<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 20, 2026 at 7:38 pm by All in One SEO v4.9.7.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.nyroxis.fr/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Nyroxis – Personal Endpoint Security</title>
		<link><![CDATA[https://www.nyroxis.fr]]></link>
		<description><![CDATA[Nyroxis – Personal Endpoint Security]]></description>
		<lastBuildDate><![CDATA[Wed, 20 May 2026 17:06:54 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.nyroxis.fr/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.nyroxis.fr/microsoft-open-sources-rampart-and-clarity-to-secure-ai-agents-during-development/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/microsoft-open-sources-rampart-and-clarity-to-secure-ai-agents-during-development/]]></link>
			<title>Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development</title>
			<pubDate><![CDATA[Wed, 20 May 2026 17:06:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/microsoft-takes-down-malware-signing-service-behind-ransomware-attacks/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/microsoft-takes-down-malware-signing-service-behind-ransomware-attacks/]]></link>
			<title>Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks</title>
			<pubDate><![CDATA[Wed, 20 May 2026 14:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/webworm-deploys-echocreep-and-graphworm-backdoors-using-discord-and-ms-graph-api/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/webworm-deploys-echocreep-and-graphworm-backdoors-using-discord-and-ms-graph-api/]]></link>
			<title>Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API</title>
			<pubDate><![CDATA[Wed, 20 May 2026 12:51:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/agent-ai-is-coming-are-you-ready/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/agent-ai-is-coming-are-you-ready/]]></link>
			<title>Agent AI is Coming. Are You Ready?</title>
			<pubDate><![CDATA[Wed, 20 May 2026 11:58:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/agent-ai-is-coming-are-you-ready-2/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/agent-ai-is-coming-are-you-ready-2/]]></link>
			<title>Agent AI is Coming. Are You Ready?</title>
			<pubDate><![CDATA[Wed, 20 May 2026 11:58:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/github-breached-employee-device-hack-led-to-exfiltration-of-3800-internal-repos/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/github-breached-employee-device-hack-led-to-exfiltration-of-3800-internal-repos/]]></link>
			<title>GitHub Breached — Employee Device Hack Led to Exfiltration of 3,800+ Internal Repos</title>
			<pubDate><![CDATA[Wed, 20 May 2026 11:38:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/trapdoor-android-ad-fraud-scheme-hit-659-million-daily-bid-requests-using-455-apps/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/trapdoor-android-ad-fraud-scheme-hit-659-million-daily-bid-requests-using-455-apps/]]></link>
			<title>Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps</title>
			<pubDate><![CDATA[Tue, 19 May 2026 16:38:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/dirtydecrypt-poc-released-for-linux-kernel-cve-2026-31635-lpe-vulnerability/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/dirtydecrypt-poc-released-for-linux-kernel-cve-2026-31635-lpe-vulnerability/]]></link>
			<title>DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability</title>
			<pubDate><![CDATA[Tue, 19 May 2026 14:56:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/the-new-phishing-click-how-oauth-consent-bypasses-mfa/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/the-new-phishing-click-how-oauth-consent-bypasses-mfa/]]></link>
			<title>The New Phishing Click: How OAuth Consent Bypasses MFA</title>
			<pubDate><![CDATA[Tue, 19 May 2026 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/drupal-to-release-urgent-core-security-updates-on-may-20-sites-told-to-prepare/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/drupal-to-release-urgent-core-security-updates-on-may-20-sites-told-to-prepare/]]></link>
			<title>Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare</title>
			<pubDate><![CDATA[Tue, 19 May 2026 10:44:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/seppmail-secure-e-mail-gateway-vulnerabilities-enable-rce-and-mail-traffic-access/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/seppmail-secure-e-mail-gateway-vulnerabilities-enable-rce-and-mail-traffic-access/]]></link>
			<title>SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access</title>
			<pubDate><![CDATA[Tue, 19 May 2026 09:23:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/ollama-out-of-bounds-read-vulnerability-allows-remote-process-memory-leak/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/ollama-out-of-bounds-read-vulnerability-allows-remote-process-memory-leak/]]></link>
