<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>SonicWall</title>
	<atom:link href="https://axisofeasy.com/tag/sonicwall/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 03 Oct 2025 20:38:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>SonicWall</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 420: RedNovember&#8217;s Global Cyber-Espionage Blitz</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-420-rednovembers-global-cyber-espionage-blitz</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 03 Oct 2025 22:00:48 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[1.2 million passengers]]></category>
		<category><![CDATA[1500 organizations]]></category>
		<category><![CDATA[ACSC]]></category>
		<category><![CDATA[Africa]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[arbitrary code execution]]></category>
		<category><![CDATA[ArcaneDoor]]></category>
		<category><![CDATA[ASA]]></category>
		<category><![CDATA[authentication bypass]]></category>
		<category><![CDATA[aviation]]></category>
		<category><![CDATA[banking trojan]]></category>
		<category><![CDATA[BCC]]></category>
		<category><![CDATA[Bill C-36]]></category>
		<category><![CDATA[Bill C-8]]></category>
		<category><![CDATA[Bill C-9]]></category>
		<category><![CDATA[Bitcoin Treasury]]></category>
		<category><![CDATA[C-2]]></category>
		<category><![CDATA[C-26]]></category>
		<category><![CDATA[C-8]]></category>
		<category><![CDATA[C-9]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Canadian Bitcoin Conference]]></category>
		<category><![CDATA[Canadian Bitcoin Podcast]]></category>
		<category><![CDATA[Canadian Human Rights Act]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[Central Asia]]></category>
		<category><![CDATA[Charter of Rights and Freedoms]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Cisco ASA]]></category>
		<category><![CDATA[Citizen Lab]]></category>
		<category><![CDATA[Cobalt Strike]]></category>
		<category><![CDATA[command-and-control]]></category>
		<category><![CDATA[Criminal Code]]></category>
		<category><![CDATA[CVE-2025-20333]]></category>
		<category><![CDATA[CVE-2025-20362]]></category>
		<category><![CDATA[cyber campaign]]></category>
		<category><![CDATA[cyber defense]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[developer data]]></category>
		<category><![CDATA[Digital Safety Commission]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[F5 BIG-IP]]></category>
		<category><![CDATA[fake recruiters]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[FTD]]></category>
		<category><![CDATA[genocide]]></category>
		<category><![CDATA[geopolitics]]></category>
		<category><![CDATA[harmful online content]]></category>
		<category><![CDATA[hate speech]]></category>
		<category><![CDATA[IDs]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Indian Cyber Crime Coordination Centre]]></category>
		<category><![CDATA[Insikt Group]]></category>
		<category><![CDATA[IT Act 2000]]></category>
		<category><![CDATA[Ivanti Connect Secure]]></category>
		<category><![CDATA[Joey Temprile]]></category>
		<category><![CDATA[Justice M Nagaprasanna]]></category>
		<category><![CDATA[Karnataka High Court]]></category>
		<category><![CDATA[Klopatra]]></category>
		<category><![CDATA[LESLIELOADER]]></category>
		<category><![CDATA[Line Dancer]]></category>
		<category><![CDATA[Line Runner]]></category>
		<category><![CDATA[loyalty programs]]></category>
		<category><![CDATA[Mark Jeftovic]]></category>
		<category><![CDATA[MCP server]]></category>
		<category><![CDATA[Melanie Joly]]></category>
		<category><![CDATA[Ministry of Home Affairs]]></category>
		<category><![CDATA[mitigation]]></category>
		<category><![CDATA[Montreal]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[Net-Star malware]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[online misuse]]></category>
		<category><![CDATA[Outlook Web Access]]></category>
		<category><![CDATA[Panama]]></category>
		<category><![CDATA[Pantegana]]></category>
		<category><![CDATA[passports]]></category>
		<category><![CDATA[peace bonds]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[Phantom Taurus]]></category>
		<category><![CDATA[phone hijacking]]></category>
		<category><![CDATA[PoC exploits]]></category>
		<category><![CDATA[Qantas]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Recorded Future]]></category>
		<category><![CDATA[RedNovember]]></category>
		<category><![CDATA[Rialto Theatre]]></category>
		<category><![CDATA[ROM manipulation]]></category>
		<category><![CDATA[Sahyog portal]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[Sean Fraser]]></category>
