<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>zero-day</title>
	<atom:link href="https://axisofeasy.com/tag/zero-day/feed/" rel="self" type="application/rss+xml" />
	<link>https://axisofeasy.com</link>
	<description>Rapid Coverage of a World Gone Full Cyberpunk</description>
	<lastBuildDate>Fri, 01 May 2026 15:37:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://axisofeasy.com/wp-content/uploads/2018/07/cropped-easydns-big-bolt-512x512-32x32.png</url>
	<title>zero-day</title>
	<link>https://axisofeasy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#AxisOfEasy 448: Toronto Police Bust Canada&#8217;s First SMS Blaster Cybercrime Operation</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 01 May 2026 22:00:42 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI-driven hacking]]></category>
		<category><![CDATA[API key theft]]></category>
		<category><![CDATA[attack surface]]></category>
		<category><![CDATA[automated exploitation]]></category>
		<category><![CDATA[BigQuery]]></category>
		<category><![CDATA[Bitwarden CLI]]></category>
		<category><![CDATA[BlueNoroff]]></category>
		<category><![CDATA[Cisco exploits]]></category>
		<category><![CDATA[code analysis]]></category>
		<category><![CDATA[Context.ai]]></category>
		<category><![CDATA[CopyFail]]></category>
		<category><![CDATA[cPanel exploit]]></category>
		<category><![CDATA[CrowdStrike LogScale]]></category>
		<category><![CDATA[crypto phishing]]></category>
		<category><![CDATA[CVE-2026-31431]]></category>
		<category><![CDATA[CVE-2026-40050]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[cybercrime arrests]]></category>
		<category><![CDATA[cybersecurity crisis]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[Data Leaks]]></category>
		<category><![CDATA[deepfake attacks]]></category>
		<category><![CDATA[defensive security]]></category>
		<category><![CDATA[fake CAPTCHA]]></category>
		<category><![CDATA[fake cell towers]]></category>
		<category><![CDATA[FIRESTARTER malware]]></category>
		<category><![CDATA[Google Workspace compromise]]></category>
		<category><![CDATA[identity takeover]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[incident response]]></category>
		<category><![CDATA[infostealer malware]]></category>
		<category><![CDATA[infrastructure security]]></category>
		<category><![CDATA[kernel security]]></category>
		<category><![CDATA[KeygraphHQ]]></category>
		<category><![CDATA[Lazarus Group]]></category>
		<category><![CDATA[Linux vulnerability]]></category>
		<category><![CDATA[LiteLLM vulnerability]]></category>
		<category><![CDATA[local user compromise]]></category>
		<category><![CDATA[Lumma Stealer]]></category>
		<category><![CDATA[Microsoft Entra ID]]></category>
		<category><![CDATA[Microsoft Exchange attacks]]></category>
		<category><![CDATA[North Korea hackers]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[path traversal]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[PowerShell C2]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[PyPI compromise]]></category>
		<category><![CDATA[remote access trojan]]></category>
		<category><![CDATA[remote admin access]]></category>
		<category><![CDATA[root exploit]]></category>
		<category><![CDATA[Salesforce breaches]]></category>
		<category><![CDATA[server security]]></category>
		<category><![CDATA[shadow IT]]></category>
		<category><![CDATA[Shannon tool]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[SIEM security]]></category>
		<category><![CDATA[smishing attacks]]></category>
		<category><![CDATA[SMS blaster]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[telecom interception]]></category>
		<category><![CDATA[third-party risk]]></category>
		<category><![CDATA[Toronto Police]]></category>
		<category><![CDATA[unauthenticated access]]></category>
		<category><![CDATA[Vercel breach]]></category>
		<category><![CDATA[Vidar infostealer]]></category>
		<category><![CDATA[vulnerability patching]]></category>
		<category><![CDATA[WHM authentication bypass]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33800</guid>

					<description><![CDATA[Toronto Police Bust Canada's First SMS Blaster Cybercrime Operation,
CrowdStrike Patches Critical LogScale Vulnerability Allowing Unauthenticated File Access,
