<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity - Nyroxis – Personal Endpoint Security</title>
	<atom:link href="https://www.nyroxis.fr/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.nyroxis.fr</link>
	<description>Where Enterprise Security Cannot Reach, Nyroxis Begins.</description>
	<lastBuildDate>Thu, 16 Apr 2026 13:05:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.nyroxis.fr/wp-content/uploads/2025/08/cropped-site-icon-32x32.png</url>
	<title>Cybersecurity - Nyroxis – Personal Endpoint Security</title>
	<link>https://www.nyroxis.fr</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories</title>
		<link>https://www.nyroxis.fr/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories</link>
					<comments>https://www.nyroxis.fr/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 13:05:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/bull-main-kuWCF4-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/bull-main-kuWCF4-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/bull-main-kuWCF4-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/bull-main-kuWCF4-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/bull-main-kuWCF4-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>You know that feeling when you open your feed on a Thursday morning and it&#8217;s just&#8230; a lot? Yeah. This week delivered. We&#8217;ve got hackers getting creative in&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://www.nyroxis.fr/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/">ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/bull-main-kuWCF4-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/bull-main-kuWCF4-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/bull-main-kuWCF4-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/bull-main-kuWCF4-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/bull-main-kuWCF4-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>You know that feeling when you open your feed on a Thursday morning and it&#8217;s just&#8230; a lot? Yeah. This week delivered. We&#8217;ve got hackers getting creative in&hellip; <a href="https://thehackernews.com/2026/04/threatsday-bulletin-17-year-old-excel.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://www.nyroxis.fr/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/">ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.nyroxis.fr/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment</title>
		<link>https://www.nyroxis.fr/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment</link>
					<comments>https://www.nyroxis.fr/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 11:55:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/ghost-9vOIrm-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/ghost-9vOIrm-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/ghost-9vOIrm-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/ghost-9vOIrm-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/ghost-9vOIrm-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://www.nyroxis.fr/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment/">[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/ghost-9vOIrm-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/ghost-9vOIrm-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/ghost-9vOIrm-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/ghost-9vOIrm-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/ghost-9vOIrm-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud breaches. Not phishing. Not weak passwords. Unmanaged non-human identities that nobody was watching. For&hellip; <a href="https://thehackernews.com/2026/04/webinar-find-and-eliminate-orphaned-non.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://www.nyroxis.fr/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment/">[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.nyroxis.fr/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution</title>
		<link>https://www.nyroxis.fr/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution</link>
					<comments>https://www.nyroxis.fr/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 11:27:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://www.nyroxis.fr/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/">Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/cisco-flaws-PuOtDM-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow&hellip; <a href="https://thehackernews.com/2026/04/cisco-patches-four-critical-identity.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://www.nyroxis.fr/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/">Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.nyroxis.fr/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu</title>
		<link>https://www.nyroxis.fr/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu</link>
					<comments>https://www.nyroxis.fr/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 10:30:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/reflectiz-Qu7iKp-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/reflectiz-Qu7iKp-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/reflectiz-Qu7iKp-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/reflectiz-Qu7iKp-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/reflectiz-Qu7iKp-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A bank approved a Taboola pixel. That pixel quietly redirected logged-in users to a Temu tracking endpoint. This occurred without the bank’s knowledge, without user consent, and without&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://www.nyroxis.fr/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu/">Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/reflectiz-Qu7iKp-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/reflectiz-Qu7iKp-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/reflectiz-Qu7iKp-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/reflectiz-Qu7iKp-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/reflectiz-Qu7iKp-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A bank approved a Taboola pixel. That pixel quietly redirected logged-in users to a Temu tracking endpoint. This occurred without the bank’s knowledge, without user consent, and without&hellip; <a href="https://thehackernews.com/2026/04/hidden-passenger-how-taboola-routes.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://www.nyroxis.fr/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu/">Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.nyroxis.fr/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks</title>