		<category><![CDATA[secrets]]></category>
		<category><![CDATA[Section 69A]]></category>
		<category><![CDATA[Secure Firewall]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[SparkRAT]]></category>
		<category><![CDATA[spearphishing]]></category>
		<category><![CDATA[state-sponsored]]></category>
		<category><![CDATA[Steven Guilbeault]]></category>
		<category><![CDATA[Storm-1849]]></category>
		<category><![CDATA[Storm-2077]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[surveillance bills]]></category>
		<category><![CDATA[TAG-100]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[transportation networks]]></category>
		<category><![CDATA[twitter]]></category>
		<category><![CDATA[U.S. defense contractors]]></category>
		<category><![CDATA[UAT4356]]></category>
		<category><![CDATA[VNC]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[WestJet]]></category>
		<category><![CDATA[women’s safety]]></category>
		<category><![CDATA[X Corp]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32373</guid>

					<description><![CDATA[... this and more in AofE  #420<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-420-rednovembers-global-cyber-espionage-blitz%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-420-rednovembers-global-cyber-espionage-blitz&amp;action_name=%23AxisOfEasy%20420%3A%20RedNovember%26%238217%3Bs%20Global%20Cyber-Espionage%20Blitz&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 412: Spotify Enforces Age Checks As Digital ID Becomes Gatekeeper</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper/?pk_campaign=feed&#038;pk_kwd=axisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper/?pk_campaign=feed&#038;pk_kwd=axisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 08 Aug 2025 22:00:28 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI Ethics]]></category>
		<category><![CDATA[airline systems]]></category>
		<category><![CDATA[Archive.org]]></category>
		<category><![CDATA[ATM hack]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[biometric ID]]></category>
		<category><![CDATA[Block BEARD]]></category>
		<category><![CDATA[C2 channel]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[censorship legislation]]></category>
		<category><![CDATA[ch.at]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Chinese cybercrime]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[CLI tools]]></category>
		<category><![CDATA[container security]]></category>
		<category><![CDATA[credit card theft]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exposure]]></category>
		<category><![CDATA[DaVita]]></category>
		<category><![CDATA[digital forensics]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[digital surveillance]]></category>
		<category><![CDATA[DMCA]]></category>
		<category><![CDATA[DNS queries]]></category>
		<category><![CDATA[domain hack]]></category>
		<category><![CDATA[ECS]]></category>
		<category><![CDATA[email security]]></category>
		<category><![CDATA[flight delays]]></category>
		<category><![CDATA[GPT over DNS]]></category>
		<category><![CDATA[Grok]]></category>
		<category><![CDATA[healthcare breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Interlock]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[piracy]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[public conversations]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware warning]]></category>
		<category><![CDATA[Raspberry Pi]]></category>
		<category><![CDATA[Rootkit]]></category>
		<category><![CDATA[SEC filing]]></category>
		<category><![CDATA[smishing]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[Spotify]]></category>
		<category><![CDATA[SSLVPN]]></category>
		<category><![CDATA[tech outage]]></category>
		<category><![CDATA[TINYSHELL]]></category>
		<category><![CDATA[UK regulation]]></category>
		<category><![CDATA[UNC2891]]></category>
		<category><![CDATA[United Airlines]]></category>
		<category><![CDATA[Wayback Machine]]></category>
		<category><![CDATA[website blocking]]></category>
		<category><![CDATA[Yoti]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32005</guid>

					<description><![CDATA[ChatGPT Conversations Remain Public Despite OpenAI Cleanup Effort,
Raspberry Pi Attack Exposes ATM Network to Sophisticated Financial Hackers,
Spotify Enforces Age Checks as Digital ID Becomes Gatekeeper...this and more in AofE  #412<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper&amp;action_name=%23AxisOfEasy%20412%3A%20Spotify%20Enforces%20Age%20Checks%20As%20Digital%20ID%20Becomes%20Gatekeeper&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper/?pk_campaign=feed&#038;pk_kwd=axisofeasy-412-spotify-enforces-age-checks-as-digital-id-becomes-gatekeeper/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 409: Adoption Data Breach Exposes Sensitive Records From Texas Nonprofit</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 18 Jul 2025 22:00:04 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[access brokers]]></category>
