<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 7, 2026 at 22:46 by All in One SEO v4.8.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cryptika.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cryptika Cybersecurity</title>
		<link><![CDATA[https://www.cryptika.com]]></link>
		<description><![CDATA[Cryptika Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Tue, 07 Apr 2026 18:40:53 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cryptika.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-exploit-next-js-react2shell-flaw-to-steal-credentials-from-766-hosts-in-24-hours/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-exploit-next-js-react2shell-flaw-to-steal-credentials-from-766-hosts-in-24-hours/]]></link>
			<title>Hackers Exploit Next.js React2Shell Flaw to Steal Credentials From 766 Hosts in 24 Hours</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 18:40:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-clickfix-lure-to-drop-node-js-based-windows-rat-with-tor-powered-c2/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-clickfix-lure-to-drop-node-js-based-windows-rat-with-tor-powered-c2/]]></link>
			<title>Hackers Use ClickFix Lure to Drop Node.js-Based Windows RAT With Tor-Powered C2</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 17:14:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/russia-hacked-routers-to-steal-microsoft-office-tokens/]]></guid>
			<link><![CDATA[https://www.cryptika.com/russia-hacked-routers-to-steal-microsoft-office-tokens/]]></link>
			<title>Russia Hacked Routers to Steal Microsoft Office Tokens</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 17:02:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/russian-hackers-exploiting-home-and-small-office-routers-in-massive-dns-hijacking-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/russian-hackers-exploiting-home-and-small-office-routers-in-massive-dns-hijacking-attack/]]></link>
			<title>Russian Hackers Exploiting Home and Small-office Routers in Massive DNS hijacking Attack</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 16:36:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fake-software-installers-used-to-drop-rats-and-monero-miners-in-long-running-malware-campaign/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fake-software-installers-used-to-drop-rats-and-monero-miners-in-long-running-malware-campaign/]]></link>
			<title>Fake Software Installers Used to Drop RATs and Monero Miners in Long-Running Malware Campaign</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 14:55:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-gpubreach-attack-enables-system-wide-compromise-up-to-a-root-shell/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-gpubreach-attack-enables-system-wide-compromise-up-to-a-root-shell/]]></link>
			<title>New GPUBreach Attack Enables System-Wide Compromise Up to a Root Shell</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 13:01:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/from-alert-overload-to-rapid-response-why-threat-intelligence-is-a-top-solution-for-fast-mttr/]]></guid>
			<link><![CDATA[https://www.cryptika.com/from-alert-overload-to-rapid-response-why-threat-intelligence-is-a-top-solution-for-fast-mttr/]]></link>
			<title>From Alert Overload to Rapid Response: Why Threat Intelligence Is a Top Solution for Fast MTTR </title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:51:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-android-zero-interaction-vulnerability-enables-dos-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-android-zero-interaction-vulnerability-enables-dos-attacks/]]></link>
			<title>Critical Android “Zero-Interaction” Vulnerability Enables DoS Attacks</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:49:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/iran-linked-hackers-launch-password-spray-campaign-against-microsoft-365-tenants-in-middle-east/]]></guid>
			<link><![CDATA[https://www.cryptika.com/iran-linked-hackers-launch-password-spray-campaign-against-microsoft-365-tenants-in-middle-east/]]></link>
			<title>Iran-Linked Hackers Launch Password Spray Campaign Against Microsoft 365 Tenants in Middle East</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 10:33:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-releases-new-defender-update-for-windows-11-10-and-server-installation-images/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-releases-new-defender-update-for-windows-11-10-and-server-installation-images/]]></link>
			<title>Microsoft Releases New Defender Update for Windows 11, 10, and Server Installation Images</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 08:50:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-warns-storm-1175-exploits-web-facing-assets-0-day-flaws-in-medusa-ransomware-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-warns-storm-1175-exploits-web-facing-assets-0-day-flaws-in-medusa-ransomware-attacks/]]></link>
			<title>Microsoft Warns Storm-1175 Exploits Web-Facing Assets 0-Day Flaws in Medusa Ransomware Attacks</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 07:49:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/blog/]]></guid>
