<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Technician - Nyroxis – Personal Endpoint Security</title>
	<atom:link href="https://nyroxis.com/category/technician/feed/" rel="self" type="application/rss+xml" />
	<link>https://nyroxis.com</link>
	<description>Where Enterprise Security Cannot Reach, Nyroxis Begins.</description>
	<lastBuildDate>Fri, 17 Apr 2026 13:21:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://nyroxis.com/wp-content/uploads/2025/08/cropped-site-icon-32x32.png</url>
	<title>Technician - Nyroxis – Personal Endpoint Security</title>
	<link>https://nyroxis.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched</title>
		<link>https://nyroxis.com/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched</link>
					<comments>https://nyroxis.com/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 13:21:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.nyroxis.fr/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/defender-1AG1iS-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/defender-1AG1iS-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/defender-1AG1iS-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/defender-1AG1iS-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/defender-1AG1iS-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched/">Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/defender-1AG1iS-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/defender-1AG1iS-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/defender-1AG1iS-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/defender-1AG1iS-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/defender-1AG1iS-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity&hellip; <a href="https://thehackernews.com/2026/04/three-microsoft-defender-zero-days.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched/">Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul</title>
		<link>https://nyroxis.com/google-blocks-8-3b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=google-blocks-8-3b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul</link>
					<comments>https://nyroxis.com/google-blocks-8-3b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 10:47:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.nyroxis.fr/google-blocks-8-3b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/google-ads-android-KJ2Gpg-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/google-ads-android-KJ2Gpg-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/google-ads-android-KJ2Gpg-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/google-ads-android-KJ2Gpg-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/google-ads-android-KJ2Gpg-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/google-blocks-8-3b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul/">Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/google-ads-android-KJ2Gpg-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/google-ads-android-KJ2Gpg-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/google-ads-android-KJ2Gpg-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/google-ads-android-KJ2Gpg-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/google-ads-android-KJ2Gpg-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it&hellip; <a href="https://thehackernews.com/2026/04/google-blocks-83b-policy-violating-ads.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/google-blocks-8-3b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul/">Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/google-blocks-8-3b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions</title>
		<link>https://nyroxis.com/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions</link>
					<comments>https://nyroxis.com/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 07:14:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.nyroxis.fr/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/nist-cve-iJUSTV-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/nist-cve-iJUSTV-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/nist-cve-iJUSTV-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/nist-cve-iJUSTV-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/nist-cve-iJUSTV-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions/">NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/nist-cve-iJUSTV-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/nist-cve-iJUSTV-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/nist-cve-iJUSTV-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/nist-cve-iJUSTV-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/nist-cve-iJUSTV-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity vulnerabilities and exposures (CVEs) listed in its National&hellip; <a href="https://thehackernews.com/2026/04/nist-limits-cve-enrichment-after-263.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions/">NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts</title>
		<link>https://nyroxis.com/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts</link>
					<comments>https://nyroxis.com/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 05:46:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.nyroxis.fr/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/europol-Tv5L5x-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/europol-Tv5L5x-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/europol-Tv5L5x-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/europol-Tv5L5x-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/europol-Tv5L5x-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts/">Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/europol-Tv5L5x-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/europol-Tv5L5x-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/europol-Tv5L5x-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/europol-Tv5L5x-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/europol-Tv5L5x-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denial-of-service (DDoS) operations that were used&hellip; <a href="https://thehackernews.com/2026/04/operation-poweroff-seizes-53-ddos.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts/">Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation</title>
		<link>https://nyroxis.com/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation</link>
					<comments>https://nyroxis.com/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 03:22:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.nyroxis.fr/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/apachemq-HhWyA9-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/apachemq-HhWyA9-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/apachemq-HhWyA9-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/apachemq-HhWyA9-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/apachemq-HhWyA9-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA).&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation/">Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/apachemq-HhWyA9-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/apachemq-HhWyA9-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/apachemq-HhWyA9-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/apachemq-HhWyA9-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/apachemq-HhWyA9-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA).&hellip; <a href="https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation/">Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories</title>
