<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>stolen credentials</title>
	<atom:link href="https://axisofeasy.com/tag/stolen-credentials/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 20 Mar 2026 16:14:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>stolen credentials</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 442: Canada Introduces Bill C-22 For Mandatory Metadata Retention</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 20 Mar 2026 22:00:54 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI music]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Bill C-22]]></category>
		<category><![CDATA[C2 framework]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Claude AI]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[Crypto Wallets]]></category>
		<category><![CDATA[CSIS]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DarkSword]]></category>
		<category><![CDATA[data brokers]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[evasion]]></category>
		<category><![CDATA[exploit kit]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Fourth Amendment]]></category>
		<category><![CDATA[geolocation tracking]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Glassworm]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Handala hackers]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[Interlock]]></category>
		<category><![CDATA[iOS vulnerabilities]]></category>
		<category><![CDATA[Lawful Access]]></category>
		<category><![CDATA[Linux security]]></category>
		<category><![CDATA[location data]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[metadata retention]]></category>
		<category><![CDATA[Npm]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RCMP]]></category>
		<category><![CDATA[real estate]]></category>
		<category><![CDATA[root access]]></category>
		<category><![CDATA[snapd]]></category>
		<category><![CDATA[SnappyClient]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[stolen credentials]]></category>
		<category><![CDATA[Stryker breach]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[systemd]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<category><![CDATA[Unicode obfuscation]]></category>
		<category><![CDATA[virtual band]]></category>
		<category><![CDATA[warrants]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33472</guid>

					<description><![CDATA[Canada Introduces Bill C-22 For Mandatory Metadata Retention
Meta is Ending Instagram Direct Message End-to-End Encryption
Invisible Unicode Supply-Chain Attack Hits GitHub Ecosystem... this and more in AofE  #442<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention&amp;action_name=%23AxisOfEasy%20442%3A%20Canada%20Introduces%20Bill%20C-22%20For%20Mandatory%20Metadata%20Retention&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 434: Ireland Moves To Expand Digital Surveillance Powers</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 23 Jan 2026 23:00:49 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[actors]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI coding agents]]></category>
		<category><![CDATA[AI security risks]]></category>
		<category><![CDATA[AI-generated malware]]></category>
		<category><![CDATA[algorithm restrictions]]></category>
		<category><![CDATA[AmeriCorps breach]]></category>
		<category><![CDATA[application-layer governance]]></category>
		<category><![CDATA[automated malware development]]></category>
		<category><![CDATA[biometric ID requirements]]></category>
		<category><![CDATA[browser crash scams]]></category>
		<category><![CDATA[calendar data exposure]]></category>
		<category><![CDATA[child online safety]]></category>
		<category><![CDATA[Chinese-speaking threat actors]]></category>
		<category><![CDATA[cloud AI privacy]]></category>
		<category><![CDATA[communications monitoring]]></category>
		<category><![CDATA[credential phishing]]></category>
		<category><![CDATA[cybercrime acceleration]]></category>
		<category><![CDATA[dark web AI tools]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[doxxing via social media]]></category>
		<category><![CDATA[education privacy]]></category>
		<category><![CDATA[electronic scanning powers]]></category>
		<category><![CDATA[encrypted communications access]]></category>
		<category><![CDATA[ENISA authority expansion]]></category>
		<category><![CDATA[EU encryption policy]]></category>
		<category><![CDATA[Everest ransomware]]></category>
		<category><![CDATA[fake software updates]]></category>
		<category><![CDATA[Google Gemini vulnerability]]></category>
		<category><![CDATA[government hacking]]></category>
		<category><![CDATA[health data exposure]]></category>
		<category><![CDATA[identity theft risks]]></category>
		<category><![CDATA[IMSI catchers]]></category>
		<category><![CDATA[insider-style breaches]]></category>
		<category><![CDATA[IoT interception]]></category>
		<category><![CDATA[Ireland surveillance bill]]></category>
		<category><![CDATA[judicial oversight]]></category>
		<category><![CDATA[Kids Off Social Media Act]]></category>
		<category><![CDATA[KOSMA]]></category>
		<category><![CDATA[LastPass scams]]></category>
		<category><![CDATA[law enforcement expansion]]></category>
		<category><![CDATA[lawful interception]]></category>
		<category><![CDATA[Linux malware]]></category>
		<category><![CDATA[Malware Distribution]]></category>
		<category><![CDATA[McDonald’s India data breach]]></category>
		<category><![CDATA[parental consent]]></category>
		<category><![CDATA[platform liability]]></category>
		<category><![CDATA[privacy safeguards]]></category>
		<category><![CDATA[prompt injection attacks]]></category>
		<category><![CDATA[ransomware attacks]]></category>
		<category><![CDATA[semantic monitoring]]></category>
		<category><![CDATA[social engineering attacks]]></category>
		<category><![CDATA[spec driven development]]></category>
		<category><![CDATA[spyware legalization]]></category>
		<category><![CDATA[stolen credentials]]></category>
		<category><![CDATA[student data exposure]]></category>
		<category><![CDATA[supply chain security]]></category>
		<category><![CDATA[Supreme Court data breach]]></category>
		<category><![CDATA[technologies]]></category>
		<category><![CDATA[TRAE SOLO]]></category>
		<category><![CDATA[VA systems breach]]></category>
		<category><![CDATA[youth privacy]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33009</guid>

