<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 11:45 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://nyroxis.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Nyroxis – Cybersecurity &amp; Threat Monitoring</title>
		<link><![CDATA[https://nyroxis.com]]></link>
		<description><![CDATA[Nyroxis – Cybersecurity &amp; Threat Monitoring]]></description>
		<lastBuildDate><![CDATA[Tue, 24 Mar 2026 11:37:00 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://nyroxis.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://nyroxis.com/5-learnings-from-the-first-ever-gartner-market-guide-for-guardian-agents/]]></guid>
			<link><![CDATA[https://nyroxis.com/5-learnings-from-the-first-ever-gartner-market-guide-for-guardian-agents/]]></link>
			<title>5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 11:37:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/blog/]]></guid>
			<link><![CDATA[https://nyroxis.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Sat, 04 Sep 2021 13:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/]]></guid>
			<link><![CDATA[https://nyroxis.com/]]></link>
			<title>nyroxis home</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 20:44:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypass/]]></guid>
			<link><![CDATA[https://nyroxis.com/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypass/]]></link>
			<title>Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 14:10:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/]]></guid>
			<link><![CDATA[https://nyroxis.com/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/]]></link>
			<title>Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 19:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/]]></guid>
			<link><![CDATA[https://nyroxis.com/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/]]></link>
			<title>Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 15:21:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories/]]></guid>
			<link><![CDATA[https://nyroxis.com/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories/]]></link>
			<title>ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion &amp; 10 More Stories</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:45:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners/]]></guid>
			<link><![CDATA[https://nyroxis.com/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners/]]></link>
			<title>Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 11:42:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/the-state-of-trusted-open-source-report/]]></guid>
			<link><![CDATA[https://nyroxis.com/the-state-of-trusted-open-source-report/]]></link>
			<title>The State of Trusted Open Source Report</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action/]]></guid>
			<link><![CDATA[https://nyroxis.com/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action/]]></link>
			<title>WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 09:51:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/]]></guid>
			<link><![CDATA[https://nyroxis.com/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/]]></link>
			<title>UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 11:04:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/]]></guid>
			<link><![CDATA[https://nyroxis.com/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/]]></link>
			<title>Why Third-Party Risk Is the Biggest Gap in Your Clients&#8217; Security Posture</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 11:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/]]></guid>
			<link><![CDATA[https://nyroxis.com/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/]]></link>
			<title>New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:10:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/]]></guid>
			<link><![CDATA[https://nyroxis.com/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/]]></link>
			<title>Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:35:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/block-the-prompt-not-the-work-the-end-of-doctor-no/]]></guid>
			<link><![CDATA[https://nyroxis.com/block-the-prompt-not-the-work-the-end-of-doctor-no/]]></link>
			<title>Block the Prompt, Not the Work: The End of &#8220;Doctor No&#8221;</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 12:46:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/casbaneiro-phishing-targets-latin-america-and-europe-using-dynamic-pdf-lures/]]></guid>
			<link><![CDATA[https://nyroxis.com/casbaneiro-phishing-targets-latin-america-and-europe-using-dynamic-pdf-lures/]]></link>
			<title>Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 12:36:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/new-chrome-zero-day-cve-2026-5281-under-active-exploitation-patch-released/]]></guid>
			<link><![CDATA[https://nyroxis.com/new-chrome-zero-day-cve-2026-5281-under-active-exploitation-patch-released/]]></link>
			<title>New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 11:42:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/3-reasons-attackers-are-using-your-trusted-tools-against-you-and-why-you-dont-see-it-coming/]]></guid>