Vercel Breach Traced to Roblox-Seeking "Patient Zero" at Context.ai ... this and more in AofE  #448<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation&amp;action_name=%23AxisOfEasy%20448%3A%20Toronto%20Police%20Bust%20Canada%26%238217%3Bs%20First%20SMS%20Blaster%20Cybercrime%20Operation&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation/?pk_campaign=feed&#038;pk_kwd=axisofeasy-448-toronto-police-bust-canadas-first-sms-blaster-cybercrime-operation/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 446: Internet Content Regulation Is Coming To Canada</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?pk_campaign=feed&#038;pk_kwd=axisofeasy-446-internet-content-regulation-is-coming-to-canada&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-446-internet-content-regulation-is-coming-to-canada</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?pk_campaign=feed&#038;pk_kwd=axisofeasy-446-internet-content-regulation-is-coming-to-canada#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 22:00:47 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI agents]]></category>
		<category><![CDATA[AI safety]]></category>
		<category><![CDATA[antivirus evasion]]></category>
		<category><![CDATA[API keys]]></category>
		<category><![CDATA[APT41]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[banking malware]]></category>
		<category><![CDATA[C2 persistence]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Claude AI]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Copilot]]></category>
		<category><![CDATA[court order]]></category>
		<category><![CDATA[credential harvesting]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[delusions]]></category>
		<category><![CDATA[DLL sideloading]]></category>
		<category><![CDATA[Electron malware]]></category>
		<category><![CDATA[email phishing]]></category>
		<category><![CDATA[First Amendment]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[Gemini]]></category>
		<category><![CDATA[GitHub Actions]]></category>
		<category><![CDATA[government policy]]></category>
		<category><![CDATA[InfoStealer]]></category>
		<category><![CDATA[internet regulation]]></category>
		<category><![CDATA[ISP monitoring]]></category>
		<category><![CDATA[JanelaRAT]]></category>
		<category><![CDATA[Latin America attacks]]></category>
		<category><![CDATA[legal case]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft update scam]]></category>
		<category><![CDATA[Mirax trojan]]></category>
		<category><![CDATA[n8n abuse]]></category>
		<category><![CDATA[obfuscation]]></category>
		<category><![CDATA[Online Harms]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[PlugX]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[Python payloads]]></category>
		<category><![CDATA[Rockstar Games]]></category>
		<category><![CDATA[SharePoint exploit]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<category><![CDATA[social media ban]]></category>
		<category><![CDATA[spoofed software]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[threat actors]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[workflow automation]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33713</guid>

					<description><![CDATA[Internet Content Regulation is Coming To Canada,
Court Orders OpenAI to Block User in ChatGPT Case Raising Free Speech Concerns,
Fake Claude “Pro” Site Spreads PlugX Malware via DLL Sideloading... this and more in AofE  #446<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-446-internet-content-regulation-is-coming-to-canada%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-446-internet-content-regulation-is-coming-to-canada&amp;action_name=%23AxisOfEasy%20446%3A%20Internet%20Content%20Regulation%20Is%20Coming%20To%20Canada&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-446-internet-content-regulation-is-coming-to-canada/?pk_campaign=feed&#038;pk_kwd=axisofeasy-446-internet-content-regulation-is-coming-to-canada/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 442: Canada Introduces Bill C-22 For Mandatory Metadata Retention</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention#respond</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 20 Mar 2026 22:00:54 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI music]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Bill C-22]]></category>
		<category><![CDATA[C2 framework]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Claude AI]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[Crypto Wallets]]></category>
		<category><![CDATA[CSIS]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DarkSword]]></category>
		<category><![CDATA[data brokers]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[End-to-End Encryption]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[evasion]]></category>
		<category><![CDATA[exploit kit]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Fourth Amendment]]></category>
		<category><![CDATA[geolocation tracking]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Glassworm]]></category>
		<category><![CDATA[government surveillance]]></category>
