendment]]></category>
		<category><![CDATA[geolocation tracking]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Glassworm]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Handala hackers]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[Interlock]]></category>
		<category><![CDATA[iOS vulnerabilities]]></category>
		<category><![CDATA[Lawful Access]]></category>
		<category><![CDATA[Linux security]]></category>
		<category><![CDATA[location data]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[metadata retention]]></category>
		<category><![CDATA[Npm]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RCMP]]></category>
		<category><![CDATA[real estate]]></category>
		<category><![CDATA[root access]]></category>
		<category><![CDATA[snapd]]></category>
		<category><![CDATA[SnappyClient]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[stolen credentials]]></category>
		<category><![CDATA[Stryker breach]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[systemd]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<category><![CDATA[Unicode obfuscation]]></category>
		<category><![CDATA[virtual band]]></category>
		<category><![CDATA[warrants]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33472</guid>

					<description><![CDATA[Canada Introduces Bill C-22 For Mandatory Metadata Retention
Meta is Ending Instagram Direct Message End-to-End Encryption
Invisible Unicode Supply-Chain Attack Hits GitHub Ecosystem... this and more in AofE  #442<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention&amp;action_name=%23AxisOfEasy%20442%3A%20Canada%20Introduces%20Bill%20C-22%20For%20Mandatory%20Metadata%20Retention&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 417: Nepal Goes Offline, Then Up In Flames</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-417-nepal-goes-offline-then-up-in-flames</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 12 Sep 2025 22:00:20 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[Adobe]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[Ascension]]></category>
		<category><![CDATA[Asia]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[BitLocker]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[Bugcrowd]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[chalk]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chitwan]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[color-convert]]></category>
		<category><![CDATA[Commerce]]></category>
		<category><![CDATA[connectivity]]></category>
		<category><![CDATA[corruption]]></category>
		<category><![CDATA[crypto-clipper]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[dependencies]]></category>
		<category><![CDATA[DES]]></category>
		<category><![CDATA[Detection]]></category>
		<category><![CDATA[Drift]]></category>
		<category><![CDATA[EggStreme]]></category>
		<category><![CDATA[embassies]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[error-ex]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[Ethereum]]></category>
		<category><![CDATA[Etherscan]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[fileless malware]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Gulf]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[IMEWE]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[Jaguar Land Rover]]></category>
		<category><![CDATA[Janakpur]]></category>
		<category><![CDATA[Jeddah]]></category>
		<category><![CDATA[K.P. Sharma Oli]]></category>
		<category><![CDATA[Kathmandu]]></category>
		<category><![CDATA[Kerberoasting]]></category>
		<category><![CDATA[Kerberos]]></category>
		<category><![CDATA[latency]]></category>
		<category><![CDATA[lockfiles]]></category>
		<category><![CDATA[Magento]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mandiant]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[migration]]></category>
		<category><![CDATA[negligence]]></category>
		<category><![CDATA[nepal]]></category>
		<category><![CDATA[NetBlocks]]></category>
		<category><![CDATA[Node.js]]></category>
		<category><![CDATA[Npm]]></category>
		<category><![CDATA[OAuth]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[outages]]></category>
		<category><![CDATA[package.json]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Palo Alto Networks]]></category>
		<category><![CDATA[parliament]]></category>
		<category><![CDATA[patches.]]></category>
		<category><![CDATA[Philippines]]></category>
		<category><![CDATA[Proofpoint]]></category>
		<category><![CDATA[protests]]></category>
		<category><![CDATA[qix]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RC4]]></category>
		<category><![CDATA[red sea]]></category>
		<category><![CDATA[repair]]></category>
		<category><![CDATA[riot police]]></category>
		<category><![CDATA[Ron Wyden]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salesloft]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[SEA-ME-WE-4]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[SMB]]></category>
		<category><![CDATA[Snowflake]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[strip-ansi]]></category>
