<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity - Nyroxis – Cybersecurity &amp; Threat Monitoring</title>
	<atom:link href="https://nyroxis.fr/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://nyroxis.fr</link>
	<description>Smart, Real-Time Protection for Your Digital Life</description>
	<lastBuildDate>Sun, 05 Apr 2026 05:07:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://nyroxis.fr/wp-content/uploads/2025/08/cropped-site-icon-32x32.png</url>
	<title>Cybersecurity - Nyroxis – Cybersecurity &amp; Threat Monitoring</title>
	<link>https://nyroxis.fr</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</title>
		<link>https://nyroxis.fr/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants</link>
					<comments>https://nyroxis.fr/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Sun, 05 Apr 2026 05:07:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/database-NQBAyp-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/database-NQBAyp-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/database-NQBAyp-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/database-NQBAyp-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/database-NQBAyp-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to facilitate&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.fr/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants/">36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/database-NQBAyp-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/database-NQBAyp-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/database-NQBAyp-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/database-NQBAyp-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/database-NQBAyp-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to facilitate&hellip; <a href="https://thehackernews.com/2026/04/36-malicious-npm-packages-exploited.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.fr/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants/">36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.fr/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS</title>
		<link>https://nyroxis.fr/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems</link>
					<comments>https://nyroxis.fr/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Sun, 05 Apr 2026 04:32:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/fortinet-Piy2rR-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/fortinet-Piy2rR-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/fortinet-Piy2rR-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/fortinet-Piy2rR-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/fortinet-Piy2rR-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Fortinet has released out-of-band patches for a critical security flaw impacting FortiClient EMS that it said has been exploited in the wild. The vulnerability, tracked as CVE-2026-35616 (CVSS&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.fr/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems/">Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/fortinet-Piy2rR-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/fortinet-Piy2rR-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/fortinet-Piy2rR-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/fortinet-Piy2rR-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/fortinet-Piy2rR-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Fortinet has released out-of-band patches for a critical security flaw impacting FortiClient EMS that it said has been exploited in the wild. The vulnerability, tracked as CVE-2026-35616 (CVSS&hellip; <a href="https://thehackernews.com/2026/04/fortinet-patches-actively-exploited-cve.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.fr/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems/">Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.fr/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing</title>
		<link>https://nyroxis.fr/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing</link>
					<comments>https://nyroxis.fr/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 17:34:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.nyroxis.fr/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/chinese-hackers-1AbC3Y-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/chinese-hackers-1AbC3Y-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/chinese-hackers-1AbC3Y-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/chinese-hackers-1AbC3Y-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/chinese-hackers-1AbC3Y-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in the region. The campaign&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.fr/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing/">China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/chinese-hackers-1AbC3Y-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/chinese-hackers-1AbC3Y-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/chinese-hackers-1AbC3Y-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/chinese-hackers-1AbC3Y-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/chinese-hackers-1AbC3Y-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal targeting in the region. The campaign&hellip; <a href="https://thehackernews.com/2026/04/china-linked-ta416-targets-european.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.fr/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing/">China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.fr/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers</title>
		<link>https://nyroxis.fr/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers</link>
					<comments>https://nyroxis.fr/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 15:32:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.nyroxis.fr/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/php-linux-6jkP86-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/php-linux-6jkP86-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/php-linux-6jkP86-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/php-linux-6jkP86-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/php-linux-6jkP86-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.fr/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers/">Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/php-linux-6jkP86-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/php-linux-6jkP86-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/php-linux-6jkP86-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/php-linux-6jkP86-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/php-linux-6jkP86-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to&hellip; <a href="https://thehackernews.com/2026/04/microsoft-details-cookie-controlled-php.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.fr/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers/">Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.fr/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack</title>
		<link>https://nyroxis.fr/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack</link>
					<comments>https://nyroxis.fr/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 11:04:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/supplychain-aUr7Ld-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/supplychain-aUr7Ld-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/supplychain-aUr7Ld-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/supplychain-aUr7Ld-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/supplychain-aUr7Ld-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.fr/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/">UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/supplychain-aUr7Ld-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/supplychain-aUr7Ld-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/supplychain-aUr7Ld-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/supplychain-aUr7Ld-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/supplychain-aUr7Ld-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North&hellip; <a href="https://thehackernews.com/2026/04/unc1069-social-engineering-of-axios.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.fr/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/">UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.fr/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why Third-Party Risk Is the Biggest Gap in Your Clients&#8217; Security Posture</title>
