Discover#AxisOfEasy Weekly Tech Digest
Claim Ownership
69 Episodes
Reverse
In this episode:
Hackers Exploit Fake Facebook MidJourney AI Page to Promote Malware to 1.2M People
US Lawmakers Introduce Federal Data Privacy Law
Hacker Leaks 8.5M U.S. Environmental Protection Agency (EPA) Contact Data, CISA Claims Data Already Publicly Available
Researchers at the Shadowserver Foundation identify Thousands of Ivanti VPN Appliances Impacted by Recent Vulnerability
New Malware Persistence Method Targeting Magento Servers
CISA warns of “nation state compromise involving Microsoft products”
In this episode:
Hackers Exploit Fake Facebook MidJourney AI Page to Promote Malware to 1.2M People
US Lawmakers Introduce Federal Data Privacy Law
Hacker Leaks 8.5M U.S. Environmental Protection Agency (EPA) Contact Data, CISA Claims Data Already Publicly Available
Researchers at the Shadowserver Foundation identify Thousands of Ivanti VPN Appliances Impacted by Recent Vulnerability
New Malware Persistence Method Targeting Magento Servers
CISA warns of “nation state compromise involving Microsoft products”
In this episode:
Telecom Giant AT&T says Personal Data from 73M Accounts has been Leaked onto the Dark Web
Exposed: Jeffrey Epstein’s Island Visitors Tracked and Revealed
Israel’s Action Against Al Jazeera Sparks Free Speech Debate
Lawsuit Reveals Facebook Streaming Business Shutdown Linked to Netflix’s Ad Spending, Allowing Access to User DMs
Google settles “Incognito” lawsuit
After Years of Careful Infiltration, Playing The Long Game: ‘xz utils’ Software Backdoor Uncovered in Years Long Infiltration Operation in Hacking Plot that Spans Multiple Years
In this episode:
Telecom Giant AT&T says Personal Data from 73M Accounts has been Leaked onto the Dark Web
Exposed: Jeffrey Epstein’s Island Visitors Tracked and Revealed
Israel’s Action Against Al Jazeera Sparks Free Speech Debate
Lawsuit Reveals Facebook Streaming Business Shutdown Linked to Netflix’s Ad Spending, Allowing Access to User DMs
Google settles “Incognito” lawsuit
After Years of Careful Infiltration, Playing The Long Game: ‘xz utils’ Software Backdoor Uncovered in Years Long Infiltration Operation in Hacking Plot that Spans Multiple Years
In this episode:
What is Money? Decoding the Finance Code with easyDNS CEO Mark Jeftovic
Spanish High Court Suspends Order to Block Telegram while Awaiting Police Report
Google’s Directive to Disclose Viewers of Targeted YouTube Videos
British High Court Blocks US Extradition Charges for Julian Assange
U.S. Imposes Sanctions on Russian Crypto Firms Over Alleged Sanctions Evasion
Apple’s M-Series Chips Encounter Unfixable Security Flaw
In this episode:
What is Money? Decoding the Finance Code with easyDNS CEO Mark Jeftovic
Spanish High Court Suspends Order to Block Telegram while Awaiting Police Report
Google’s Directive to Disclose Viewers of Targeted YouTube Videos
British High Court Blocks US Extradition Charges for Julian Assange
U.S. Imposes Sanctions on Russian Crypto Firms Over Alleged Sanctions Evasion
Apple’s M-Series Chips Encounter Unfixable Security Flaw
In this episode:
Large Scale Data Breach Exposes Info of Nearly Half of France’s Working Population
875 Workers Liberated by Filipino Police from Slavery After Falling for Promises of Lucrative Work
After Cyberattack, Malawi Passport System Bounces Back Online
IMF Email Accounts Compromised in Major Security Breach
Critics Accuse Canadian Government of Gaslighting Regarding Its Online Censorship Bill
In this episode:
Large Scale Data Breach Exposes Info of Nearly Half of France’s Working Population
875 Workers Liberated by Filipino Police from Slavery After Falling for Promises of Lucrative Work
After Cyberattack, Malawi Passport System Bounces Back Online
IMF Email Accounts Compromised in Major Security Breach
Critics Accuse Canadian Government of Gaslighting Regarding Its Online Censorship Bill
In this episode:
Major Cybersecurity Breach: Top US Agency CISA Hacked, Systems Offline
Incognito Darknet Market rug pulls users, then extorts them
New Linux Malware Discovery Demonstrates how NerbianRAT is Used Across Platforms by For-Profit Threat Groups
New Malware Campaign Leverages Security Flaw in Popup Builder WordPress Plugin
Roku Resolves Unauthorized Subscriptions and Provides Refunds for 15k Breached Accounts
In this episode:
Major Cybersecurity Breach: Top US Agency CISA Hacked, Systems Offline
Incognito Darknet Market rug pulls users, then extorts them
New Linux Malware Discovery Demonstrates how NerbianRAT is Used Across Platforms by For-Profit Threat Groups
New Malware Campaign Leverages Security Flaw in Popup Builder WordPress Plugin
Roku Resolves Unauthorized Subscriptions and Provides Refunds for 15k Breached Accounts
In this episode:
Security Researchers Create “Morris II”: A Test AI Worm that can Steal Data and Send Spam Emails between AI Agents
Canadian Financial Intelligence Agency Pulls Corporate Systems Offline due to Cyber Incident
Canada’s Justice Minister Defends Controversial Online Harms Bill: House Arrest and Internet Restrictions
So you’re in the latest credential leak – now what?
