<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits	</title>
	<atom:link href="https://nyroxis.fr/sshstalker-botnet-uses-irc-c2-to-control-linux-systems-via-legacy-kernel-exploits/feed/" rel="self" type="application/rss+xml" />
	<link>https://nyroxis.fr/sshstalker-botnet-uses-irc-c2-to-control-linux-systems-via-legacy-kernel-exploits/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=sshstalker-botnet-uses-irc-c2-to-control-linux-systems-via-legacy-kernel-exploits</link>
	<description>Smart, Real-Time Protection for Your Digital Life</description>
	<lastBuildDate>Wed, 11 Feb 2026 09:56:00 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
</channel>
</rss>