		<category><![CDATA[students]]></category>
		<category><![CDATA[submarine cables]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[Tenable]]></category>
		<category><![CDATA[tokens]]></category>
		<category><![CDATA[trust]]></category>
		<category><![CDATA[UNC6395]]></category>
		<category><![CDATA[unemployment]]></category>
		<category><![CDATA[US lawmakers]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[WeChat]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[Windows Server 2025]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32257</guid>

					<description><![CDATA[ Nepal Goes Offline, Then Up in Flames,
Wyden Targets Microsoft Over RC4 Use in Ransomware-Fueled Healthcare Breach,
Salesloft Breach Exposes OAuth Supply Chain Weakness Across Major Tech Platforms...this and more in AofE  #417<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-417-nepal-goes-offline-then-up-in-flames%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-417-nepal-goes-offline-then-up-in-flames&amp;action_name=%23AxisOfEasy%20417%3A%20Nepal%20Goes%20Offline%2C%20Then%20Up%20In%20Flames&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-417-nepal-goes-offline-then-up-in-flames/?pk_campaign=feed&#038;pk_kwd=axisofeasy-417-nepal-goes-offline-then-up-in-flames/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 400: North Korean Hackers Infiltrate U.S. Tech Jobs With Fake Identities And Remote Access</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 16 May 2025 22:00:57 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[account compromise]]></category>
		<category><![CDATA[Albania]]></category>
		<category><![CDATA[AnyDesk]]></category>
		<category><![CDATA[Baby Box Info]]></category>
		<category><![CDATA[Belgium]]></category>
		<category><![CDATA[birthdate]]></category>
		<category><![CDATA[breach detection]]></category>
		<category><![CDATA[breach monetization]]></category>
		<category><![CDATA[call centers]]></category>
		<category><![CDATA[Co-Op]]></category>
		<category><![CDATA[compromised credentials]]></category>
		<category><![CDATA[coordinated raids]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[Cubix Tech US]]></category>
		<category><![CDATA[Customer Data Breach]]></category>
		<category><![CDATA[cyber fraud]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybercrime ring]]></category>
		<category><![CDATA[cybercrime statistics]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity response]]></category>
		<category><![CDATA[Cyprus]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[decryption mandate]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[Digital Safety]]></category>
		<category><![CDATA[DOJ indictment]]></category>
		<category><![CDATA[DPRK]]></category>
		<category><![CDATA[DragonForce]]></category>
		<category><![CDATA[Dubai]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[electronic seizures]]></category>
		<category><![CDATA[electronics shipping]]></category>
		<category><![CDATA[encryption backdoor]]></category>
		<category><![CDATA[encryption debate]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[English-Korean]]></category>
		<category><![CDATA[Eurojust]]></category>
		<category><![CDATA[Europol]]></category>
		<category><![CDATA[fake identities]]></category>
		<category><![CDATA[fake investment schemes]]></category>
		<category><![CDATA[fake resumes]]></category>
		<category><![CDATA[FBI report]]></category>
		<category><![CDATA[financial fraud]]></category>
		<category><![CDATA[Flashpoint]]></category>
		<category><![CDATA[Florida bill]]></category>
		<category><![CDATA[fraud prosecution]]></category>
		<category><![CDATA[fraudulent employment]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Google Translate]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Harrods]]></category>
		<category><![CDATA[Helix US]]></category>
		<category><![CDATA[home address]]></category>
		<category><![CDATA[HR verification scripts]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[incident disclosure]]></category>
		<category><![CDATA[infostealer logs]]></category>
		<category><![CDATA[internal hierarchy]]></category>
		<category><![CDATA[international operation]]></category>
		<category><![CDATA[investment fraud]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[job references]]></category>
		<category><![CDATA[jsilver617]]></category>
		<category><![CDATA[judicial oversight]]></category>
		<category><![CDATA[Lahore Pakistan]]></category>
		<category><![CDATA[Latvia]]></category>
		<category><![CDATA[law enforcement access]]></category>
		<category><![CDATA[legislative overreach]]></category>
		<category><![CDATA[London Stock Exchange update]]></category>
		<category><![CDATA[M&S]]></category>
		<category><![CDATA[Marks and Spencer]]></category>
		<category><![CDATA[minors online safety]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[Nickel Tapestry]]></category>
		<category><![CDATA[NIgeria]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[online gaming]]></category>