		<category><![CDATA[Handala hackers]]></category>
		<category><![CDATA[Instagram]]></category>
		<category><![CDATA[Interlock]]></category>
		<category><![CDATA[iOS vulnerabilities]]></category>
		<category><![CDATA[Lawful Access]]></category>
		<category><![CDATA[Linux security]]></category>
		<category><![CDATA[location data]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[meta]]></category>
		<category><![CDATA[metadata retention]]></category>
		<category><![CDATA[Npm]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[RCMP]]></category>
		<category><![CDATA[real estate]]></category>
		<category><![CDATA[root access]]></category>
		<category><![CDATA[snapd]]></category>
		<category><![CDATA[SnappyClient]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[stolen credentials]]></category>
		<category><![CDATA[Stryker breach]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[systemd]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<category><![CDATA[Unicode obfuscation]]></category>
		<category><![CDATA[virtual band]]></category>
		<category><![CDATA[warrants]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33472</guid>

					<description><![CDATA[Canada Introduces Bill C-22 For Mandatory Metadata Retention
Meta is Ending Instagram Direct Message End-to-End Encryption
Invisible Unicode Supply-Chain Attack Hits GitHub Ecosystem... this and more in AofE  #442<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention&amp;action_name=%23AxisOfEasy%20442%3A%20Canada%20Introduces%20Bill%20C-22%20For%20Mandatory%20Metadata%20Retention&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/?pk_campaign=feed&#038;pk_kwd=axisofeasy-442-canada-introduces-bill-c-22-for-mandatory-metadata-retention/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 438: Apple Patches Actively Exploited Zero-Day Across Devices</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices/?pk_campaign=feed&#038;pk_kwd=axisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices/?pk_campaign=feed&#038;pk_kwd=axisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 20 Feb 2026 23:00:47 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[Account Takeover]]></category>
		<category><![CDATA[AI Tool Ban]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple Security Updates]]></category>
		<category><![CDATA[Apryse Security Flaws]]></category>
		<category><![CDATA[arbitrary code execution]]></category>
		<category><![CDATA[Automatic Updates]]></category>
		<category><![CDATA[Behavioral Data]]></category>
		<category><![CDATA[BleepingComputer]]></category>
		<category><![CDATA[Bypassed DLP]]></category>
		<category><![CDATA[Confidential Emails]]></category>
		<category><![CDATA[Copilot Bug]]></category>
		<category><![CDATA[Copyright Act 2012]]></category>
		<category><![CDATA[Counterfeit IDs]]></category>
		<category><![CDATA[Credit Card Fraud]]></category>
		<category><![CDATA[Cryptojacking]]></category>
		<category><![CDATA[CVE-2026-20700]]></category>
		<category><![CDATA[cybersecurity news]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[data loss prevention]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Transfers to China]]></category>
		<category><![CDATA[Device Security Policy]]></category>
		<category><![CDATA[DOJ Data Security Program]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[European Parliament]]></category>
		<category><![CDATA[Extension Security]]></category>
		<category><![CDATA[Fake ID Lab]]></category>
		<category><![CDATA[Federal Court Ruling]]></category>
		<category><![CDATA[Forensic Investigation]]></category>
		<category><![CDATA[Foxit Vulnerabilities]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[iOS 26.3]]></category>
		<category><![CDATA[Lenovo Lawsuit]]></category>
		<category><![CDATA[lockdown mode]]></category>
		<category><![CDATA[macOS Tahoe]]></category>
		<category><![CDATA[Malwarebytes]]></category>
		<category><![CDATA[Media Subscriptions]]></category>
		<category><![CDATA[memory corruption]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[Monero Miner]]></category>
		<category><![CDATA[Montreal Crime]]></category>
		<category><![CDATA[Parks Canada]]></category>
		<category><![CDATA[Password Sharing]]></category>
		<category><![CDATA[phishing campaign]]></category>
		<category><![CDATA[Pirated Software]]></category>
		<category><![CDATA[public interest]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[ScreenConnect Hijacking]]></category>
		<category><![CDATA[software supply chain]]></category>
		<category><![CDATA[SSA Impersonation]]></category>
		<category><![CDATA[stolen identities]]></category>
		<category><![CDATA[Sûreté du Québec]]></category>
