<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>stolen data</title>
	<atom:link href="https://axisofeasy.com/tag/stolen-data/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Mon, 25 Aug 2025 18:34:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>stolen data</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 414: Popular VPN Apps Exposed As Security Risk After Shocking Report</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report/?pk_campaign=feed&#038;pk_kwd=axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report/?pk_campaign=feed&#038;pk_kwd=axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 22 Aug 2025 22:00:13 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[1.1 million customers]]></category>
		<category><![CDATA[280000 emails]]></category>
		<category><![CDATA[ActBlue]]></category>
		<category><![CDATA[Advanced Data Protection]]></category>
		<category><![CDATA[AI update]]></category>
		<category><![CDATA[Allianz Life]]></category>
		<category><![CDATA[allow lists]]></category>
		<category><![CDATA[AML compliance]]></category>
		<category><![CDATA[app stores]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[authoritarian regimes]]></category>
		<category><![CDATA[Autumn Breeze]]></category>
		<category><![CDATA[Bank for International Settlements]]></category>
		<category><![CDATA[Benjamin Mixon-Baca]]></category>
		<category><![CDATA[BIS]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[brain-dead]]></category>
		<category><![CDATA[campaign emails]]></category>
		<category><![CDATA[Canadian Regulator]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[ChatGPT-5]]></category>
		<category><![CDATA[child safety]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[citations]]></category>
		<category><![CDATA[Citizen Lab]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[customer accounts]]></category>
		<category><![CDATA[D-Squared]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[digital ID]]></category>
		<category><![CDATA[duty of care]]></category>
		<category><![CDATA[Dylan T. Davis]]></category>
		<category><![CDATA[employees]]></category>
		<category><![CDATA[encryption backdoor]]></category>
		<category><![CDATA[fake ChatGPT app]]></category>
		<category><![CDATA[financial firms]]></category>
		<category><![CDATA[global attack]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[GOP]]></category>
		<category><![CDATA[hacked data]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Have I Been Pwned]]></category>
		<category><![CDATA[Hidden Links]]></category>
		<category><![CDATA[hidden tricks]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[iiNet]]></category>
		<category><![CDATA[Innovative Connecting]]></category>
		<category><![CDATA[Investigatory Powers Act]]></category>
		<category><![CDATA[ISP]]></category>
		<category><![CDATA[Jedidiah Crandall]]></category>
		<category><![CDATA[Jeffrey Knockel]]></category>
		<category><![CDATA[José Castañeda]]></category>
		<category><![CDATA[Know Your Customer]]></category>
		<category><![CDATA[KYC]]></category>
		<category><![CDATA[Lemon Clove]]></category>
		<category><![CDATA[Louisiana]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mark E. Jeftovic]]></category>
		<category><![CDATA[Marsha Blackburn]]></category>
		<category><![CDATA[non-custodial wallets]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Pandora]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[PipeMagic]]></category>
		<category><![CDATA[political bias]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[prompt optimizer]]></category>
		<category><![CDATA[Qantas]]></category>
		<category><![CDATA[Qihoo 360]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Republican fundraising]]></category>
		<category><![CDATA[Roblox]]></category>
		<category><![CDATA[routing engine]]></category>
		<category><![CDATA[Salesforce]]></category>
		<category><![CDATA[Salesforce hack]]></category>
		<category><![CDATA[scandal]]></category>
		<category><![CDATA[security risk]]></category>
		<category><![CDATA[Shadowsocks]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[Snap VPN]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Social Security numbers]]></category>
		<category><![CDATA[spam filter]]></category>
		<category><![CDATA[stablecoin]]></category>
		<category><![CDATA[Steve Scalise]]></category>
		<category><![CDATA[stolen data]]></category>
		<category><![CDATA[structured prompts]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[transaction scoring]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[Tulsi Gabbard]]></category>
		<category><![CDATA[Turbo VPN]]></category>
