<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 16, 2026 at 18:28 by All in One SEO v4.8.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cryptika.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cryptika Cybersecurity</title>
		<link><![CDATA[https://www.cryptika.com]]></link>
		<description><![CDATA[Cryptika Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Wed, 15 Apr 2026 14:14:05 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cryptika.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-releases-cumulative-update-kb5083769-for-windows-11-version-25h2-and-24h2/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-releases-cumulative-update-kb5083769-for-windows-11-version-25h2-and-24h2/]]></link>
			<title>Microsoft Releases Cumulative Update KB5083769 for Windows 11, Version 25H2 and 24H2</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:14:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/about/in-jordan/]]></guid>
			<link><![CDATA[https://www.cryptika.com/about/in-jordan/]]></link>
			<title>Jordan Cyber Security | Information Security</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 13:18:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/windows-active-directory-vulnerability-allow-attackers-to-execute-malicious-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/windows-active-directory-vulnerability-allow-attackers-to-execute-malicious-code/]]></link>
			<title>Windows Active Directory Vulnerability Allow Attackers to Execute Malicious Code</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:11:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-365-web-services-hit-by-google-chrome-147-compatibility-issue/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-365-web-services-hit-by-google-chrome-147-compatibility-issue/]]></link>
			<title>Microsoft 365 Web Services Hit by Google Chrome 147 Compatibility Issue</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 12:54:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/two-u-s-nationals-sentenced-for-running-laptop-farm-for-dprk-remote-workers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/two-u-s-nationals-sentenced-for-running-laptop-farm-for-dprk-remote-workers/]]></link>
			<title>Two U.S. Nationals Sentenced for Running Laptop Farm for DPRK Remote Workers</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:49:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/about/about-cryptika-cybersecurity-kuwait/]]></guid>
			<link><![CDATA[https://www.cryptika.com/about/about-cryptika-cybersecurity-kuwait/]]></link>
			<title>About Cryptika Cybersecurity &#8211; Kuwait</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:42:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/about/about-cryptika-cyber-security-doha-qatar/]]></guid>
			<link><![CDATA[https://www.cryptika.com/about/about-cryptika-cyber-security-doha-qatar/]]></link>
			<title>About Cryptika Cybersecurity &#8211; Qatar</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:41:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/about/cybersecurity-in-dubai/]]></guid>
			<link><![CDATA[https://www.cryptika.com/about/cybersecurity-in-dubai/]]></link>
			<title>About Cryptika Cybersecurity &#8211; Dubai</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:40:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/about/]]></guid>
			<link><![CDATA[https://www.cryptika.com/about/]]></link>
			<title>About Cryptika Cyber Security</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:36:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-uac-0247-campaign-steals-browser-and-whatsapp-data-from-hospitals-and-governments/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-uac-0247-campaign-steals-browser-and-whatsapp-data-from-hospitals-and-governments/]]></link>
			<title>New UAC-0247 Campaign Steals Browser and WhatsApp Data From Hospitals and Governments</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:32:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/google-microsoft-meta-tracking-you-even-if-you-opt-out-new-research/]]></guid>
			<link><![CDATA[https://www.cryptika.com/google-microsoft-meta-tracking-you-even-if-you-opt-out-new-research/]]></link>
			<title>Google, Microsoft, Meta Tracking You Even if You Opt Out – New Research</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:16:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-cisco-ise-vulnerabilities-let-remote-attackers-execute-malicious-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-cisco-ise-vulnerabilities-let-remote-attackers-execute-malicious-code/]]></link>
			<title>Critical Cisco ISE Vulnerabilities Let Remote Attackers Execute Malicious Code</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:32:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-chrome-privacy-analysis-shows-how-fingerprinting-and-header-leaks-can-expose-users/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-chrome-privacy-analysis-shows-how-fingerprinting-and-header-leaks-can-expose-users/]]></link>