		<category><![CDATA[Surveillance Concerns]]></category>
		<category><![CDATA[The Register]]></category>
		<category><![CDATA[VS Code Vulnerabilities]]></category>
		<category><![CDATA[Website Trackers]]></category>
		<category><![CDATA[Windows Security]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=33221</guid>

					<description><![CDATA[Apple Patches Actively Exploited Zero-Day Across Devices,
Montreal Fake ID Lab Busted, Thousands of Identities Stolen,
Microsoft 365 Copilot Bug Summarizes Confidential Emails... this and more in AofE  #438<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices&amp;action_name=%23AxisOfEasy%20438%3A%20Apple%20Patches%20Actively%20Exploited%20Zero-Day%20Across%20Devices&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices/?pk_campaign=feed&#038;pk_kwd=axisofeasy-438-apple-patches-actively-exploited-zero-day-across-devices/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 422: Why Treating AI As A Tool Is A Dangerous Illusion</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 17 Oct 2025 22:00:38 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[alignment]]></category>
		<category><![CDATA[Android flaw]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Astaroth Trojan]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Axis Of Easy]]></category>
		<category><![CDATA[Bill C-8]]></category>
		<category><![CDATA[BYOVD]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[civil liberties]]></category>
		<category><![CDATA[Claude Sonnet 4.5]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[credential dumping]]></category>
		<category><![CDATA[credentials]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[Dufresne]]></category>
		<category><![CDATA[Earth Alux]]></category>
		<category><![CDATA[ECHOAC]]></category>
		<category><![CDATA[economic impact]]></category>
		<category><![CDATA[email rules]]></category>
		<category><![CDATA[emergent behavior]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[ethical AI]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[existential risk]]></category>
		<category><![CDATA[Federal Reserve]]></category>
		<category><![CDATA[FIDO]]></category>
		<category><![CDATA[Gelsemium]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[Harvard University]]></category>
		<category><![CDATA[House of Commons]]></category>
		<category><![CDATA[HR systems]]></category>
		<category><![CDATA[initial access]]></category>
		<category><![CDATA[Italy]]></category>
		<category><![CDATA[Jack Clark]]></category>
		<category><![CDATA[Jewelbug]]></category>
		<category><![CDATA[Lucky Mouse]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[Mechanize]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Mimikatz]]></category>
		<category><![CDATA[misaligned optimization]]></category>
		<category><![CDATA[national security]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Oracle EBS]]></category>
		<category><![CDATA[Paragon]]></category>
		<category><![CDATA[passkeys]]></category>
		<category><![CDATA[Payroll Pirate]]></category>
		<category><![CDATA[persistence]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Pixnapping]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Commissioner]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reclaim The Net]]></category>
		<category><![CDATA[REF7707]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[reward hacking]]></category>
		<category><![CDATA[RMM]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[safety data]]></category>
		<category><![CDATA[ScreenConnect]]></category>
		<category><![CDATA[ShadowPad]]></category>
		<category><![CDATA[situational awareness]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Symantec]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[TechCrunch]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[The Hacker News]]></category>
		<category><![CDATA[threat actors]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[universities]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[warrantless access]]></category>
		<category><![CDATA[Workday]]></category>
		<category><![CDATA[Yandex Cloud]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32461</guid>

					<description><![CDATA[Why Treating AI as a Tool Is a Dangerous Illusion,
Chinese Espionage Group Expands Into Russia Through Jewelbug Cyber Campaign,