		<link>https://www.nyroxis.fr/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks</link>
					<comments>https://www.nyroxis.fr/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 10:20:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/el-C22pw0-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/el-C22pw0-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/el-C22pw0-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/el-C22pw0-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/el-C22pw0-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A &#8220;novel&#8221; social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://www.nyroxis.fr/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/">Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/el-C22pw0-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/el-C22pw0-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/el-C22pw0-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/el-C22pw0-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/el-C22pw0-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A &#8220;novel&#8221; social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows&hellip; <a href="https://thehackernews.com/2026/04/obsidian-plugin-abuse-delivers.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://www.nyroxis.fr/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/">Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.nyroxis.fr/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover</title>
		<link>https://www.nyroxis.fr/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover</link>
					<comments>https://www.nyroxis.fr/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 12:56:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/nui-B92Jdy-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/nui-B92Jdy-150x150.png 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/nui-B92Jdy-400x400.png 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/nui-B92Jdy-300x300.png 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/nui-B92Jdy-100x100.png 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A recently disclosed critical security flaw impacting nginx-ui, an open-source, web-based Nginx management tool, has come under active exploitation in the wild. The vulnerability in question&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://www.nyroxis.fr/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover/">Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/nui-B92Jdy-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/nui-B92Jdy-150x150.png 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/nui-B92Jdy-400x400.png 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/nui-B92Jdy-300x300.png 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/nui-B92Jdy-100x100.png 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A recently disclosed critical security flaw impacting nginx-ui, an open-source, web-based Nginx management tool, has come under active exploitation in the wild. The vulnerability in question&hellip; <a href="https://thehackernews.com/2026/04/critical-nginx-ui-vulnerability-cve.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://www.nyroxis.fr/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover/">Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.nyroxis.fr/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More</title>
		<link>https://www.nyroxis.fr/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more</link>
					<comments>https://www.nyroxis.fr/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 12:37:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/patches-pm84c3-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/patches-pm84c3-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/patches-pm84c3-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/patches-pm84c3-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/patches-pm84c3-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A number of critical vulnerabilities impacting products from Adobe, Fortinet, Microsoft, and SAP have taken center stage in April&#8217;s Patch Tuesday releases. Topping the list is an&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://www.nyroxis.fr/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more/">April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/patches-pm84c3-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/patches-pm84c3-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/patches-pm84c3-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/patches-pm84c3-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/patches-pm84c3-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>A number of critical vulnerabilities impacting products from Adobe, Fortinet, Microsoft, and SAP have taken center stage in April&#8217;s Patch Tuesday releases. Topping the list is an&hellip; <a href="https://thehackernews.com/2026/04/april-patch-tuesday-fixes-critical.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://www.nyroxis.fr/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more/">April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.nyroxis.fr/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Deterministic + Agentic AI: The Architecture Exposure Validation Requires</title>
		<link>https://www.nyroxis.fr/deterministic-agentic-ai-the-architecture-exposure-validation-requires/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=deterministic-agentic-ai-the-architecture-exposure-validation-requires</link>