			<title>Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak</title>
			<pubDate><![CDATA[Sun, 10 May 2026 12:41:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/blog/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Sat, 04 Sep 2021 13:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/]]></link>
			<title>nyroxis home</title>
			<pubDate><![CDATA[Tue, 05 May 2026 16:38:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/how-ai-hallucinations-are-creating-real-security-risks/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/how-ai-hallucinations-are-creating-real-security-risks/]]></link>
			<title>How AI Hallucinations Are Creating Real Security Risks</title>
			<pubDate><![CDATA[Thu, 14 May 2026 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/interpol-operation-ramz-disrupts-mena-cybercrime-networks-with-201-arrests/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/interpol-operation-ramz-disrupts-mena-cybercrime-networks-with-201-arrests/]]></link>
			<title>INTERPOL Operation Ramz Disrupts MENA Cybercrime Networks with 201 Arrests</title>
			<pubDate><![CDATA[Mon, 18 May 2026 17:21:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/⚡-weekly-recap-exchange-0-day-npm-worm-fake-ai-repo-cisco-exploit-and-more/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/⚡-weekly-recap-exchange-0-day-npm-worm-fake-ai-repo-cisco-exploit-and-more/]]></link>
			<title>⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More</title>
			<pubDate><![CDATA[Mon, 18 May 2026 13:50:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/how-to-reduce-phishing-exposure-before-it-turns-into-business-disruption/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/how-to-reduce-phishing-exposure-before-it-turns-into-business-disruption/]]></link>
			<title>How to Reduce Phishing Exposure Before It Turns into Business Disruption</title>
			<pubDate><![CDATA[Mon, 18 May 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/nginx-cve-2026-42945-exploited-in-the-wild-causing-worker-crashes-and-possible-rce/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/nginx-cve-2026-42945-exploited-in-the-wild-causing-worker-crashes-and-possible-rce/]]></link>
			<title>NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE</title>
			<pubDate><![CDATA[Sun, 17 May 2026 11:57:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/grafana-github-token-breach-led-to-codebase-download-and-extortion-attempt/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/grafana-github-token-breach-led-to-codebase-download-and-extortion-attempt/]]></link>
			<title>Grafana GitHub Token Breach Led to Codebase Download and Extortion Attempt</title>
			<pubDate><![CDATA[Sun, 17 May 2026 07:13:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/funnel-builder-flaw-under-active-exploitation-enables-woocommerce-checkout-skimming/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/funnel-builder-flaw-under-active-exploitation-enables-woocommerce-checkout-skimming/]]></link>
			<title>Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming</title>
			<pubDate><![CDATA[Sat, 16 May 2026 15:20:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/microsofts-mdash-ai-system-finds-16-windows-flaws-fixed-in-patch-tuesday/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/microsofts-mdash-ai-system-finds-16-windows-flaws-fixed-in-patch-tuesday/]]></link>
			<title>Microsoft&#8217;s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday</title>
			<pubDate><![CDATA[Wed, 13 May 2026 13:46:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/cpanel-whm-release-fixes-for-three-new-vulnerabilities-patch-now/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/cpanel-whm-release-fixes-for-three-new-vulnerabilities-patch-now/]]></link>
			<title>cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now</title>
			<pubDate><![CDATA[Sat, 09 May 2026 07:16:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/developer-workstations-are-now-part-of-the-software-supply-chain/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/developer-workstations-are-now-part-of-the-software-supply-chain/]]></link>
			<title>Developer Workstations Are Now Part of the Software Supply Chain</title>
			<pubDate><![CDATA[Mon, 18 May 2026 11:23:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/ivanti-fortinet-sap-vmware-n8n-patch-rce-sql-injection-privilege-escalation-flaws/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/ivanti-fortinet-sap-vmware-n8n-patch-rce-sql-injection-privilege-escalation-flaws/]]></link>
			<title>Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flaws</title>
			<pubDate><![CDATA[Mon, 18 May 2026 10:54:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/azerbaijani-energy-firm-hit-by-repeated-microsoft-exchange-exploitation/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/azerbaijani-energy-firm-hit-by-repeated-microsoft-exchange-exploitation/]]></link>