		<category><![CDATA[online orders]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[online shopping]]></category>
		<category><![CDATA[OTP codes]]></category>
		<category><![CDATA[password change]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[password reset]]></category>
		<category><![CDATA[password theft]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[phishing risk]]></category>
		<category><![CDATA[phishing risks]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[phone numbers]]></category>
		<category><![CDATA[pig butchering scam]]></category>
		<category><![CDATA[platform security]]></category>
		<category><![CDATA[platform vulnerability]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[professionalized hacking]]></category>
		<category><![CDATA[profit dashboard]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware-as-a-service]]></category>
		<category><![CDATA[remote access]]></category>
		<category><![CDATA[retail cybersecurity]]></category>
		<category><![CDATA[scam brokers]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Steam]]></category>
		<category><![CDATA[stolen identities]]></category>
		<category><![CDATA[subpoena access]]></category>
		<category><![CDATA[surveillance tools]]></category>
		<category><![CDATA[tech legislation]]></category>
		<category><![CDATA[Two-Factor Authentication]]></category>
		<category><![CDATA[U.S. infrastructure infiltration]]></category>
		<category><![CDATA[U.S. tech jobs]]></category>
		<category><![CDATA[UK retailers]]></category>
		<category><![CDATA[user accounts]]></category>
		<category><![CDATA[user privacy]]></category>
		<category><![CDATA[Valve]]></category>
		<category><![CDATA[victim grooming]]></category>
		<category><![CDATA[webcam avoidance]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31552</guid>

					<description><![CDATA[North Korean Hackers Infiltrate U.S. Tech Jobs with Fake Identities and Remote Access,
Steam Breach Exposes 89 Million Accounts in Dark Web Data Sale, 
Marks and Spencer Cyberattack Exposes Customer Data and Halts Online Orders (update from AoE #397)... this and more in AofE  #400<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access&amp;action_name=%23AxisOfEasy%20400%3A%20North%20Korean%20Hackers%20Infiltrate%20U.S.%20Tech%20Jobs%20With%20Fake%20Identities%20And%20Remote%20Access&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/?pk_campaign=feed&#038;pk_kwd=axisofeasy-400north-korean-hackers-infiltrate-u-s-tech-jobs-with-fake-identities-and-remote-access/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 389: What Did You Get Done Last Week?</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-389-what-did-you-get-done-last-week/?pk_campaign=feed&#038;pk_kwd=axisofeasy-389-what-did-you-get-done-last-week&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-389-what-did-you-get-done-last-week</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-389-what-did-you-get-done-last-week/?pk_campaign=feed&#038;pk_kwd=axisofeasy-389-what-did-you-get-done-last-week#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 28 Feb 2025 23:00:56 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[AI censorship]]></category>
		<category><![CDATA[AI governance]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Asana]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[bullet journaling]]></category>
		<category><![CDATA[bureaucracy]]></category>
		<category><![CDATA[busywork]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chrystia Freeland]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity threats]]></category>
		<category><![CDATA[daily wins]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[digital privacy]]></category>
		<category><![CDATA[digital trust]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[efficiency]]></category>
		<category><![CDATA[election interference]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[gaming]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[goal setting]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[index cards]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Journalists]]></category>
		<category><![CDATA[Justin Trudeau]]></category>
		<category><![CDATA[leadership]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[LockBit]]></category>
		<category><![CDATA[Mark Jeftovic]]></category>
		<category><![CDATA[Omnifocus]]></category>
		<category><![CDATA[OmniGPT]]></category>
		<category><![CDATA[online scams]]></category>
		<category><![CDATA[Paragon]]></category>
		<category><![CDATA[personal development]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PlayStation Network]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[productivity]]></category>
		<category><![CDATA[project management]]></category>
		<category><![CDATA[PSN outage]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RAT malware]]></category>
		<category><![CDATA[sanctions]]></category>
		<category><![CDATA[self-improvement]]></category>
		<category><![CDATA[self-reflection]]></category>