Federal Judge Orders NSO Group to Reveal Pegasus Spyware Source Code in WhatsApp Lawsuit
US Treasury Department Sanctions Greece-based Spyware Company for Targeting American Journalists and Officials
In this episode:
Security Researchers Create “Morris II”: A Test AI Worm that can Steal Data and Send Spam Emails between AI Agents
Canadian Financial Intelligence Agency Pulls Corporate Systems Offline due to Cyber Incident
Canada’s Justice Minister Defends Controversial Online Harms Bill: House Arrest and Internet Restrictions
So you’re in the latest credential leak – now what?
Federal Judge Orders NSO Group to Reveal Pegasus Spyware Source Code in WhatsApp Lawsuit
US Treasury Department Sanctions Greece-based Spyware Company for Targeting American Journalists and Officials
In this episode:
Unveiling the Era of AI Deception: The Alarming Ease of Falling Victim to Scams
Hack at Change Healthcare Network Causes Disruption in Pharmacies Across the US
Supreme Court Grapples with the Issue of Regulating Social Media Platforms
Canadian Government Finally Tables Bill C-63, the Online Harms Act
Joint US-Chinese Research Discovers How to Recreate Fingerprints from Smartphone Swipes
In this episode:
Unveiling the Era of AI Deception: The Alarming Ease of Falling Victim to Scams
Hack at Change Healthcare Network Causes Disruption in Pharmacies Across the US
Supreme Court Grapples with the Issue of Regulating Social Media Platforms
Canadian Government Finally Tables Bill C-63, the Online Harms Act
Joint US-Chinese Research Discovers How to Recreate Fingerprints from Smartphone Swipes
In this episode:
IC3 Warning: Cybercriminals Exploiting QR Codes to Steal Funds
French Assembly passes Bill to criminalize vaccine skepticism
Bitcoin Self-Custody Made Easy: Watch a 10-Year-Old Set Up a Coldcard Mk4
YouTube Faces Backlash as Massive YouTuber Louis Rossmann Defends Free Speech
The European Court of Human Rights Rules Backdoored Encryption Violates the European Convention on Human Rights
ATHENE Researchers Discover Fundamental Design Flaws in DNSSEC
Former CRTC commissioner: existing Canadian law covers AI
In this episode:
IC3 Warning: Cybercriminals Exploiting QR Codes to Steal Funds
French Assembly passes Bill to criminalize vaccine skepticism
Bitcoin Self-Custody Made Easy: Watch a 10-Year-Old Set Up a Coldcard Mk4
YouTube Faces Backlash as Massive YouTuber Louis Rossmann Defends Free Speech
The European Court of Human Rights Rules Backdoored Encryption Violates the European Convention on Human Rights
ATHENE Researchers Discover Fundamental Design Flaws in DNSSEC
Former CRTC commissioner: existing Canadian law covers AI
In this episode:
Third Party Security Data Breach Leaves Bank of America Customers Worried and Confused
Bill S-210 Lobby Working Hard to Foster Widespread Age Verification Technologies in Canada
Facebook’s Compliance with Health Canada’s Requests Leads to Post Censorship
Court Rejects Most Copyright Claims by Book Authors Against OpenAI
Ivanti VPN Under Siege: SAML Vulnerability Leads to Widespread Compromises
In this episode:
Third Party Security Data Breach Leaves Bank of America Customers Worried and Confused
Bill S-210 Lobby Working Hard to Foster Widespread Age Verification Technologies in Canada
Facebook’s Compliance with Health Canada’s Requests Leads to Post Censorship
Court Rejects Most Copyright Claims by Book Authors Against OpenAI
Ivanti VPN Under Siege: SAML Vulnerability Leads to Widespread Compromises
In this episode:
Deepfake scammers trick employee, steal $25m
Ex-CIA software engineer Joshua Schulte who leaked classified materials to WikiLeaks sentenced to 40 years
Google Search to no longer make site backups while crawling the web