		<category><![CDATA[Adoption]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AxisOfEasy]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[Black Basta]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[Bluesky]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[C2 infrastructure]]></category>
		<category><![CDATA[Chatbot]]></category>
		<category><![CDATA[child protection]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cloud misconfiguration]]></category>
		<category><![CDATA[CRM migration]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cypherpunk]]></category>
		<category><![CDATA[Cypherpunk movement]]></category>
		<category><![CDATA[Dark Reading]]></category>
		<category><![CDATA[data access]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data sovereignty]]></category>
		<category><![CDATA[data storage]]></category>
		<category><![CDATA[decentralization]]></category>
		<category><![CDATA[Decentralized systems]]></category>
		<category><![CDATA[deep learning]]></category>
		<category><![CDATA[Developing Countries]]></category>
		<category><![CDATA[Digital dystopia]]></category>
		<category><![CDATA[digital economy]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[digital resilience]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[documentation]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[ECC]]></category>
		<category><![CDATA[emerging markets]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Episource]]></category>
		<category><![CDATA[existential risk]]></category>
		<category><![CDATA[facial scanning]]></category>
		<category><![CDATA[financial innovation]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[GDDR6]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GPUhammer]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hardware security]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[HexEval]]></category>
		<category><![CDATA[in-memory execution]]></category>
		<category><![CDATA[internal tooling]]></category>
		<category><![CDATA[Internet freedom]]></category>
		<category><![CDATA[Irish DPC]]></category>
		<category><![CDATA[Kid Web Services]]></category>
		<category><![CDATA[leapfrogging]]></category>
		<category><![CDATA[LOLBin]]></category>
		<category><![CDATA[long-form content]]></category>
		<category><![CDATA[Louis Vuitton]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[malware-as-a-service]]></category>
		<category><![CDATA[Matanbuchus]]></category>
		<category><![CDATA[medical imaging]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Teams]]></category>
		<category><![CDATA[monetary fine]]></category>
		<category><![CDATA[monetary sovereignty]]></category>
		<category><![CDATA[nonprofit]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[NVidia]]></category>
		<category><![CDATA[online identity]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[patient data]]></category>
		<category><![CDATA[payload delivery]]></category>
		<category><![CDATA[payments infrastructure]]></category>
		<category><![CDATA[Peer-to-peer networks]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[retail]]></category>
		<category><![CDATA[reverse shell]]></category>
		<category><![CDATA[Rowhammer]]></category>
		<category><![CDATA[SMA 100]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[support automation]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tech philosophy]]></category>
		<category><![CDATA[technological foresight]]></category>
		<category><![CDATA[Texas]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[UK regulation]]></category>
		<category><![CDATA[Usenix]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Web3]]></category>
		<category><![CDATA[XORIndex]]></category>
		<category><![CDATA[zero-day]]></category>
		<category><![CDATA[Zero-Day Exploit]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31883</guid>

					<description><![CDATA[ Adoption Data Breach Exposes Sensitive Records from Texas Nonprofit,
Matanbuchus 3.0 Expands Stealth Tactics with Teams Lures and Advanced Loader Features,