Cabinet Push for Secret Telecom Cutoffs Raises Privacy Concerns... this and more in AofE  #422<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion&amp;action_name=%23AxisOfEasy%20422%3A%20Why%20Treating%20AI%20As%20A%20Tool%20Is%20A%20Dangerous%20Illusion&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/?pk_campaign=feed&#038;pk_kwd=axisofeasy-422-why-treating-ai-as-a-tool-is-a-dangerous-illusion/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 420: RedNovember&#8217;s Global Cyber-Espionage Blitz</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-420-rednovembers-global-cyber-espionage-blitz</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 03 Oct 2025 22:00:48 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[1.2 million passengers]]></category>
		<category><![CDATA[1500 organizations]]></category>
		<category><![CDATA[ACSC]]></category>
		<category><![CDATA[Africa]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[arbitrary code execution]]></category>
		<category><![CDATA[ArcaneDoor]]></category>
		<category><![CDATA[ASA]]></category>
		<category><![CDATA[authentication bypass]]></category>
		<category><![CDATA[aviation]]></category>
		<category><![CDATA[banking trojan]]></category>
		<category><![CDATA[BCC]]></category>
		<category><![CDATA[Bill C-36]]></category>
		<category><![CDATA[Bill C-8]]></category>
		<category><![CDATA[Bill C-9]]></category>
		<category><![CDATA[Bitcoin Treasury]]></category>
		<category><![CDATA[C-2]]></category>
		<category><![CDATA[C-26]]></category>
		<category><![CDATA[C-8]]></category>
		<category><![CDATA[C-9]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Canadian Bitcoin Conference]]></category>
		<category><![CDATA[Canadian Bitcoin Podcast]]></category>
		<category><![CDATA[Canadian Human Rights Act]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[Central Asia]]></category>
		<category><![CDATA[Charter of Rights and Freedoms]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Cisco ASA]]></category>
		<category><![CDATA[Citizen Lab]]></category>
		<category><![CDATA[Cobalt Strike]]></category>
		<category><![CDATA[command-and-control]]></category>
		<category><![CDATA[Criminal Code]]></category>
		<category><![CDATA[CVE-2025-20333]]></category>
		<category><![CDATA[CVE-2025-20362]]></category>
		<category><![CDATA[cyber campaign]]></category>
		<category><![CDATA[cyber defense]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[developer data]]></category>
		<category><![CDATA[Digital Safety Commission]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[exfiltration]]></category>
		<category><![CDATA[F5 BIG-IP]]></category>
		<category><![CDATA[fake recruiters]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[FTD]]></category>
		<category><![CDATA[genocide]]></category>
		<category><![CDATA[geopolitics]]></category>
		<category><![CDATA[harmful online content]]></category>
		<category><![CDATA[hate speech]]></category>
		<category><![CDATA[IDs]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Indian Cyber Crime Coordination Centre]]></category>
		<category><![CDATA[Insikt Group]]></category>
		<category><![CDATA[IT Act 2000]]></category>
		<category><![CDATA[Ivanti Connect Secure]]></category>
		<category><![CDATA[Joey Temprile]]></category>
		<category><![CDATA[Justice M Nagaprasanna]]></category>
		<category><![CDATA[Karnataka High Court]]></category>
		<category><![CDATA[Klopatra]]></category>
		<category><![CDATA[LESLIELOADER]]></category>
		<category><![CDATA[Line Dancer]]></category>
		<category><![CDATA[Line Runner]]></category>
		<category><![CDATA[loyalty programs]]></category>
		<category><![CDATA[Mark Jeftovic]]></category>
		<category><![CDATA[MCP server]]></category>
		<category><![CDATA[Melanie Joly]]></category>
		<category><![CDATA[Ministry of Home Affairs]]></category>
		<category><![CDATA[mitigation]]></category>
		<category><![CDATA[Montreal]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[Net-Star malware]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[online misuse]]></category>
		<category><![CDATA[Outlook Web Access]]></category>
		<category><![CDATA[Panama]]></category>
		<category><![CDATA[Pantegana]]></category>
		<category><![CDATA[passports]]></category>
		<category><![CDATA[peace bonds]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[Phantom Taurus]]></category>
		<category><![CDATA[phone hijacking]]></category>
		<category><![CDATA[PoC exploits]]></category>
		<category><![CDATA[Qantas]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Recorded Future]]></category>
		<category><![CDATA[RedNovember]]></category>
		<category><![CDATA[Rialto Theatre]]></category>
		<category><![CDATA[ROM manipulation]]></category>
		<category><![CDATA[Sahyog portal]]></category>
		<category><![CDATA[Scattered Spider]]></category>
		<category><![CDATA[Sean Fraser]]></category>
		<category><![CDATA[secrets]]></category>
		<category><![CDATA[Section 69A]]></category>
		<category><![CDATA[Secure Firewall]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[SparkRAT]]></category>