			<link><![CDATA[https://nyroxis.com/3-reasons-attackers-are-using-your-trusted-tools-against-you-and-why-you-dont-see-it-coming/]]></link>
			<title>3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 10:58:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-networks/]]></guid>
			<link><![CDATA[https://nyroxis.com/trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-networks/]]></link>
			<title>TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 16:03:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/vertex-ai-vulnerability-exposes-google-cloud-data-and-private-artifacts/]]></guid>
			<link><![CDATA[https://nyroxis.com/vertex-ai-vulnerability-exposes-google-cloud-data-and-private-artifacts/]]></link>
			<title>Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 13:09:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priority/]]></guid>
			<link><![CDATA[https://nyroxis.com/the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priority/]]></link>
			<title>The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 11:50:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/silver-fox-expands-asia-cyber-campaign-with-atlascross-rat-and-fake-domains/]]></guid>
			<link><![CDATA[https://nyroxis.com/silver-fox-expands-asia-cyber-campaign-with-atlascross-rat-and-fake-domains/]]></link>
			<title>Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 11:46:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/axios-supply-chain-attack-pushes-cross-platform-rat-via-compromised-npm-account/]]></guid>
			<link><![CDATA[https://nyroxis.com/axios-supply-chain-attack-pushes-cross-platform-rat-via-compromised-npm-account/]]></link>
			<title>Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 06:08:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/⚡-weekly-recap-telecom-sleeper-cells-llm-jailbreaks-apple-forces-u-k-age-checks-and-more/]]></guid>
			<link><![CDATA[https://nyroxis.com/⚡-weekly-recap-telecom-sleeper-cells-llm-jailbreaks-apple-forces-u-k-age-checks-and-more/]]></link>
			<title>⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 13:56:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/3-soc-process-fixes-that-unlock-tier-1-productivity/]]></guid>
			<link><![CDATA[https://nyroxis.com/3-soc-process-fixes-that-unlock-tier-1-productivity/]]></link>
			<title>3 SOC Process Fixes That Unlock Tier 1 Productivity</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/russian-ctrl-toolkit-delivered-via-malicious-lnk-files-hijacks-rdp-via-frp-tunnels/]]></guid>
			<link><![CDATA[https://nyroxis.com/russian-ctrl-toolkit-delivered-via-malicious-lnk-files-hijacks-rdp-via-frp-tunnels/]]></link>
			<title>Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 12:18:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/the-state-of-secrets-sprawl-2026-9-takeaways-for-cisos/]]></guid>
			<link><![CDATA[https://nyroxis.com/the-state-of-secrets-sprawl-2026-9-takeaways-for-cisos/]]></link>
			<title>The State of Secrets Sprawl 2026: 9 Takeaways for CISOs</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/citrix-netscaler-under-active-recon-for-cve-2026-3055-cvss-9-3-memory-overread-bug/]]></guid>
			<link><![CDATA[https://nyroxis.com/citrix-netscaler-under-active-recon-for-cve-2026-3055-cvss-9-3-memory-overread-bug/]]></link>
			<title>Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 09:11:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation/]]></guid>
			<link><![CDATA[https://nyroxis.com/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation/]]></link>
			<title>CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 07:07:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/ta446-deploys-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign/]]></guid>
			<link><![CDATA[https://nyroxis.com/ta446-deploys-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign/]]></link>
			<title>TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 07:07:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/apple-sends-lock-screen-alerts-to-outdated-iphones-over-active-web-based-exploits/]]></guid>
			<link><![CDATA[https://nyroxis.com/apple-sends-lock-screen-alerts-to-outdated-iphones-over-active-web-based-exploits/]]></link>
			<title>Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 17:22:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks/]]></guid>
			<link><![CDATA[https://nyroxis.com/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks/]]></link>
			<title>Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 13:57:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/aitm-phishing-targets-tiktok-business-accounts-using-cloudflare-turnstile-evasion/]]></guid>
			<link><![CDATA[https://nyroxis.com/aitm-phishing-targets-tiktok-business-accounts-using-cloudflare-turnstile-evasion/]]></link>
			<title>AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 12:03:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/we-are-at-war/]]></guid>
			<link><![CDATA[https://nyroxis.com/we-are-at-war/]]></link>