Bluesky Implements UK Age Checks Amid Privacy Backlash Over Online Safety Law...this and more in AofE  #409<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&amp;action_name=%23AxisOfEasy%20409%3A%20Adoption%20Data%20Breach%20Exposes%20Sensitive%20Records%20From%20Texas%20Nonprofit&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 406: Chinese State Hackers Exploit Unpatched Cisco Flaw to Breach Canadian Telecom Network</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network/?pk_campaign=feed&#038;pk_kwd=axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network/?pk_campaign=feed&#038;pk_kwd=axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 27 Jun 2025 22:00:39 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Aflac]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI copyright]]></category>
		<category><![CDATA[AI innovation]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[biometrics]]></category>
		<category><![CDATA[Books3]]></category>
		<category><![CDATA[Brother printers]]></category>
		<category><![CDATA[call center compromise]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Canadian Centre for Cyber Security]]></category>
		<category><![CDATA[certificate spoofing]]></category>
		<category><![CDATA[children's data]]></category>
		<category><![CDATA[Chinese hackers]]></category>
		<category><![CDATA[Cisco IOS XE]]></category>
		<category><![CDATA[Cisco patching]]></category>
		<category><![CDATA[CITYLIGHT MEDIA]]></category>
		<category><![CDATA[Cloudflare impersonation]]></category>
		<category><![CDATA[COPPA 2.0]]></category>
		<category><![CDATA[crypto mining]]></category>
		<category><![CDATA[CVE-2018-0171]]></category>
		<category><![CDATA[CVE-2023-20198]]></category>
		<category><![CDATA[CVE-2023-20273]]></category>
		<category><![CDATA[CVE-2024-20399]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity negligence]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data collection]]></category>
		<category><![CDATA[data misuse]]></category>
		<category><![CDATA[Docker misconfiguration]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[fair use]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[GitHub vulnerability]]></category>
		<category><![CDATA[Google v. Oracle]]></category>
		<category><![CDATA[GRE tunnel]]></category>
		<category><![CDATA[hacker collective]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[insurance sector]]></category>
		<category><![CDATA[Judge William Alsup]]></category>
		<category><![CDATA[lawful intercept]]></category>
		<category><![CDATA[legal exposure]]></category>
		<category><![CDATA[LibGen]]></category>
		<category><![CDATA[LLM training]]></category>
		<category><![CDATA[malicious infrastructure]]></category>
		<category><![CDATA[Microsoft Entra ID]]></category>
		<category><![CDATA[NetExtender]]></category>
		<category><![CDATA[nOAuth vulnerability]]></category>
		<category><![CDATA[online privacy]]></category>
		<category><![CDATA[PiLiMi]]></category>
		<category><![CDATA[pirated data]]></category>
		<category><![CDATA[platform liability]]></category>
		<category><![CDATA[PRC-backed operations]]></category>
		<category><![CDATA[printer vulnerability]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Salt Typhoon]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[Senate bill]]></category>
		<category><![CDATA[SEO Poisoning]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[SSNs]]></category>
		<category><![CDATA[State-sponsored hacking]]></category>
		<category><![CDATA[summary judgment]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[telecom breach]]></category>
		<category><![CDATA[Trojanized installer]]></category>
		<category><![CDATA[unintended surveillance]]></category>
		<category><![CDATA[universal age checks]]></category>
		<category><![CDATA[unpatchable bug]]></category>
		<category><![CDATA[unpatched vulnerabilities]]></category>
		<category><![CDATA[VPN credential theft]]></category>
		<category><![CDATA[wiretap monitoring]]></category>
		<category><![CDATA[WordPress malware]]></category>
		<category><![CDATA[youth privacy]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31748</guid>

					<description><![CDATA[Chinese State Hackers Exploit Unpatched Cisco Flaw to Breach Canadian Telecom Network
Senate Bill Expands Youth Privacy Rules and Raises Concerns Over Online Surveillance
Aflac Reports Data Breach Affecting Customers and Employees...this and more in AofE  #406<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network&amp;action_name=%23AxisOfEasy%20406%3A%20Chinese%20State%20Hackers%20Exploit%20Unpatched%20Cisco%20Flaw%20to%20Breach%20Canadian%20Telecom%20Network&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network/?pk_campaign=feed&#038;pk_kwd=axisofeasy-406-chinese-state-hackers-exploit-unpatched-cisco-flaw-to-breach-canadian-telecom-network/feed/</wfw:commentRss>
			<slash:comments>7</slash:comments>
		
		
			</item>
	</channel>
</rss>