			<link><![CDATA[https://www.cryptika.com/blog/]]></link>
			<title>Cybersecurity Blog</title>
			<pubDate><![CDATA[Sun, 05 Jun 2022 13:24:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/50000-wordpress-sites-exposed-to-critical-ninja-forms-file-upload-rce-vulnerability/]]></guid>
			<link><![CDATA[https://www.cryptika.com/50000-wordpress-sites-exposed-to-critical-ninja-forms-file-upload-rce-vulnerability/]]></link>
			<title>50,000 WordPress Sites Exposed to Critical Ninja Forms File Upload RCE Vulnerability</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 07:35:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-fake-tradingview-premium-posts-on-reddit-to-deliver-vidar-and-amos-stealers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-fake-tradingview-premium-posts-on-reddit-to-deliver-vidar-and-amos-stealers/]]></link>
			<title>Hackers Use Fake TradingView Premium Posts on Reddit to Deliver Vidar and AMOS Stealers</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 06:59:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/researcher-released-windows-defender-0-day-exploit-code-allowing-attackers-to-gain-full-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/researcher-released-windows-defender-0-day-exploit-code-allowing-attackers-to-gain-full-access/]]></link>
			<title>Researcher Released Windows Defender 0-Day Exploit Code, Allowing Attackers to Gain Full Access</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 03:30:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/]]></guid>
			<link><![CDATA[https://www.cryptika.com/]]></link>
			<title>Cryptika Cyber Security</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 15:16:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-fortinet-0-day-vulnerability-actively-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-fortinet-0-day-vulnerability-actively-exploited-in-attacks/]]></link>
			<title>CISA Warns of Fortinet 0-Day Vulnerability Actively Exploited in Attacks</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:37:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/trojanized-pypi-ai-proxy-uses-stolen-claude-prompt-to-exfiltrates-data/]]></guid>
			<link><![CDATA[https://www.cryptika.com/trojanized-pypi-ai-proxy-uses-stolen-claude-prompt-to-exfiltrates-data/]]></link>
			<title>Trojanized PyPI AI Proxy Uses Stolen Claude Prompt to Exfiltrates Data</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 15:26:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-drain-286-million-from-drift-protocol-in-suspected-north-korea-linked-exploit/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-drain-286-million-from-drift-protocol-in-suspected-north-korea-linked-exploit/]]></link>
			<title>Hackers Drain $286 Million From Drift Protocol in Suspected North Korea-Linked Exploit</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 15:05:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-github-actions-attack-chain-uses-fake-ci-updates-to-exfiltrate-secrets-and-tokens/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-github-actions-attack-chain-uses-fake-ci-updates-to-exfiltrate-secrets-and-tokens/]]></link>
			<title>New GitHub Actions Attack Chain Uses Fake CI Updates to Exfiltrate Secrets and Tokens</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 14:34:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/dprk-cyber-program-uses-modular-malware-strategy-to-evade-attribution-and-survive-takedowns/]]></guid>
			<link><![CDATA[https://www.cryptika.com/dprk-cyber-program-uses-modular-malware-strategy-to-evade-attribution-and-survive-takedowns/]]></link>
			<title>DPRK Cyber Program Uses Modular Malware Strategy to Evade Attribution and Survive Takedowns</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 14:06:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/north-korean-it-worker-unmasked-after-refusing-to-insult-kim-jong-un-in-job-interview/]]></guid>
			<link><![CDATA[https://www.cryptika.com/north-korean-it-worker-unmasked-after-refusing-to-insult-kim-jong-un-in-job-interview/]]></link>
			<title>North Korean IT Worker Unmasked After Refusing to Insult Kim Jong Un in Job Interview</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 12:43:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/googles-bug-bounty-program-hits-all-time-high-with-17-million-in-2025-payouts/]]></guid>
			<link><![CDATA[https://www.cryptika.com/googles-bug-bounty-program-hits-all-time-high-with-17-million-in-2025-payouts/]]></link>
			<title>Google’s Bug Bounty Program Hits All-Time High With $17 Million in 2025 Payouts</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 11:29:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/apache-traffic-server-vulnerabilities-let-attackers-trigger-dos-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/apache-traffic-server-vulnerabilities-let-attackers-trigger-dos-attack/]]></link>
			<title>Apache Traffic Server Vulnerabilities Let Attackers Trigger DoS Attack</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 11:21:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-dgraph-database-vulnerability-let-attackers-bypass-authentication/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-dgraph-database-vulnerability-let-attackers-bypass-authentication/]]></link>