		<category><![CDATA[U.K. government]]></category>
		<category><![CDATA[U.S. pressure]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[VPN Monster]]></category>
		<category><![CDATA[wallets]]></category>
		<category><![CDATA[weak encryption]]></category>
		<category><![CDATA[widespread breach]]></category>
		<category><![CDATA[WinRed]]></category>
		<category><![CDATA[Workday]]></category>
		<category><![CDATA[XML tags]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32099</guid>

					<description><![CDATA[Popular VPN Apps Exposed as Security Risk After Shocking Report,
UK Retreats After US Pressure Forces End to Apple Encryption Backdoor Plan,
BIS Proposes Transaction Scoring System to Enforce Crypto AML Compliance ...this and more in AofE  #414<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report&amp;action_name=%23AxisOfEasy%20414%3A%20Popular%20VPN%20Apps%20Exposed%20As%20Security%20Risk%20After%20Shocking%20Report&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report/?pk_campaign=feed&#038;pk_kwd=axisofeasy-414-popular-vpn-apps-exposed-as-security-risk-after-shocking-report/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 413: Lenovo Webcams Turn Into Hacking Tools In Shocking New Discovery</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery/?pk_campaign=feed&#038;pk_kwd=axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery/?pk_campaign=feed&#038;pk_kwd=axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 15 Aug 2025 22:00:00 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[and concepts: Lenovo]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[aviation]]></category>
		<category><![CDATA[BadUSB]]></category>
		<category><![CDATA[BYOVD]]></category>
		<category><![CDATA[capturing the most important entities]]></category>
		<category><![CDATA[Charon ransomware]]></category>
		<category><![CDATA[Connex Credit Union]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data brokers]]></category>
		<category><![CDATA[DEF CON 33]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[DLL sideloading]]></category>
		<category><![CDATA[Donald Trump]]></category>
		<category><![CDATA[Earth Baxia]]></category>
		<category><![CDATA[Eclypsium]]></category>
		<category><![CDATA[EDR evasion]]></category>
		<category><![CDATA[Efimer trojan]]></category>
		<category><![CDATA[European Media Freedom Act]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[fake legal emails]]></category>
		<category><![CDATA[firmware]]></category>
		<category><![CDATA[hardware hacking]]></category>
		<category><![CDATA[Here’s the comma-separated tag cloud generated from your provided articles]]></category>
		<category><![CDATA[Interlock Group]]></category>
		<category><![CDATA[journalism]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Manpower]]></category>
		<category><![CDATA[media ownership]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[NodeSnake]]></category>
		<category><![CDATA[operational technology]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[press freedom]]></category>
		<category><![CDATA[privacy rights]]></category>
		<category><![CDATA[ransomware attack]]></category>
		<category><![CDATA[ransomware trends]]></category>
		<category><![CDATA[RCE vulnerability]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[sealed records]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[SigmaStar]]></category>
		<category><![CDATA[stolen data]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[topics]]></category>
		<category><![CDATA[torrents]]></category>
		<category><![CDATA[Ukraine war]]></category>
		<category><![CDATA[Ursula von der Leyen]]></category>
		<category><![CDATA[US federal courts]]></category>
		<category><![CDATA[Vladimir Putin]]></category>
		<category><![CDATA[webcams]]></category>
		<category><![CDATA[WinRAR vulnerability]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32052</guid>

					<description><![CDATA[Lenovo Webcams Turn into Hacking Tools in Shocking New Discovery,
EU Law Meant to Protect Press Gives Governments Power to Arrest Journalists,
Charon Ransomware Targets Middle East Aviation Using Advanced APT Tradecraft ...this and more in AofE  #413<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery&amp;action_name=%23AxisOfEasy%20413%3A%20Lenovo%20Webcams%20Turn%20Into%20Hacking%20Tools%20In%20Shocking%20New%20Discovery&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery/?pk_campaign=feed&#038;pk_kwd=axisofeasy-413-lenovo-webcams-turn-into-hacking-tools-in-shocking-new-discovery/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
	</channel>
</rss>