			<title>Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation</title>
			<pubDate><![CDATA[Wed, 13 May 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/turla-turns-kazuar-backdoor-into-modular-p2p-botnet-for-persistent-access/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/turla-turns-kazuar-backdoor-into-modular-p2p-botnet-for-persistent-access/]]></link>
			<title>Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access</title>
			<pubDate><![CDATA[Fri, 15 May 2026 17:10:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/threatsday-bulletin-pan-os-rce-mythos-curl-bug-ai-tokenizer-attacks-and-10-stories/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/threatsday-bulletin-pan-os-rce-mythos-curl-bug-ai-tokenizer-attacks-and-10-stories/]]></link>
			<title>ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories</title>
			<pubDate><![CDATA[Thu, 14 May 2026 16:07:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/ghostwriter-targets-ukrainian-government-with-geofenced-pdf-phishing-cobalt-strike/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/ghostwriter-targets-ukrainian-government-with-geofenced-pdf-phishing-cobalt-strike/]]></link>
			<title>Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike</title>
			<pubDate><![CDATA[Thu, 14 May 2026 14:00:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/praisonai-cve-2026-44338-auth-bypass-targeted-within-hours-of-disclosure/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/praisonai-cve-2026-44338-auth-bypass-targeted-within-hours-of-disclosure/]]></link>
			<title>PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure</title>
			<pubDate><![CDATA[Thu, 14 May 2026 11:40:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/windows-zero-days-expose-bitlocker-bypasses-and-ctfmon-privilege-escalation/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/windows-zero-days-expose-bitlocker-bypasses-and-ctfmon-privilege-escalation/]]></link>
			<title>Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation</title>
			<pubDate><![CDATA[Thu, 14 May 2026 09:25:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/webinar-how-modern-attack-paths-cross-code-pipelines-and-cloud/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/webinar-how-modern-attack-paths-cross-code-pipelines-and-cloud/]]></link>
			<title>[Webinar] How Modern Attack Paths Cross Code, Pipelines, and Cloud</title>
			<pubDate><![CDATA[Wed, 13 May 2026 11:52:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/most-remediation-programs-never-confirm-the-fix-actually-worked/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/most-remediation-programs-never-confirm-the-fix-actually-worked/]]></link>
			<title>Most Remediation Programs Never Confirm the Fix Actually Worked</title>
			<pubDate><![CDATA[Wed, 13 May 2026 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/microsoft-patches-138-vulnerabilities-including-dns-and-netlogon-rce-flaws/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/microsoft-patches-138-vulnerabilities-including-dns-and-netlogon-rce-flaws/]]></link>
			<title>Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws</title>
			<pubDate><![CDATA[Wed, 13 May 2026 10:36:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/rubygems-suspends-new-signups-after-hundreds-of-malicious-packages-are-uploaded/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/rubygems-suspends-new-signups-after-hundreds-of-malicious-packages-are-uploaded/]]></link>
			<title>RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded</title>
			<pubDate><![CDATA[Tue, 12 May 2026 14:47:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/new-trickmo-variant-uses-ton-c2-and-socks5-to-create-android-network-pivots/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/new-trickmo-variant-uses-ton-c2-and-socks5-to-create-android-network-pivots/]]></link>
			<title>New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots</title>
			<pubDate><![CDATA[Tue, 12 May 2026 12:50:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/webinar-what-the-riskiest-soc-alerts-go-unanswered-and-how-radiant-security-can-help/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/webinar-what-the-riskiest-soc-alerts-go-unanswered-and-how-radiant-security-can-help/]]></link>
			<title>Webinar: What the Riskiest SOC Alerts Go Unanswered &#8211; and How Radiant Security Can Help</title>
			<pubDate><![CDATA[Tue, 12 May 2026 11:58:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/mini-shai-hulud-worm-compromises-tanstack-mistral-ai-guardrails-ai-more-packages/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/mini-shai-hulud-worm-compromises-tanstack-mistral-ai-guardrails-ai-more-packages/]]></link>