		<link>https://nyroxis.com/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories</link>
					<comments>https://nyroxis.com/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 13:05:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/bull-main-kuWCF4-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/bull-main-kuWCF4-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/bull-main-kuWCF4-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/bull-main-kuWCF4-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/bull-main-kuWCF4-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>You know that feeling when you open your feed on a Thursday morning and it&#8217;s just&#8230; a lot? Yeah. This week delivered. We&#8217;ve got hackers getting creative in&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/">ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/bull-main-kuWCF4-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/bull-main-kuWCF4-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/bull-main-kuWCF4-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/bull-main-kuWCF4-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/bull-main-kuWCF4-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>You know that feeling when you open your feed on a Thursday morning and it&#8217;s just&#8230; a lot? Yeah. This week delivered. We&#8217;ve got hackers getting creative in&hellip; <a href="https://thehackernews.com/2026/04/threatsday-bulletin-17-year-old-excel.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/">ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment</title>
		<link>https://nyroxis.com/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment</link>
					<comments>https://nyroxis.com/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 11:55:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/ghost-9vOIrm-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/ghost-9vOIrm-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/ghost-9vOIrm-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/ghost-9vOIrm-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/ghost-9vOIrm-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment/">[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/ghost-9vOIrm-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/ghost-9vOIrm-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/ghost-9vOIrm-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/ghost-9vOIrm-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/ghost-9vOIrm-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For&hellip; <a href="https://thehackernews.com/2026/04/webinar-find-and-eliminate-orphaned-non.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment/">[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution</title>
		<link>https://nyroxis.com/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution</link>
					<comments>https://nyroxis.com/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 11:27:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/">Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow&hellip; <a href="https://thehackernews.com/2026/04/cisco-patches-four-critical-identity.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/">Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu</title>
		<link>https://nyroxis.com/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu</link>
					<comments>https://nyroxis.com/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 10:30:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/reflectiz-Qu7iKp-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/reflectiz-Qu7iKp-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/reflectiz-Qu7iKp-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/reflectiz-Qu7iKp-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/reflectiz-Qu7iKp-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A bank approved a Taboola pixel. That pixel quietly redirected logged-in users to a Temu tracking endpoint. This occurred without the bank’s knowledge, without user consent, and without&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu/">Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/reflectiz-Qu7iKp-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/reflectiz-Qu7iKp-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/reflectiz-Qu7iKp-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/reflectiz-Qu7iKp-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/reflectiz-Qu7iKp-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A bank approved a Taboola pixel. That pixel quietly redirected logged-in users to a Temu tracking endpoint. This occurred without the bank’s knowledge, without user consent, and without&hellip; <a href="https://thehackernews.com/2026/04/hidden-passenger-how-taboola-routes.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu/">Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks</title>
		<link>https://nyroxis.com/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks</link>
					<comments>https://nyroxis.com/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 10:20:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/el-C22pw0-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/el-C22pw0-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/el-C22pw0-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/el-C22pw0-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/el-C22pw0-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A &#8220;novel&#8221; social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://nyroxis.com/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/">Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://nyroxis.com/wp-content/uploads/2026/04/el-C22pw0-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://nyroxis.com/wp-content/uploads/2026/04/el-C22pw0-150x150.jpg 150w, https://nyroxis.com/wp-content/uploads/2026/04/el-C22pw0-400x400.jpg 400w, https://nyroxis.com/wp-content/uploads/2026/04/el-C22pw0-300x300.jpg 300w, https://nyroxis.com/wp-content/uploads/2026/04/el-C22pw0-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A &#8220;novel&#8221; social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows&hellip; <a href="https://thehackernews.com/2026/04/obsidian-plugin-abuse-delivers.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://nyroxis.com/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/">Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks</a> first appeared on <a href="https://nyroxis.com">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://nyroxis.com/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