Patched iPhone kernel bug exploited in attacks, CISA issues warning
Latest Lock and Code Episode: Bruce Schneier predicts future of AI-powered spying
In this episode:
Deepfake scammers trick employee, steal $25m
Ex-CIA software engineer Joshua Schulte who leaked classified materials to WikiLeaks sentenced to 40 years
Google Search to no longer make site backups while crawling the web
Patched iPhone kernel bug exploited in attacks, CISA issues warning
Latest Lock and Code Episode: Bruce Schneier predicts future of AI-powered spying
In this episode:
26 Billion Records Combined in ‘Mother of All Breaches’ Data Leak
NSA Admits Buying American Citizens’ Internet Data Without Warrants
The Cobblers Children (almost) Had No Shoes! DMARC Enforcement Went Live This Week
Privacy-Oriented Nitter Project Shuts Down Following Changes to Guest Accounts
Google still tracks you in incognito mode (as per latest wording update)
Florida Man Key Suspect in Oktapus, Scattered Spider Hacker Groups
In this episode:
26 Billion Records Combined in ‘Mother of All Breaches’ Data Leak
NSA Admits Buying American Citizens’ Internet Data Without Warrants
The Cobblers Children (almost) Had No Shoes! DMARC Enforcement Went Live This Week
Privacy-Oriented Nitter Project Shuts Down Following Changes to Guest Accounts
Google still tracks you in incognito mode (as per latest wording update)
Florida Man Key Suspect in Oktapus, Scattered Spider Hacker Groups
In this episode:
What is “Triangulation Fraud” – Canadian man finds out the hard way
PsExec Exploits and BYOVD Attacks Deployed by Kasseika Ransomware
Chinese Hackers Exploit Zero-Days, Compromise 1,700+ Ivanti VPN Appliances
Critical Security Flaw in GoAnywhere MFT Allows Unauthorized Admin Access
Mozilla Unveils New Security Updates for Thunderbird and Firefox
German Court Charges Programmer after Cybersecurity Issue Disclosure
In this episode:
What is “Triangulation Fraud” – Canadian man finds out the hard way
PsExec Exploits and BYOVD Attacks Deployed by Kasseika Ransomware
Chinese Hackers Exploit Zero-Days, Compromise 1,700+ Ivanti VPN Appliances
Critical Security Flaw in GoAnywhere MFT Allows Unauthorized Admin Access
Mozilla Unveils New Security Updates for Thunderbird and Firefox
German Court Charges Programmer after Cybersecurity Issue Disclosure
In this episode:
Illicit Inferno Malware Poses as Coinbase, Siphoning $87 Million from 137,000 Victims
Google Patches Actively Exploited Zero-Day Vulnerability of 2024
Military Use of AI No Longer Explicitly Barred in OpenAI’s Updated Policies
Senators Wyden and Lummis Demand Probe into SEC Account Hack Causes Bitcoin Price Hike
USSS Special Agent Exposes Fake Norton Antivirus Renewal Phishing Tactics
In this episode:
Illicit Inferno Malware Poses as Coinbase, Siphoning $87 Million from 137,000 Victims
Google Patches Actively Exploited Zero-Day Vulnerability of 2024
Military Use of AI No Longer Explicitly Barred in OpenAI’s Updated Policies
Senators Wyden and Lummis Demand Probe into SEC Account Hack Causes Bitcoin Price Hike
USSS Special Agent Exposes Fake Norton Antivirus Renewal Phishing Tactics
In this episode:
Musk’s New X Verification System Gives Rise to Dark Web Sales of Stolen Accounts
Ottawa Judge Says Police Must Return Phones of Suspected Pedophiles after 175 million Passcode Guesses
YouTube Channels Compromised in Lumma Stealer Software Attack
Uncovering the Compromise: SEC’s Official X Account Used to Post Fake Bitcoin News
Victim of SIM-Swapping Attack Sues Anonymous Crypto Wallet Holder
How to Guard Against Crypto Wallet Drains: $300 Million Stolen in 2023
In this episode:
Musk’s New X Verification System Gives Rise to Dark Web Sales of Stolen Accounts