		<category><![CDATA[SITE]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Sony]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[task tracking]]></category>
		<category><![CDATA[technology risks]]></category>
		<category><![CDATA[threat landscape]]></category>
		<category><![CDATA[time management]]></category>
		<category><![CDATA[U.K. government]]></category>
		<category><![CDATA[work habits]]></category>
		<category><![CDATA[work-from-home scams]]></category>
		<category><![CDATA[Zservers]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31143</guid>

					<description><![CDATA[What Did You Get Done Last Week? (From the desk of Mark Jeftovic, easyDNS CEO),
AI-Powered Phishing Scams: How Cybercriminals Use Deepfakes and Stolen Credentials to Hijack Accounts,
Private GitHub Repos Still Accessible via Microsoft Copilot, Security Firm Warns ... this and more in AofE  #389<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-389-what-did-you-get-done-last-week%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-389-what-did-you-get-done-last-week&amp;action_name=%23AxisOfEasy%20389%3A%20What%20Did%20You%20Get%20Done%20Last%20Week%3F&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-389-what-did-you-get-done-last-week/?pk_campaign=feed&#038;pk_kwd=axisofeasy-389-what-did-you-get-done-last-week/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 375: Canada&#8217;s Bill S-210 Sparks Concerns Over Digital ID Age Verification</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification/?pk_campaign=feed&#038;pk_kwd=axisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification/?pk_campaign=feed&#038;pk_kwd=axisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 08 Nov 2024 23:00:52 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[age verification industry]]></category>
		<category><![CDATA[AI transcription tool]]></category>
		<category><![CDATA[Alexander Moucka]]></category>
		<category><![CDATA[Apple security]]></category>
		<category><![CDATA[Beijing]]></category>
		<category><![CDATA[Bill S-210]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Canada cyber threat]]></category>
		<category><![CDATA[Chinese hackers]]></category>
		<category><![CDATA[Chrome vulnerability]]></category>
		<category><![CDATA[cyber breaches]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[derogatory information]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[digital ID]]></category>
		<category><![CDATA[Electronic Frontier Foundation]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[enforcement]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[explicit content]]></category>
		<category><![CDATA[Extreme Vetting]]></category>
		<category><![CDATA[Falun Gong]]></category>
		<category><![CDATA[fines]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[FreeBSD]]></category>
		<category><![CDATA[House of Commons]]></category>
		<category><![CDATA[immigrants]]></category>
		<category><![CDATA[Interlock ransomware]]></category>
		<category><![CDATA[Justice Department]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[non-compliance]]></category>
		<category><![CDATA[North Korean cyber threats]]></category>
		<category><![CDATA[Online Streaming Act]]></category>
		<category><![CDATA[platforms]]></category>
		<category><![CDATA[Play ransomware]]></category>
		<category><![CDATA[pornography act]]></category>
		<category><![CDATA[privacy advocates]]></category>
		<category><![CDATA[Privacy Concerns]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Russian hackers]]></category>
		<category><![CDATA[Russian malware]]></category>
		<category><![CDATA[Senate]]></category>
		<category><![CDATA[Senator Julie Miville-Dechêne]]></category>
		<category><![CDATA[sexually explicit]]></category>
		<category><![CDATA[Snowflake data breach]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[takedowns]]></category>
		<category><![CDATA[technological feasibility]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[TikTok ban]]></category>
		<category><![CDATA[Ukrainian recruits]]></category>
		<category><![CDATA[user privacy]]></category>
		<category><![CDATA[Uyghurs]]></category>
		<category><![CDATA[Visa Lifecycle Vetting]]></category>
		<category><![CDATA[young persons]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=30562</guid>

					<description><![CDATA[Canada's Bill S-210 Sparks Concerns Over Digital ID Age Verification,
EFF Lawsuit Reveals $100 Million Government Surveillance of Immigrants' Social Media,
Canada Faces Years of Cyber Breaches by Foreign Hackers ... this and more in AofE  #375<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification&amp;action_name=%23AxisOfEasy%20375%3A%20Canada%26%238217%3Bs%20Bill%20S-210%20Sparks%20Concerns%20Over%20Digital%20ID%20Age%20Verification&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification/?pk_campaign=feed&#038;pk_kwd=axisofeasy-375-canadas-bill-s-210-sparks-concerns-over-digital-id-age-verification/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
	</channel>
</rss>