		<category><![CDATA[spearphishing]]></category>
		<category><![CDATA[state-sponsored]]></category>
		<category><![CDATA[Steven Guilbeault]]></category>
		<category><![CDATA[Storm-1849]]></category>
		<category><![CDATA[Storm-2077]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[surveillance bills]]></category>
		<category><![CDATA[TAG-100]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[transportation networks]]></category>
		<category><![CDATA[twitter]]></category>
		<category><![CDATA[U.S. defense contractors]]></category>
		<category><![CDATA[UAT4356]]></category>
		<category><![CDATA[VNC]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[WestJet]]></category>
		<category><![CDATA[women’s safety]]></category>
		<category><![CDATA[X Corp]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=32373</guid>

					<description><![CDATA[... this and more in AofE  #420<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-420-rednovembers-global-cyber-espionage-blitz%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-420-rednovembers-global-cyber-espionage-blitz&amp;action_name=%23AxisOfEasy%20420%3A%20RedNovember%26%238217%3Bs%20Global%20Cyber-Espionage%20Blitz&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-420-rednovembers-global-cyber-espionage-blitz/?pk_campaign=feed&#038;pk_kwd=axisofeasy-420-rednovembers-global-cyber-espionage-blitz/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 410: Can AI Chatbots Be Hacked Via DNS?</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/?pk_campaign=feed&#038;pk_kwd=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/?pk_campaign=feed&#038;pk_kwd=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 25 Jul 2025 22:00:59 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AI agent]]></category>
		<category><![CDATA[AI chatbots]]></category>
		<category><![CDATA[AI fraud]]></category>
		<category><![CDATA[authentication keys]]></category>
		<category><![CDATA[autonomous agents]]></category>
		<category><![CDATA[bug bounty]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[cloud compromise]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[crypto mining]]></category>
		<category><![CDATA[CVE-2025-53770]]></category>
		<category><![CDATA[cybercrime forum]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity regulations]]></category>
		<category><![CDATA[database deletion]]></category>
		<category><![CDATA[debug code]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[Education Department]]></category>
		<category><![CDATA[ExpressVPN]]></category>
		<category><![CDATA[G5 portal]]></category>
		<category><![CDATA[Ghostwriter]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Hello Internet Corp]]></category>
		<category><![CDATA[Interlock ransomware]]></category>
		<category><![CDATA[IP address exposure]]></category>
		<category><![CDATA[JavaScript exfiltration]]></category>
		<category><![CDATA[lateral movement]]></category>
		<category><![CDATA[layoffs]]></category>
		<category><![CDATA[Magento]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[production error]]></category>
		<category><![CDATA[prompt injection]]></category>
		<category><![CDATA[RDP leak]]></category>
		<category><![CDATA[Replit]]></category>
		<category><![CDATA[SharePoint]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[txt records]]></category>
		<category><![CDATA[Ukraine arrest]]></category>
		<category><![CDATA[Vibe Coding Test]]></category>
		<category><![CDATA[voiceprint authentication]]></category>
		<category><![CDATA[VPN tunnel]]></category>
		<category><![CDATA[water utilities]]></category>
		<category><![CDATA[XSS.is]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31916</guid>

					<description><![CDATA[Can AI Chatbots Be Hacked Via DNS?
SharePoint Zero Day Exploit Hits U.S. Agencies and Exposes Microsoft’s Persistent Security Gaps
ExpressVPN Patch Fixes RDP Traffic Leak That Exposed User IP Addresses ...this and more in AofE  #410<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-410-can-ai-chatbots-be-hacked-via-dns%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-410-can-ai-chatbots-be-hacked-via-dns&amp;action_name=%23AxisOfEasy%20410%3A%20Can%20AI%20Chatbots%20Be%20Hacked%20Via%20DNS%3F&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/?pk_campaign=feed&#038;pk_kwd=axisofeasy-410-can-ai-chatbots-be-hacked-via-dns/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 409: Adoption Data Breach Exposes Sensitive Records From Texas Nonprofit</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 18 Jul 2025 22:00:04 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[access brokers]]></category>
		<category><![CDATA[Adoption]]></category>