Ottawa Judge Says Police Must Return Phones of Suspected Pedophiles after 175 million Passcode Guesses
YouTube Channels Compromised in Lumma Stealer Software Attack
Uncovering the Compromise: SEC’s Official X Account Used to Post Fake Bitcoin News
Victim of SIM-Swapping Attack Sues Anonymous Crypto Wallet Holder
How to Guard Against Crypto Wallet Drains: $300 Million Stolen in 2023
In this episode:
Dark Web “Leaksmas” Event Exposes Massive Volumes of Leaked Data
Facebook Unveils New User Tracking Feature Link History
Indian journalists’ iPhones infected with Pegasus Spyware, according to Amnesty and Apple
Windows 10 and 11 Protections Bypassed by New Variant of DLL Search Order Hijacking
Malware Leveraging Google OAuth Endpoint to Restore Cookies and Hijack User Accounts
In this episode:
Dark Web “Leaksmas” Event Exposes Massive Volumes of Leaked Data
Facebook Unveils New User Tracking Feature Link History
Indian journalists’ iPhones infected with Pegasus Spyware, according to Amnesty and Apple
Windows 10 and 11 Protections Bypassed by New Variant of DLL Search Order Hijacking
Malware Leveraging Google OAuth Endpoint to Restore Cookies and Hijack User Accounts
In this episode:
Canadian Government Rewrites Online News Act To Further Monopolize Funds for Legacy Media
CBS, Paramount Parent Company, National Amusements, Hacked in Latest Data Breach
Journalists Caught Unawares by New OpenAI Deal to Use Their Stories
Ubisoft Launches Investigation into Alleged Data Breach
Iranian Cyberattackers ‘Peach Sandstorm’ Launch Global Defense Network Targeted Attacks
In this episode:
Canadian Government Rewrites Online News Act To Further Monopolize Funds for Legacy Media
CBS, Paramount Parent Company, National Amusements, Hacked in Latest Data Breach
Journalists Caught Unawares by New OpenAI Deal to Use Their Stories
Ubisoft Launches Investigation into Alleged Data Breach
Iranian Cyberattackers ‘Peach Sandstorm’ Launch Global Defense Network Targeted Attacks
In this issue:
Alarming Revelation: Smart Toys Collecting Biometric Data of Children
Chimera Hackers Spent Over 2 Years Looting NXP Chip Designs and IP Before Being Detected
Channel 1 Launches Proof-of-Concept Newscast, Revealing Just How Far AI-Generated Videos Have Come
Canadian Government Paid Twitter Influencers to Promote Pandemic Policies Without Full Disclosure
Marketing Behemoth Confesses to Eavesdropping for Personalized Ads
In this issue:
Iran-Affiliated Hackers Attack Water Authorities Across Multiple US States
US State Department Faces Lawsuit Over Accusations of Funding Censorship Technology
23andMe confirms Hackers Stole Nearly Half of its Customer Data
Israeli Hospital Data Breach: Iran-Linked Hackers Purportedly Leak Massive Trove of Information
Controversial Blocking of Chronological Feeds: Upholding Censorship Control
In this episode:
Iran-Affiliated Hackers Attack Water Authorities Across Multiple US States
US State Department Faces Lawsuit Over Accusations of Funding Censorship Technology
23andMe confirms Hackers Stole Nearly Half of its Customer Data
Israeli Hospital Data Breach: Iran-Linked Hackers Purportedly Leak Massive Trove of Information
Controversial Blocking of Chronological Feeds: Upholding Censorship Control
In this episode:
LockBit Ransomware Group Claims 1.5TB of Stolen Documents Against Canadian Government
Unencrypted Messages Lead to Removal of Nothing Chats from Play Store
Child Safety Risks Linked to iPhone’s New ‘NameDrop’ Feature
World Economic Forum Backs UNESCO’s Push To Regulate Speech on Social Media
US and UK Release New AI System Development Guidelines
easyDNS CEO Mark Jeftovic will be speaking at SplinterCon
No having the titles in a uniform format makes them a hassle to sort.