		<link>https://nyroxis.fr/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture</link>
					<comments>https://nyroxis.fr/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 11:00:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/cynomi-kGbucY-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/cynomi-kGbucY-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/cynomi-kGbucY-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/cynomi-kGbucY-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/cynomi-kGbucY-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>The next major breach hitting your clients probably won&#8217;t come from inside their walls. It&#8217;ll come through a vendor they trust, a SaaS tool their finance team signed&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.fr/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/">Why Third-Party Risk Is the Biggest Gap in Your Clients’ Security Posture</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/cynomi-kGbucY-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/cynomi-kGbucY-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/cynomi-kGbucY-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/cynomi-kGbucY-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/cynomi-kGbucY-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>The next major breach hitting your clients probably won&#8217;t come from inside their walls. It&#8217;ll come through a vendor they trust, a SaaS tool their finance team signed&hellip; <a href="https://thehackernews.com/2026/04/why-third-party-risk-is-biggest-gap-in.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.fr/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/">Why Third-Party Risk Is the Biggest Gap in Your Clients’ Security Posture</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.fr/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images</title>
		<link>https://nyroxis.fr/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images</link>
					<comments>https://nyroxis.fr/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 09:10:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the trojan was&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.fr/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/">New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/mobile-wallet-seed-rloXdw-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the trojan was&hellip; <a href="https://thehackernews.com/2026/04/new-sparkcat-variant-in-ios-android.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.fr/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/">New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.fr/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK</title>
		<link>https://nyroxis.fr/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk</link>
					<comments>https://nyroxis.fr/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 08:35:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/drift-1-RFLIQf-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/drift-1-RFLIQf-150x150.png 150w, https://nyroxis.fr/wp-content/uploads/2026/04/drift-1-RFLIQf-400x400.png 400w, https://nyroxis.fr/wp-content/uploads/2026/04/drift-1-RFLIQf-300x300.png 300w, https://nyroxis.fr/wp-content/uploads/2026/04/drift-1-RFLIQf-100x100.png 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Solana-based decentralized exchange Drift has confirmed that attackers drained about $285 million from the platform during a security incident that took place on April 1, 2026.&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.fr/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/">Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/drift-1-RFLIQf-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/drift-1-RFLIQf-150x150.png 150w, https://nyroxis.fr/wp-content/uploads/2026/04/drift-1-RFLIQf-400x400.png 400w, https://nyroxis.fr/wp-content/uploads/2026/04/drift-1-RFLIQf-300x300.png 300w, https://nyroxis.fr/wp-content/uploads/2026/04/drift-1-RFLIQf-100x100.png 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Solana-based decentralized exchange Drift has confirmed that attackers drained about $285 million from the platform during a security incident that took place on April 1, 2026.&hellip; <a href="https://thehackernews.com/2026/04/drift-loses-285-million-in-durable.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.fr/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/">Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.fr/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials</title>
		<link>https://nyroxis.fr/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials</link>
					<comments>https://nyroxis.fr/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 19:30:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/nextjs-WpPUCp-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/nextjs-WpPUCp-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/nextjs-WpPUCp-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/nextjs-WpPUCp-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/nextjs-WpPUCp-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web Services (AWS)&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.fr/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/">Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/nextjs-WpPUCp-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/nextjs-WpPUCp-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/nextjs-WpPUCp-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/nextjs-WpPUCp-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/nextjs-WpPUCp-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web Services (AWS)&hellip; <a href="https://thehackernews.com/2026/04/hackers-exploit-cve-2025-55182-to.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.fr/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/">Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.fr/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise</title>
		<link>https://nyroxis.fr/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise</link>
					<comments>https://nyroxis.fr/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 15:21:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.fr/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/cisco-exploit-SowmJq-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/cisco-exploit-SowmJq-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/cisco-exploit-SowmJq-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/cisco-exploit-SowmJq-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/cisco-exploit-SowmJq-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Cisco has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated, remote attacker&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.fr/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/">Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.fr/wp-content/uploads/2026/04/cisco-exploit-SowmJq-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.fr/wp-content/uploads/2026/04/cisco-exploit-SowmJq-150x150.jpg 150w, https://nyroxis.fr/wp-content/uploads/2026/04/cisco-exploit-SowmJq-400x400.jpg 400w, https://nyroxis.fr/wp-content/uploads/2026/04/cisco-exploit-SowmJq-300x300.jpg 300w, https://nyroxis.fr/wp-content/uploads/2026/04/cisco-exploit-SowmJq-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Cisco has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated, remote attacker&hellip; <a href="https://thehackernews.com/2026/04/cisco-patches-98-cvss-imc-and-ssm-flaws.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.fr/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/">Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise</a> first appeared on <a href="https://nyroxis.fr">Nyroxis – Cybersecurity & Threat Monitoring</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.fr/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