					<description><![CDATA[Ireland Moves to Expand Digital Surveillance Powers,
Senators Reintroduce KOSMA, Raising Age Verification and Privacy Concerns,
New Linux Malware Built by AI and One Developer... this and more in AofE  #434<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers&amp;action_name=%23AxisOfEasy%20434%3A%20Ireland%20Moves%20To%20Expand%20Digital%20Surveillance%20Powers&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers/?pk_campaign=feed&#038;pk_kwd=axisofeasy-434-ireland-moves-to-expand-digital-surveillance-powers/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 376: Hot Topic Data Breach: Millions Exposed, Hacker Demands Ransom Amid Retailer Silence</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence/?pk_campaign=feed&#038;pk_kwd=axisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence/?pk_campaign=feed&#038;pk_kwd=axisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 15 Nov 2024 23:00:55 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[analytics platform]]></category>
		<category><![CDATA[breach notification]]></category>
		<category><![CDATA[BreachForums]]></category>
		<category><![CDATA[cloud environment]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[compromised data]]></category>
		<category><![CDATA[credit card details]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[customer notification]]></category>
		<category><![CDATA[customer privacy]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data breach reporting]]></category>
		<category><![CDATA[data exposure]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Have I Been Pwned]]></category>
		<category><![CDATA[Hot Topic]]></category>
		<category><![CDATA[Hudson Rock]]></category>
		<category><![CDATA[infostealer malware]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[ransom demand]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[regulatory obligations]]></category>
		<category><![CDATA[retail]]></category>
		<category><![CDATA[retail security]]></category>
		<category><![CDATA[Satanic]]></category>
		<category><![CDATA[state attorneys general.]]></category>
		<category><![CDATA[stolen credentials]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=30592</guid>

					<description><![CDATA[ Hot Topic Data Breach: Millions Exposed, Hacker Demands Ransom Amid Retailer Silence,
Google’s Vertex AI Fixes Reveal Deep Vulnerabilities in Enterprise AI Security,
Iranian 'Dream Job' Attack Targets Aerospace with North Korean-Style Malware... this and more in AofE  #376<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence&amp;action_name=%23AxisOfEasy%20376%3A%20Hot%20Topic%20Data%20Breach%3A%20Millions%20Exposed%2C%20Hacker%20Demands%20Ransom%20Amid%20Retailer%20Silence&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence/?pk_campaign=feed&#038;pk_kwd=axisofeasy-376-hot-topic-data-breach-millions-exposed-hacker-demands-ransom-amid-retailer-silence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
