<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 5, 2026 at 10:27 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://nyroxis.fr/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Nyroxis – Cybersecurity &amp; Threat Monitoring</title>
		<link><![CDATA[https://nyroxis.fr]]></link>
		<description><![CDATA[Nyroxis – Cybersecurity &amp; Threat Monitoring]]></description>
		<lastBuildDate><![CDATA[Wed, 25 Mar 2026 20:44:32 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://nyroxis.fr/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://nyroxis.fr/]]></guid>
			<link><![CDATA[https://nyroxis.fr/]]></link>
			<title>nyroxis home</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 20:44:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypass/]]></guid>
			<link><![CDATA[https://nyroxis.fr/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypass/]]></link>
			<title>Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 14:10:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants/]]></guid>
			<link><![CDATA[https://nyroxis.fr/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants/]]></link>
			<title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 05:07:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems/]]></guid>
			<link><![CDATA[https://nyroxis.fr/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems/]]></link>
			<title>Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 04:32:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing/]]></guid>
			<link><![CDATA[https://nyroxis.fr/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing/]]></link>
			<title>China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:34:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers/]]></guid>
			<link><![CDATA[https://nyroxis.fr/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers/]]></link>
			<title>Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 15:32:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/product/nyroxis-free-trial-30-days/]]></guid>
			<link><![CDATA[https://nyroxis.fr/product/nyroxis-free-trial-30-days/]]></link>
			<title>Nyroxis – Free Trial (30 Days)</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:52:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/]]></guid>
			<link><![CDATA[https://nyroxis.fr/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/]]></link>
			<title>UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 11:04:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/]]></guid>
			<link><![CDATA[https://nyroxis.fr/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/]]></link>
			<title>Why Third-Party Risk Is the Biggest Gap in Your Clients&#8217; Security Posture</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 11:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/]]></guid>
			<link><![CDATA[https://nyroxis.fr/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/]]></link>
			<title>New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:10:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/]]></guid>
			<link><![CDATA[https://nyroxis.fr/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/]]></link>
			<title>Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:35:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/block-the-prompt-not-the-work-the-end-of-doctor-no/]]></guid>
			<link><![CDATA[https://nyroxis.fr/block-the-prompt-not-the-work-the-end-of-doctor-no/]]></link>
			<title>Block the Prompt, Not the Work: The End of &#8220;Doctor No&#8221;</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 12:46:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/casbaneiro-phishing-targets-latin-america-and-europe-using-dynamic-pdf-lures/]]></guid>
			<link><![CDATA[https://nyroxis.fr/casbaneiro-phishing-targets-latin-america-and-europe-using-dynamic-pdf-lures/]]></link>
			<title>Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 12:36:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/]]></guid>
			<link><![CDATA[https://nyroxis.fr/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/]]></link>
			<title>Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 19:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories/]]></guid>
			<link><![CDATA[https://nyroxis.fr/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories/]]></link>
			<title>ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion &amp; 10 More Stories</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:45:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners/]]></guid>
			<link><![CDATA[https://nyroxis.fr/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners/]]></link>
			<title>Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 11:42:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/the-state-of-trusted-open-source-report/]]></guid>
			<link><![CDATA[https://nyroxis.fr/the-state-of-trusted-open-source-report/]]></link>
			<title>The State of Trusted Open Source Report</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action/]]></guid>
			<link><![CDATA[https://nyroxis.fr/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action/]]></link>
			<title>WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 09:51:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/new-chrome-zero-day-cve-2026-5281-under-active-exploitation-patch-released/]]></guid>
			<link><![CDATA[https://nyroxis.fr/new-chrome-zero-day-cve-2026-5281-under-active-exploitation-patch-released/]]></link>
			<title>New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 11:42:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/3-reasons-attackers-are-using-your-trusted-tools-against-you-and-why-you-dont-see-it-coming/]]></guid>
			<link><![CDATA[https://nyroxis.fr/3-reasons-attackers-are-using-your-trusted-tools-against-you-and-why-you-dont-see-it-coming/]]></link>
			<title>3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 10:58:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/]]></guid>
			<link><![CDATA[https://nyroxis.fr/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/]]></link>
			<title>Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 15:21:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-networks/]]></guid>
			<link><![CDATA[https://nyroxis.fr/trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-networks/]]></link>
			<title>TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 16:03:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/vertex-ai-vulnerability-exposes-google-cloud-data-and-private-artifacts/]]></guid>
			<link><![CDATA[https://nyroxis.fr/vertex-ai-vulnerability-exposes-google-cloud-data-and-private-artifacts/]]></link>
			<title>Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 13:09:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priority/]]></guid>
			<link><![CDATA[https://nyroxis.fr/the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priority/]]></link>
			<title>The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 11:50:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/glassworm-malware-uses-solana-dead-drops-to-deliver-rat-and-steal-browser-crypto-data/]]></guid>
			<link><![CDATA[https://nyroxis.fr/glassworm-malware-uses-solana-dead-drops-to-deliver-rat-and-steal-browser-crypto-data/]]></link>
			<title>GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 14:26:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/silver-fox-expands-asia-cyber-campaign-with-atlascross-rat-and-fake-domains/]]></guid>