			<title>Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI &amp; More Packages</title>
			<pubDate><![CDATA[Tue, 12 May 2026 11:46:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/why-agentic-ai-is-securitys-next-blind-spot/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/why-agentic-ai-is-securitys-next-blind-spot/]]></link>
			<title>Why Agentic AI Is Security&#8217;s Next Blind Spot</title>
			<pubDate><![CDATA[Tue, 12 May 2026 10:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/hackers-used-ai-to-develop-first-known-zero-day-2fa-bypass-for-mass-exploitation/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/hackers-used-ai-to-develop-first-known-zero-day-2fa-bypass-for-mass-exploitation/]]></link>
			<title>Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation</title>
			<pubDate><![CDATA[Mon, 11 May 2026 15:45:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/⚡-weekly-recap-linux-rootkit-macos-crypto-stealer-websocket-skimmers-and-more/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/⚡-weekly-recap-linux-rootkit-macos-crypto-stealer-websocket-skimmers-and-more/]]></link>
			<title>⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:36:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/your-purple-team-isnt-purple-its-just-red-and-blue-in-the-same-room/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/your-purple-team-isnt-purple-its-just-red-and-blue-in-the-same-room/]]></link>
			<title>Your Purple Team Isn&#8217;t Purple — It&#8217;s Just Red and Blue in the Same Room</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/four-openclaw-flaws-enable-data-theft-privilege-escalation-and-persistence/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/four-openclaw-flaws-enable-data-theft-privilege-escalation-and-persistence/]]></link>
			<title>Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence</title>
			<pubDate><![CDATA[Fri, 15 May 2026 13:35:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/fake-openai-privacy-filter-repo-hits-1-on-hugging-face-draws-244k-downloads/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/fake-openai-privacy-filter-repo-hits-1-on-hugging-face-draws-244k-downloads/]]></link>
			<title>Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads</title>
			<pubDate><![CDATA[Mon, 11 May 2026 07:05:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/what-45-days-of-watching-your-own-tools-will-tell-you-about-your-real-attack-surface/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/what-45-days-of-watching-your-own-tools-will-tell-you-about-your-real-attack-surface/]]></link>
			<title>What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface</title>
			<pubDate><![CDATA[Fri, 15 May 2026 11:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/tanstack-supply-chain-attack-hits-two-openai-employee-devices-forces-macos-updates/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/tanstack-supply-chain-attack-hits-two-openai-employee-devices-forces-macos-updates/]]></link>
			<title>TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates</title>
			<pubDate><![CDATA[Fri, 15 May 2026 10:54:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/on-prem-microsoft-exchange-server-cve-2026-42897-exploited-via-crafted-email/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/on-prem-microsoft-exchange-server-cve-2026-42897-exploited-via-crafted-email/]]></link>
			<title>On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email</title>
			<pubDate><![CDATA[Fri, 15 May 2026 06:19:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/tclbanker-banking-trojan-targets-financial-platforms-via-whatsapp-and-outlook-worms/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/tclbanker-banking-trojan-targets-financial-platforms-via-whatsapp-and-outlook-worms/]]></link>
			<title>TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms</title>
			<pubDate><![CDATA[Fri, 08 May 2026 18:12:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/fake-call-history-apps-stole-payments-from-users-after-7-3-million-play-store-downloads/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/fake-call-history-apps-stole-payments-from-users-after-7-3-million-play-store-downloads/]]></link>
			<title>Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads</title>
			<pubDate><![CDATA[Fri, 08 May 2026 15:08:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.nyroxis.fr/quasar-linux-rat-steals-developer-credentials-for-software-supply-chain-compromise/]]></guid>
			<link><![CDATA[https://www.nyroxis.fr/quasar-linux-rat-steals-developer-credentials-for-software-supply-chain-compromise/]]></link>
			<title>Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise</title>
			<pubDate><![CDATA[Fri, 08 May 2026 11:00:00 +0000]]></pubDate>
		</item>
				</channel>
</rss>