			<title>Critical Dgraph Database Vulnerability Let Attackers Bypass Authentication</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 11:15:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-poisoned-axios-package-and-phantom-dependency-to-spread-cross-platform-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-poisoned-axios-package-and-phantom-dependency-to-spread-cross-platform-malware/]]></link>
			<title>Hackers Use Poisoned Axios Package and Phantom Dependency to Spread Cross-Platform Malware</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 09:58:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/top-node-js-maintainers-targeted-in-sophisticated-social-engineering-scheme/]]></guid>
			<link><![CDATA[https://www.cryptika.com/top-node-js-maintainers-targeted-in-sophisticated-social-engineering-scheme/]]></link>
			<title>Top Node.js Maintainers Targeted in Sophisticated Social Engineering Scheme</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 09:07:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-claude-code-flaw-silently-bypasses-developer-configured-security-rules/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-claude-code-flaw-silently-bypasses-developer-configured-security-rules/]]></link>
			<title>Critical Claude Code Flaw Silently Bypasses Developer-Configured Security Rules</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 09:16:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-using-fake-microsoft-teams-domains-to-attack-users-via-malicious-payload/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-using-fake-microsoft-teams-domains-to-attack-users-via-malicious-payload/]]></link>
			<title>Hackers Using Fake “Microsoft Teams” Domains to Attack Users Via Malicious Payload</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 09:04:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/top-10-best-user-access-management-tools-in-2026/]]></guid>
			<link><![CDATA[https://www.cryptika.com/top-10-best-user-access-management-tools-in-2026/]]></link>
			<title>Top 10 Best User Access Management Tools in 2026</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 06:10:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-resokerrat-uses-telegram-bot-api-to-control-infected-windows-systems/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-resokerrat-uses-telegram-bot-api-to-control-infected-windows-systems/]]></link>
			<title>New ResokerRAT Uses Telegram Bot API to Control Infected Windows Systems</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 07:12:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-fortinet-forticlient-ems-0-day-vulnerability-actively-exploited-in-the-wild/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-fortinet-forticlient-ems-0-day-vulnerability-actively-exploited-in-the-wild/]]></link>
			<title>Critical Fortinet FortiClient EMS 0-Day Vulnerability Actively Exploited in the Wild</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 13:04:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-progress-sharefile-bugs-let-attackers-take-over-servers-without-logging-in/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-progress-sharefile-bugs-let-attackers-take-over-servers-without-logging-in/]]></link>
			<title>New Progress ShareFile Bugs Let Attackers Take Over Servers Without Logging In</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 11:52:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/metatron-open-source-ai-penetration-testing-assistant-brings-local-llm-analysis-to-linux/]]></guid>
			<link><![CDATA[https://www.cryptika.com/metatron-open-source-ai-penetration-testing-assistant-brings-local-llm-analysis-to-linux/]]></link>
			<title>METATRON – Open-Source AI Penetration Testing Assistant Brings Local LLM Analysis to Linux</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 06:38:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/36-malicious-npm-strapi-packages-used-to-deploy-redis-rce-and-persistent-c2-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/36-malicious-npm-strapi-packages-used-to-deploy-redis-rce-and-persistent-c2-malware/]]></link>
			<title>36 Malicious npm Strapi Packages Used to Deploy Redis RCE and Persistent C2 Malware</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 05:45:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-weaponize-claude-code-leak-to-spread-vidar-and-ghostsocks-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-weaponize-claude-code-leak-to-spread-vidar-and-ghostsocks-malware/]]></link>
			<title>Hackers Weaponize Claude Code Leak to Spread Vidar and GhostSocks Malware</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 09:32:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/top-10-best-vpn-for-chrome-in-2026/]]></guid>
			<link><![CDATA[https://www.cryptika.com/top-10-best-vpn-for-chrome-in-2026/]]></link>
			<title>Top 10 Best VPN For Chrome in 2026</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 06:05:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-adds-trueconf-vulnerability-to-kev-catalog-following-active-exploitation/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-adds-trueconf-vulnerability-to-kev-catalog-following-active-exploitation/]]></link>
