<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Nyroxis – Cybersecurity &amp; Threat Monitoring</title>
	<atom:link href="https://nyroxis.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://nyroxis.com</link>
	<description>Smart, Real-Time Protection for Your Digital Life</description>
	<lastBuildDate>Fri, 03 Apr 2026 11:04:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://nyroxis.com/wp-content/uploads/2025/08/cropped-site-icon-32x32.png</url>
	<title>Nyroxis – Cybersecurity &amp; Threat Monitoring</title>
	<link>https://nyroxis.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack</title>
		<link>https://nyroxis.com/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack</link>
					<comments>https://nyroxis.com/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 11:04:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/supplychain-aUr7Ld-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/supplychain-aUr7Ld-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/supplychain-aUr7Ld-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/supplychain-aUr7Ld-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/supplychain-aUr7Ld-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/">UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/supplychain-aUr7Ld-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/supplychain-aUr7Ld-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/supplychain-aUr7Ld-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/supplychain-aUr7Ld-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/supplychain-aUr7Ld-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North&hellip; <a href="https://thehackernews.com/2026/04/unc1069-social-engineering-of-axios.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/">UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why Third-Party Risk Is the Biggest Gap in Your Clients&#8217; Security Posture</title>
		<link>https://nyroxis.com/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture</link>
					<comments>https://nyroxis.com/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 11:00:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/cynomi-kGbucY-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/cynomi-kGbucY-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/cynomi-kGbucY-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/cynomi-kGbucY-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/cynomi-kGbucY-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>The next major breach hitting your clients probably won&#8217;t come from inside their walls. It&#8217;ll come through a vendor they trust, a SaaS tool their finance team signed&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/">Why Third-Party Risk Is the Biggest Gap in Your Clients’ Security Posture</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/cynomi-kGbucY-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/cynomi-kGbucY-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/cynomi-kGbucY-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/cynomi-kGbucY-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/cynomi-kGbucY-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>The next major breach hitting your clients probably won&#8217;t come from inside their walls. It&#8217;ll come through a vendor they trust, a SaaS tool their finance team signed&hellip; <a href="https://thehackernews.com/2026/04/why-third-party-risk-is-biggest-gap-in.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/">Why Third-Party Risk Is the Biggest Gap in Your Clients’ Security Posture</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images</title>
		<link>https://nyroxis.com/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images</link>
					<comments>https://nyroxis.com/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 09:10:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the trojan was&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/">New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the trojan was&hellip; <a href="https://thehackernews.com/2026/04/new-sparkcat-variant-in-ios-android.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/">New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK</title>
		<link>https://nyroxis.com/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk</link>
					<comments>https://nyroxis.com/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 08:35:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/drift-1-RFLIQf-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/drift-1-RFLIQf-150x150.png 150w, https://nyroxis.com/wp-content/uploads/2026/04/drift-1-RFLIQf-400x400.png 400w, https://nyroxis.com/wp-content/uploads/2026/04/drift-1-RFLIQf-300x300.png 300w, https://nyroxis.com/wp-content/uploads/2026/04/drift-1-RFLIQf-100x100.png 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Solana-based decentralized exchange Drift has confirmed that attackers drained about $285 million from the platform during a security incident that took place on April 1, 2026.&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/">Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/drift-1-RFLIQf-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/drift-1-RFLIQf-150x150.png 150w, https://nyroxis.com/wp-content/uploads/2026/04/drift-1-RFLIQf-400x400.png 400w, https://nyroxis.com/wp-content/uploads/2026/04/drift-1-RFLIQf-300x300.png 300w, https://nyroxis.com/wp-content/uploads/2026/04/drift-1-RFLIQf-100x100.png 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Solana-based decentralized exchange Drift has confirmed that attackers drained about $285 million from the platform during a security incident that took place on April 1, 2026.&hellip; <a href="https://thehackernews.com/2026/04/drift-loses-285-million-in-durable.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/">Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials</title>
		<link>https://nyroxis.com/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials</link>
					<comments>https://nyroxis.com/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 19:30:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/nextjs-WpPUCp-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/nextjs-WpPUCp-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/nextjs-WpPUCp-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/nextjs-WpPUCp-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/nextjs-WpPUCp-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web Services (AWS)&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/">Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/nextjs-WpPUCp-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/nextjs-WpPUCp-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/nextjs-WpPUCp-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/nextjs-WpPUCp-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/nextjs-WpPUCp-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web Services (AWS)&hellip; <a href="https://thehackernews.com/2026/04/hackers-exploit-cve-2025-55182-to.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/">Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise</title>
		<link>https://nyroxis.com/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise</link>