					<comments>https://www.nyroxis.fr/deterministic-agentic-ai-the-architecture-exposure-validation-requires/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 11:30:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/deterministic-agentic-ai-the-architecture-exposure-validation-requires/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/validation-main-y8PWuh-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/validation-main-y8PWuh-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/validation-main-y8PWuh-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/validation-main-y8PWuh-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Few technologies have moved from experimentation to boardroom mandate as quickly as AI. Across industries, leadership teams have embraced its broader potential, and boards, investors, and&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://www.nyroxis.fr/deterministic-agentic-ai-the-architecture-exposure-validation-requires/">Deterministic + Agentic AI: The Architecture Exposure Validation Requires</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/validation-main-y8PWuh-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/validation-main-y8PWuh-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/validation-main-y8PWuh-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/validation-main-y8PWuh-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Few technologies have moved from experimentation to boardroom mandate as quickly as AI. Across industries, leadership teams have embraced its broader potential, and boards, investors, and&hellip; <a href="https://thehackernews.com/2026/04/deterministic-agentic-ai-architecture.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://www.nyroxis.fr/deterministic-agentic-ai-the-architecture-exposure-validation-requires/">Deterministic + Agentic AI: The Architecture Exposure Validation Requires</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.nyroxis.fr/deterministic-agentic-ai-the-architecture-exposure-validation-requires/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities</title>
		<link>https://www.nyroxis.fr/microsoft-issues-patches-for-sharepoint-zero-day-and-168-other-new-vulnerabilities/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=microsoft-issues-patches-for-sharepoint-zero-day-and-168-other-new-vulnerabilities</link>
					<comments>https://www.nyroxis.fr/microsoft-issues-patches-for-sharepoint-zero-day-and-168-other-new-vulnerabilities/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 08:40:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/microsoft-issues-patches-for-sharepoint-zero-day-and-168-other-new-vulnerabilities/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/windows-update-rhuC2k-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/windows-update-rhuC2k-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/windows-update-rhuC2k-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/windows-update-rhuC2k-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/windows-update-rhuC2k-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Microsoft on Tuesday released updates to address a record 169 security flaws across its product portfolio, including one vulnerability that has been actively exploited in the wild. Of these 169&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://www.nyroxis.fr/microsoft-issues-patches-for-sharepoint-zero-day-and-168-other-new-vulnerabilities/">Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/windows-update-rhuC2k-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/windows-update-rhuC2k-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/windows-update-rhuC2k-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/windows-update-rhuC2k-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/windows-update-rhuC2k-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>Microsoft on Tuesday released updates to address a record 169 security flaws across its product portfolio, including one vulnerability that has been actively exploited in the wild. Of these 169&hellip; <a href="https://thehackernews.com/2026/04/microsoft-issues-patches-for-sharepoint.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://www.nyroxis.fr/microsoft-issues-patches-for-sharepoint-zero-day-and-168-other-new-vulnerabilities/">Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.nyroxis.fr/microsoft-issues-patches-for-sharepoint-zero-day-and-168-other-new-vulnerabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams</title>
		<link>https://www.nyroxis.fr/openai-launches-gpt-5-4-cyber-with-expanded-access-for-security-teams/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=openai-launches-gpt-5-4-cyber-with-expanded-access-for-security-teams</link>
					<comments>https://www.nyroxis.fr/openai-launches-gpt-5-4-cyber-with-expanded-access-for-security-teams/#respond</comments>
		
		<dc:creator><![CDATA[nyadmin]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 04:30:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity News]]></category>
		<category><![CDATA[Technician]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://nyroxis.com/openai-launches-gpt-5-4-cyber-with-expanded-access-for-security-teams/</guid>

					<description><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/gpt-UDrqSW-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/gpt-UDrqSW-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/gpt-UDrqSW-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/gpt-UDrqSW-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/gpt-UDrqSW-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>OpenAI on Tuesday unveiled GPT-5.4-Cyber, a variant of its latest flagship model, GPT‑5.4, that&#8217;s specifically optimized for defensive cybersecurity use cases, days after rival Anthropic unveiled its&#8230; Read MoreThe Hacker News</p>
<p>The post <a href="https://www.nyroxis.fr/openai-launches-gpt-5-4-cyber-with-expanded-access-for-security-teams/">OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></description>
										<content:encoded><![CDATA[<img width="150" height="150" src="https://www.nyroxis.fr/wp-content/uploads/2026/04/gpt-UDrqSW-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://www.nyroxis.fr/wp-content/uploads/2026/04/gpt-UDrqSW-150x150.jpg 150w, https://www.nyroxis.fr/wp-content/uploads/2026/04/gpt-UDrqSW-400x400.jpg 400w, https://www.nyroxis.fr/wp-content/uploads/2026/04/gpt-UDrqSW-300x300.jpg 300w, https://www.nyroxis.fr/wp-content/uploads/2026/04/gpt-UDrqSW-100x100.jpg 100w" sizes="(max-width: 150px) 100vw, 150px" /><p>OpenAI on Tuesday unveiled GPT-5.4-Cyber, a variant of its latest flagship model, GPT‑5.4, that&#8217;s specifically optimized for defensive cybersecurity use cases, days after rival Anthropic unveiled its&hellip; <a href="https://thehackernews.com/2026/04/openai-launches-gpt-54-cyber-with.html" target="_blank" class="feedzy-rss-link-icon">Read More</a>The Hacker News</p><p>The post <a href="https://www.nyroxis.fr/openai-launches-gpt-5-4-cyber-with-expanded-access-for-security-teams/">OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams</a> first appeared on <a href="https://www.nyroxis.fr">Nyroxis – Personal Endpoint Security</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.nyroxis.fr/openai-launches-gpt-5-4-cyber-with-expanded-access-for-security-teams/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