			<title>CISA Adds TrueConf Vulnerability to KEV Catalog Following Active Exploitation</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 03:44:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/linkedin-hidden-code-secretly-searches-your-browser-for-installed-extensions/]]></guid>
			<link><![CDATA[https://www.cryptika.com/linkedin-hidden-code-secretly-searches-your-browser-for-installed-extensions/]]></link>
			<title>LinkedIn Hidden Code Secretly Searches Your Browser for Installed Extensions</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 04:15:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/anthropic-officially-ends-claude-subscriptions-for-third-party-tools-like-openclaw/]]></guid>
			<link><![CDATA[https://www.cryptika.com/anthropic-officially-ends-claude-subscriptions-for-third-party-tools-like-openclaw/]]></link>
			<title>Anthropic Officially Ends Claude Subscriptions for Third-Party Tools Like OpenClaw</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 03:20:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/2000-forticlient-ems-instances-exposed-online-amid-active-rce-vulnerability-exploits-in-the-wild/]]></guid>
			<link><![CDATA[https://www.cryptika.com/2000-forticlient-ems-instances-exposed-online-amid-active-rce-vulnerability-exploits-in-the-wild/]]></link>
			<title>2,000+ FortiClient EMS Instances Exposed Online Amid Active RCE Vulnerability Exploits in the Wild</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 03:41:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/google-deepmind-researchers-warn-hackers-can-hijack-ai-agents-through-malicious-web-content/]]></guid>
			<link><![CDATA[https://www.cryptika.com/google-deepmind-researchers-warn-hackers-can-hijack-ai-agents-through-malicious-web-content/]]></link>
			<title>Google DeepMind Researchers Warn Hackers Can Hijack AI Agents Through Malicious Web Content</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 02:52:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/]]></guid>
			<link><![CDATA[https://www.cryptika.com/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/]]></link>
			<title>Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 02:07:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/high-stakes-security-protecting-the-digital-infrastructure-of-the-gaming-industry/]]></guid>
			<link><![CDATA[https://www.cryptika.com/high-stakes-security-protecting-the-digital-infrastructure-of-the-gaming-industry/]]></link>
			<title>High-Stakes Security: Protecting the Digital Infrastructure of the Gaming Industry</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 22:00:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/14000-f5-big-ip-apm-devices-exposed-online-amid-active-rce-vulnerability-exploits/]]></guid>
			<link><![CDATA[https://www.cryptika.com/14000-f5-big-ip-apm-devices-exposed-online-amid-active-rce-vulnerability-exploits/]]></link>
			<title>14,000+ F5 BIG-IP APM Devices Exposed Online Amid Active RCE Vulnerability Exploits</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:02:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/kimsuky-deploys-malicious-lnk-files-to-deliver-python-based-backdoor-in-multi-stage-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/kimsuky-deploys-malicious-lnk-files-to-deliver-python-based-backdoor-in-multi-stage-attack/]]></link>
			<title>Kimsuky Deploys Malicious LNK Files to Deliver Python-Based Backdoor in Multi-Stage Attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:43:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/axios-maintainer-confirms-the-npm-compromise-was-via-a-targeted-social-engineering-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/axios-maintainer-confirms-the-npm-compromise-was-via-a-targeted-social-engineering-attack/]]></link>
			<title>Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:22:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-abuse-trusted-platforms-to-steal-bank-credentials-from-philippine-users/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-abuse-trusted-platforms-to-steal-bank-credentials-from-philippine-users/]]></link>
			<title>Hackers Abuse Trusted Platforms to Steal Bank Credentials From Philippine Users</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:09:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/malicious-chrome-extension-chatgpt-ad-blocker-steals-chatgpt-conversations/]]></guid>
			<link><![CDATA[https://www.cryptika.com/malicious-chrome-extension-chatgpt-ad-blocker-steals-chatgpt-conversations/]]></link>
			<title>Malicious Chrome Extension “ChatGPT Ad Blocker” Steals ChatGPT Conversations</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 11:23:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-phorpiex-botnet-to-spread-ransomware-sextortion-and-crypto-clipping-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-phorpiex-botnet-to-spread-ransomware-sextortion-and-crypto-clipping-malware/]]></link>
			<title>Hackers Use Phorpiex Botnet to Spread Ransomware, Sextortion, and Crypto-Clipping Malware</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 10:28:10 +0000]]></pubDate>
		</item>
				</channel>
</rss>