			<link><![CDATA[https://nyroxis.fr/silver-fox-expands-asia-cyber-campaign-with-atlascross-rat-and-fake-domains/]]></link>
			<title>Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 11:46:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/axios-supply-chain-attack-pushes-cross-platform-rat-via-compromised-npm-account/]]></guid>
			<link><![CDATA[https://nyroxis.fr/axios-supply-chain-attack-pushes-cross-platform-rat-via-compromised-npm-account/]]></link>
			<title>Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 06:08:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-attack/]]></guid>
			<link><![CDATA[https://nyroxis.fr/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-attack/]]></link>
			<title>Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 15:40:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/citrix-netscaler-under-active-recon-for-cve-2026-3055-cvss-9-3-memory-overread-bug/]]></guid>
			<link><![CDATA[https://nyroxis.fr/citrix-netscaler-under-active-recon-for-cve-2026-3055-cvss-9-3-memory-overread-bug/]]></link>
			<title>Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 09:11:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation/]]></guid>
			<link><![CDATA[https://nyroxis.fr/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation/]]></link>
			<title>CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 07:07:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/ta446-deploys-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign/]]></guid>
			<link><![CDATA[https://nyroxis.fr/ta446-deploys-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign/]]></link>
			<title>TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 07:07:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/⚡-weekly-recap-telecom-sleeper-cells-llm-jailbreaks-apple-forces-u-k-age-checks-and-more/]]></guid>
			<link><![CDATA[https://nyroxis.fr/⚡-weekly-recap-telecom-sleeper-cells-llm-jailbreaks-apple-forces-u-k-age-checks-and-more/]]></link>
			<title>⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 13:56:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/3-soc-process-fixes-that-unlock-tier-1-productivity/]]></guid>
			<link><![CDATA[https://nyroxis.fr/3-soc-process-fixes-that-unlock-tier-1-productivity/]]></link>
			<title>3 SOC Process Fixes That Unlock Tier 1 Productivity</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/russian-ctrl-toolkit-delivered-via-malicious-lnk-files-hijacks-rdp-via-frp-tunnels/]]></guid>
			<link><![CDATA[https://nyroxis.fr/russian-ctrl-toolkit-delivered-via-malicious-lnk-files-hijacks-rdp-via-frp-tunnels/]]></link>
			<title>Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 12:18:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/the-state-of-secrets-sprawl-2026-9-takeaways-for-cisos/]]></guid>
			<link><![CDATA[https://nyroxis.fr/the-state-of-secrets-sprawl-2026-9-takeaways-for-cisos/]]></link>
			<title>The State of Secrets Sprawl 2026: 9 Takeaways for CISOs</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-campaign/]]></guid>
			<link><![CDATA[https://nyroxis.fr/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-campaign/]]></link>
			<title>Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 07:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/apple-sends-lock-screen-alerts-to-outdated-iphones-over-active-web-based-exploits/]]></guid>
			<link><![CDATA[https://nyroxis.fr/apple-sends-lock-screen-alerts-to-outdated-iphones-over-active-web-based-exploits/]]></link>
			<title>Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 17:22:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks/]]></guid>
			<link><![CDATA[https://nyroxis.fr/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks/]]></link>
			<title>[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 13:12:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/the-kill-chain-is-obsolete-when-your-ai-agent-is-the-threat/]]></guid>
			<link><![CDATA[https://nyroxis.fr/the-kill-chain-is-obsolete-when-your-ai-agent-is-the-threat/]]></link>
			<title>The Kill Chain Is Obsolete When Your AI Agent Is the Threat</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 11:58:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website/]]></guid>
			<link><![CDATA[https://nyroxis.fr/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website/]]></link>
			<title>Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 13:11:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/masters-of-imitation-how-hackers-and-art-forgers-perfect-the-art-of-deception/]]></guid>
			<link><![CDATA[https://nyroxis.fr/masters-of-imitation-how-hackers-and-art-forgers-perfect-the-art-of-deception/]]></link>
			<title>Masters of Imitation: How Hackers and Art Forgers Perfect the Art of Deception</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 11:58:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more-stories/]]></guid>
			<link><![CDATA[https://nyroxis.fr/threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more-stories/]]></link>
			<title>ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits &amp; 20 More Stories</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 11:45:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/coruna-ios-kit-reuses-2023-triangulation-exploit-code-in-new-mass-attacks/]]></guid>
			<link><![CDATA[https://nyroxis.fr/coruna-ios-kit-reuses-2023-triangulation-exploit-code-in-new-mass-attacks/]]></link>
			<title>Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 11:07:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks/]]></guid>
			<link><![CDATA[https://nyroxis.fr/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks/]]></link>
			<title>Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 13:57:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/aitm-phishing-targets-tiktok-business-accounts-using-cloudflare-turnstile-evasion/]]></guid>
			<link><![CDATA[https://nyroxis.fr/aitm-phishing-targets-tiktok-business-accounts-using-cloudflare-turnstile-evasion/]]></link>
			<title>AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 12:03:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/we-are-at-war/]]></guid>
			<link><![CDATA[https://nyroxis.fr/we-are-at-war/]]></link>
			<title>We Are At War</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 11:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/bearlyfy-hits-russian-firms-with-custom-genielocker-ransomware/]]></guid>
			<link><![CDATA[https://nyroxis.fr/bearlyfy-hits-russian-firms-with-custom-genielocker-ransomware/]]></link>
			<title>Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 10:04:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks/]]></guid>
			<link><![CDATA[https://nyroxis.fr/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks/]]></link>
			<title>LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 08:07:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/russian-hacker-sentenced-to-2-years-for-ta551-botnet-driven-ransomware-attacks/]]></guid>
			<link><![CDATA[https://nyroxis.fr/russian-hacker-sentenced-to-2-years-for-ta551-botnet-driven-ransomware-attacks/]]></link>
			<title>Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 11:52:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.fr/blog/]]></guid>
			<link><![CDATA[https://nyroxis.fr/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Sat, 04 Sep 2021 13:30:00 +0000]]></pubDate>
		</item>
				</channel>
</rss>