					<comments>https://nyroxis.com/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 15:21:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.fr/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/cisco-exploit-SowmJq-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/cisco-exploit-SowmJq-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/cisco-exploit-SowmJq-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/cisco-exploit-SowmJq-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/cisco-exploit-SowmJq-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Cisco has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated, remote attacker&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/">Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/cisco-exploit-SowmJq-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/cisco-exploit-SowmJq-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/cisco-exploit-SowmJq-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/cisco-exploit-SowmJq-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/cisco-exploit-SowmJq-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Cisco has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated, remote attacker&hellip; <a href="https://thehackernews.com/2026/04/cisco-patches-98-cvss-imc-and-ssm-flaws.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/">Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion &#038; 10 More Stories</title>
		<link>https://nyroxis.com/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories</link>
					<comments>https://nyroxis.com/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 12:45:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.fr/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/threatsday-0slFUg-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/threatsday-0slFUg-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/threatsday-0slFUg-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/threatsday-0slFUg-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/threatsday-0slFUg-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just a quick&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories/">ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/threatsday-0slFUg-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/threatsday-0slFUg-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/threatsday-0slFUg-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/threatsday-0slFUg-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/threatsday-0slFUg-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just a quick&hellip; <a href="https://thehackernews.com/2026/04/threatsday-bulletin-pre-auth-chains.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories/">ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners</title>
		<link>https://nyroxis.com/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners</link>
					<comments>https://nyroxis.com/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 11:42:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.fr/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/monero-DhnjSM-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/monero-DhnjSM-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/monero-DhnjSM-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/monero-DhnjSM-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/monero-DhnjSM-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency miners since November 2023. &#8220;Beyond cryptomining, the threat actor monetizes&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners/">Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/monero-DhnjSM-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/monero-DhnjSM-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/monero-DhnjSM-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/monero-DhnjSM-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/monero-DhnjSM-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency miners since November 2023. &#8220;Beyond cryptomining, the threat actor monetizes&hellip; <a href="https://thehackernews.com/2026/04/researchers-uncover-mining-operation.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners/">Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The State of Trusted Open Source Report</title>
		<link>https://nyroxis.com/the-state-of-trusted-open-source-report/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-state-of-trusted-open-source-report</link>
					<comments>https://nyroxis.com/the-state-of-trusted-open-source-report/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 11:30:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.fr/the-state-of-trusted-open-source-report/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/devsecops-uT2J9z-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/devsecops-uT2J9z-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/devsecops-uT2J9z-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/devsecops-uT2J9z-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/devsecops-uT2J9z-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data and customer base on open source consumption&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/the-state-of-trusted-open-source-report/">The State of Trusted Open Source Report</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/devsecops-uT2J9z-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/devsecops-uT2J9z-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/devsecops-uT2J9z-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/devsecops-uT2J9z-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/devsecops-uT2J9z-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data and customer base on open source consumption&hellip; <a href="https://thehackernews.com/2026/04/the-state-of-trusted-open-source-report.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/the-state-of-trusted-open-source-report/">The State of Trusted Open Source Report</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/the-state-of-trusted-open-source-report/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action</title>
		<link>https://nyroxis.com/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action</link>
					<comments>https://nyroxis.com/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 09:51:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.fr/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/whatsapp-alert-9rDgNB-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/whatsapp-alert-9rDgNB-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/whatsapp-alert-9rDgNB-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/whatsapp-alert-9rDgNB-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/whatsapp-alert-9rDgNB-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Meta-owned messaging platform WhatsApp said it alerted about 200 users who were tricked into installing a bogus version of its iOS app that was infected&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action/">WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/whatsapp-alert-9rDgNB-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/whatsapp-alert-9rDgNB-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/whatsapp-alert-9rDgNB-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/whatsapp-alert-9rDgNB-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/whatsapp-alert-9rDgNB-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Meta-owned messaging platform WhatsApp said it alerted about 200 users who were tricked into installing a bogus version of its iOS app that was infected&hellip; <a href="https://thehackernews.com/2026/04/whatsapp-alerts-200-users-after-fake.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action/">WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