		<category><![CDATA[age verification]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AxisOfEasy]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[Black Basta]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[Bluesky]]></category>
		<category><![CDATA[ByteDance]]></category>
		<category><![CDATA[C2 infrastructure]]></category>
		<category><![CDATA[Chatbot]]></category>
		<category><![CDATA[child protection]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cloud misconfiguration]]></category>
		<category><![CDATA[CRM migration]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[customer data]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cypherpunk]]></category>
		<category><![CDATA[Cypherpunk movement]]></category>
		<category><![CDATA[Dark Reading]]></category>
		<category><![CDATA[data access]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data sovereignty]]></category>
		<category><![CDATA[data storage]]></category>
		<category><![CDATA[decentralization]]></category>
		<category><![CDATA[Decentralized systems]]></category>
		<category><![CDATA[deep learning]]></category>
		<category><![CDATA[Developing Countries]]></category>
		<category><![CDATA[Digital dystopia]]></category>
		<category><![CDATA[digital economy]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[digital resilience]]></category>
		<category><![CDATA[digital rights]]></category>
		<category><![CDATA[documentation]]></category>
		<category><![CDATA[easydns]]></category>
		<category><![CDATA[ECC]]></category>
		<category><![CDATA[emerging markets]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Episource]]></category>
		<category><![CDATA[existential risk]]></category>
		<category><![CDATA[facial scanning]]></category>
		<category><![CDATA[financial innovation]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[free speech]]></category>
		<category><![CDATA[GDDR6]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GPUhammer]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hardware security]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[HexEval]]></category>
		<category><![CDATA[in-memory execution]]></category>
		<category><![CDATA[internal tooling]]></category>
		<category><![CDATA[Internet freedom]]></category>
		<category><![CDATA[Irish DPC]]></category>
		<category><![CDATA[Kid Web Services]]></category>
		<category><![CDATA[leapfrogging]]></category>
		<category><![CDATA[LOLBin]]></category>
		<category><![CDATA[long-form content]]></category>
		<category><![CDATA[Louis Vuitton]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[malware-as-a-service]]></category>
		<category><![CDATA[Matanbuchus]]></category>
		<category><![CDATA[medical imaging]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Teams]]></category>
		<category><![CDATA[monetary fine]]></category>
		<category><![CDATA[monetary sovereignty]]></category>
		<category><![CDATA[nonprofit]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[NVidia]]></category>
		<category><![CDATA[online identity]]></category>
		<category><![CDATA[Online Safety Act]]></category>
		<category><![CDATA[Patch Tuesday]]></category>
		<category><![CDATA[patient data]]></category>
		<category><![CDATA[payload delivery]]></category>
		<category><![CDATA[payments infrastructure]]></category>
		<category><![CDATA[Peer-to-peer networks]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[retail]]></category>
		<category><![CDATA[reverse shell]]></category>
		<category><![CDATA[Rowhammer]]></category>
		<category><![CDATA[SMA 100]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[SonicWall]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[support automation]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[tech philosophy]]></category>
		<category><![CDATA[technological foresight]]></category>
		<category><![CDATA[Texas]]></category>
		<category><![CDATA[TikTok]]></category>
		<category><![CDATA[UK regulation]]></category>
		<category><![CDATA[Usenix]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Web3]]></category>
		<category><![CDATA[XORIndex]]></category>
		<category><![CDATA[zero-day]]></category>
		<category><![CDATA[Zero-Day Exploit]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=31883</guid>

					<description><![CDATA[ Adoption Data Breach Exposes Sensitive Records from Texas Nonprofit,
Matanbuchus 3.0 Expands Stealth Tactics with Teams Lures and Advanced Loader Features,