			<title>We Are At War</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 11:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/glassworm-malware-uses-solana-dead-drops-to-deliver-rat-and-steal-browser-crypto-data/]]></guid>
			<link><![CDATA[https://nyroxis.com/glassworm-malware-uses-solana-dead-drops-to-deliver-rat-and-steal-browser-crypto-data/]]></link>
			<title>GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 14:26:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/bearlyfy-hits-russian-firms-with-custom-genielocker-ransomware/]]></guid>
			<link><![CDATA[https://nyroxis.com/bearlyfy-hits-russian-firms-with-custom-genielocker-ransomware/]]></link>
			<title>Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 10:04:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/the-kill-chain-is-obsolete-when-your-ai-agent-is-the-threat/]]></guid>
			<link><![CDATA[https://nyroxis.com/the-kill-chain-is-obsolete-when-your-ai-agent-is-the-threat/]]></link>
			<title>The Kill Chain Is Obsolete When Your AI Agent Is the Threat</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 11:58:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks/]]></guid>
			<link><![CDATA[https://nyroxis.com/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks/]]></link>
			<title>LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 08:07:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website/]]></guid>
			<link><![CDATA[https://nyroxis.com/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website/]]></link>
			<title>Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 13:11:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/russian-hacker-sentenced-to-2-years-for-ta551-botnet-driven-ransomware-attacks/]]></guid>
			<link><![CDATA[https://nyroxis.com/russian-hacker-sentenced-to-2-years-for-ta551-botnet-driven-ransomware-attacks/]]></link>
			<title>Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 11:52:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/masters-of-imitation-how-hackers-and-art-forgers-perfect-the-art-of-deception/]]></guid>
			<link><![CDATA[https://nyroxis.com/masters-of-imitation-how-hackers-and-art-forgers-perfect-the-art-of-deception/]]></link>
			<title>Masters of Imitation: How Hackers and Art Forgers Perfect the Art of Deception</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 11:58:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more-stories/]]></guid>
			<link><![CDATA[https://nyroxis.com/threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more-stories/]]></link>
			<title>ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits &amp; 20 More Stories</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 11:45:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/coruna-ios-kit-reuses-2023-triangulation-exploit-code-in-new-mass-attacks/]]></guid>
			<link><![CDATA[https://nyroxis.com/coruna-ios-kit-reuses-2023-triangulation-exploit-code-in-new-mass-attacks/]]></link>
			<title>Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 11:07:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-attack/]]></guid>
			<link><![CDATA[https://nyroxis.com/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-attack/]]></link>
			<title>Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 15:40:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/device-code-phishing-hits-340-microsoft-365-orgs-across-five-countries-via-oauth-abuse/]]></guid>
			<link><![CDATA[https://nyroxis.com/device-code-phishing-hits-340-microsoft-365-orgs-across-five-countries-via-oauth-abuse/]]></link>
			<title>Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 11:34:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/fcc-bans-new-foreign-made-routers-over-supply-chain-and-cyber-risk-concerns/]]></guid>
			<link><![CDATA[https://nyroxis.com/fcc-bans-new-foreign-made-routers-over-supply-chain-and-cyber-risk-concerns/]]></link>
			<title>FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 07:11:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks/]]></guid>
			<link><![CDATA[https://nyroxis.com/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks/]]></link>
			<title>[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 13:12:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/ghost-campaign-uses-7-npm-packages-to-steal-crypto-wallets-and-credentials/]]></guid>
			<link><![CDATA[https://nyroxis.com/ghost-campaign-uses-7-npm-packages-to-steal-crypto-wallets-and-credentials/]]></link>
			<title>Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 12:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/product/nyroxis-free-trial-30-days/]]></guid>
			<link><![CDATA[https://nyroxis.com/product/nyroxis-free-trial-30-days/]]></link>
			<title>Nyroxis – Free Trial (30 Days)</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:52:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyroxis.com/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-campaign/]]></guid>
			<link><![CDATA[https://nyroxis.com/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-campaign/]]></link>
			<title>Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 07:00:00 +0000]]></pubDate>
		</item>
				</channel>
</rss>
