<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with polyshell]]></title><description><![CDATA[A list of topics that have been tagged with polyshell]]></description><link>https://board.circlewithadot.net/tags/polyshell</link><generator>RSS for Node</generator><lastBuildDate>Sat, 18 Apr 2026 02:28:30 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/polyshell.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[Si vous administrez un shop via magento ⚠️ Une faille critique vise les boutiques en ligne sous Magento et Adobe Commerce.]]></title><description><![CDATA["In the early hours of April 7th, nearly 100 Magento stores got mass-infected with a "double-tap" skimmer: a credit card stealer hidden inside an invisible SVG element. Sansec found stolen payment data flowing to six exfiltration domains, five of which are previously unknown. The likely entry vector is the PolyShell vulnerability that continues to affect unprotected Magento stores."[new IoCs inside]  https://sansec.io/research/svg-onload-magecart-skimmer#CyberVeille #magento]]></description><link>https://board.circlewithadot.net/topic/75e06e37-0d04-46ff-8e9e-19866ac3548b/si-vous-administrez-un-shop-via-magento-une-faille-critique-vise-les-boutiques-en-ligne-sous-magento-et-adobe-commerce.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/75e06e37-0d04-46ff-8e9e-19866ac3548b/si-vous-administrez-un-shop-via-magento-une-faille-critique-vise-les-boutiques-en-ligne-sous-magento-et-adobe-commerce.</guid><dc:creator><![CDATA[decio@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>