Bluesky Implements UK Age Checks Amid Privacy Backlash Over Online Safety Law...this and more in AofE  #409<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit&amp;action_name=%23AxisOfEasy%20409%3A%20Adoption%20Data%20Breach%20Exposes%20Sensitive%20Records%20From%20Texas%20Nonprofit&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/?pk_campaign=feed&#038;pk_kwd=axisofeasy-409-adoption-data-breach-exposes-sensitive-records-from-texas-nonprofit/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 308: UK Version Of “Online Harms Bill” Wants To Prefilter Content Without Due Process</title>
		<link>https://axisofeasy.com/aoe/axisofeasy-308-uk-version-of-online-harms-bill-wants-to-prefilter-content-without-due-process/?pk_campaign=feed&#038;pk_kwd=axisofeasy-308-uk-version-of-online-harms-bill-wants-to-prefilter-content-without-due-process&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-308-uk-version-of-online-harms-bill-wants-to-prefilter-content-without-due-process</link>
					<comments>https://axisofeasy.com/aoe/axisofeasy-308-uk-version-of-online-harms-bill-wants-to-prefilter-content-without-due-process/?pk_campaign=feed&#038;pk_kwd=axisofeasy-308-uk-version-of-online-harms-bill-wants-to-prefilter-content-without-due-process#comments</comments>
		
		<dc:creator><![CDATA[Mark E. Jeftovic]]></dc:creator>
		<pubDate>Fri, 28 Jul 2023 22:00:28 +0000</pubDate>
				<category><![CDATA[#AxisOfEasy]]></category>
		<category><![CDATA[AirBnB]]></category>
		<category><![CDATA[Chat Control]]></category>
		<category><![CDATA[EU Poll]]></category>
		<category><![CDATA[FTC]]></category>
		<category><![CDATA[Ivanti]]></category>
		<category><![CDATA[KImsuky]]></category>
		<category><![CDATA[Norway]]></category>
		<category><![CDATA[OIC]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[OPSEC]]></category>
		<category><![CDATA[RGB]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?p=28229</guid>

					<description><![CDATA[UK Version of “Online Harms Bill” wants to prefilter content without due process,
AirBnB may cancel you for what you do online at a rental,
Controversial EU Poll Sparks Concerns Over Chat Control and Privacy Rights ... this and more in AofE  #308<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Faoe%2Faxisofeasy-308-uk-version-of-online-harms-bill-wants-to-prefilter-content-without-due-process%2F%3Fpk_campaign%3Dfeed%26pk_kwd%3Daxisofeasy-308-uk-version-of-online-harms-bill-wants-to-prefilter-content-without-due-process&amp;action_name=%23AxisOfEasy%20308%3A%20UK%20Version%20Of%20%E2%80%9COnline%20Harms%20Bill%E2%80%9D%20Wants%20To%20Prefilter%20Content%20Without%20Due%20Process&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/aoe/axisofeasy-308-uk-version-of-online-harms-bill-wants-to-prefilter-content-without-due-process/?pk_campaign=feed&#038;pk_kwd=axisofeasy-308-uk-version-of-online-harms-bill-wants-to-prefilter-content-without-due-process/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
		<item>
		<title>#AxisOfEasy 308: UK Version Of “Online Harms Bill” Wants To Prefilter Content Without Due Process</title>
		<link>https://axisofeasy.com/podcast/axisofeasy-308-uk-version-of-online-harms-bill-wants-to-prefilter-content-without-due-process/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=axisofeasy-308-uk-version-of-online-harms-bill-wants-to-prefilter-content-without-due-process</link>
					<comments>https://axisofeasy.com/podcast/axisofeasy-308-uk-version-of-online-harms-bill-wants-to-prefilter-content-without-due-process/#respond</comments>
		
		<dc:creator><![CDATA[ryan]]></dc:creator>
		<pubDate>Fri, 28 Jul 2023 10:00:03 +0000</pubDate>
				<category><![CDATA[AirBnB]]></category>
		<category><![CDATA[Chat Control]]></category>
		<category><![CDATA[EU Poll]]></category>
		<category><![CDATA[FTC]]></category>
		<category><![CDATA[Ivanti]]></category>
		<category><![CDATA[KImsuky]]></category>
		<category><![CDATA[Norway]]></category>
		<category><![CDATA[OIC]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[OPSEC]]></category>
		<category><![CDATA[RGB]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">https://axisofeasy.com/?post_type=podcast&#038;p=28245</guid>

					<description><![CDATA[UK Version of “Online Harms Bill” wants to prefilter content without due process<img src="//axisofeasy.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Faxisofeasy.com%2Fpodcast%2Faxisofeasy-308-uk-version-of-online-harms-bill-wants-to-prefilter-content-without-due-process%2F&amp;action_name=%23AxisOfEasy%20308%3A%20UK%20Version%20Of%20%E2%80%9COnline%20Harms%20Bill%E2%80%9D%20Wants%20To%20Prefilter%20Content%20Without%20Due%20Process&amp;urlref=https%3A%2F%2Faxisofeasy.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
		
					<wfw:commentRss>https://axisofeasy.com/podcast/axisofeasy-308-uk-version-of-online-harms-bill-wants-to-prefilter-content-without-due-process/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