			<title>New Chrome Privacy Analysis Shows How Fingerprinting and Header Leaks Can Expose Users</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 08:36:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/splunk-enterprise-and-cloud-platform-vulnerability-enables-remote-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/splunk-enterprise-and-cloud-platform-vulnerability-enables-remote-code-execution-attacks/]]></link>
			<title>Splunk Enterprise and Cloud Platform Vulnerability Enables Remote Code Execution Attacks</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 07:42:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/1250-c2-servers-mapped-across-russian-hosting-across-165-providers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/1250-c2-servers-mapped-across-russian-hosting-across-165-providers/]]></link>
			<title>1,250+ C2 Servers Mapped Across Russian Hosting Across 165 Providers</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 06:14:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-abuse-google-discover-with-ai-generated-content-to-push-malicious-notifications/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-abuse-google-discover-with-ai-generated-content-to-push-malicious-notifications/]]></link>
			<title>Hackers Abuse Google Discover With AI-Generated Content to Push Malicious Notifications</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 04:34:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-php-composer-vulnerability-let-attackers-execute-arbitrary-commands/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-php-composer-vulnerability-let-attackers-execute-arbitrary-commands/]]></link>
			<title>New PHP Composer Vulnerability Let Attackers Execute Arbitrary Commands</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:08:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/muddywater-style-hackers-scan-12000-systems-before-hitting-middle-east-critical-sectors/]]></guid>
			<link><![CDATA[https://www.cryptika.com/muddywater-style-hackers-scan-12000-systems-before-hitting-middle-east-critical-sectors/]]></link>
			<title>MuddyWater-Style Hackers Scan 12,000+ Systems Before Hitting Middle East Critical Sectors</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 13:08:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/31-high-impact-vulnerabilities-exploited-in-march-as-interlock-hits-cisco-fmc-zero-day/]]></guid>
			<link><![CDATA[https://www.cryptika.com/31-high-impact-vulnerabilities-exploited-in-march-as-interlock-hits-cisco-fmc-zero-day/]]></link>
			<title>31 High-Impact Vulnerabilities Exploited in March as Interlock Hits Cisco FMC Zero-Day</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 08:51:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-using-google-cloud-storage-to-bypass-email-filters-and-deliver-remcos-rat/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-using-google-cloud-storage-to-bypass-email-filters-and-deliver-remcos-rat/]]></link>
			<title>Hackers Using Google Cloud Storage to Bypass Email Filters and Deliver Remcos RAT</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 12:47:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-hide-backdoor-in-trusted-wordpress-plugins-for-8-months-before-activating-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-hide-backdoor-in-trusted-wordpress-plugins-for-8-months-before-activating-malware/]]></link>
			<title>Hackers Hide Backdoor in Trusted WordPress Plugins for 8 Months Before Activating Malware</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 12:14:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-create-hidden-mailbox-rules-in-microsoft-365-to-intercept-sensitive-business-emails/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-create-hidden-mailbox-rules-in-microsoft-365-to-intercept-sensitive-business-emails/]]></link>
			<title>Hackers Create Hidden Mailbox Rules in Microsoft 365 to Intercept Sensitive Business Emails</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 11:34:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/agentic-llm-browsers-expose-new-attack-surface-for-prompt-injection-and-data-theft/]]></guid>
			<link><![CDATA[https://www.cryptika.com/agentic-llm-browsers-expose-new-attack-surface-for-prompt-injection-and-data-theft/]]></link>
			<title>Agentic LLM Browsers Expose New Attack Surface for Prompt Injection and Data Theft</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 10:45:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/funnull-linked-triad-nexus-resurfaces-with-175-rotating-cname-domains-and-global-scam-portals/]]></guid>
			<link><![CDATA[https://www.cryptika.com/funnull-linked-triad-nexus-resurfaces-with-175-rotating-cname-domains-and-global-scam-portals/]]></link>
			<title>FUNNULL-Linked Triad Nexus Resurfaces With 175+ Rotating CNAME Domains and Global Scam Portals</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:19:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/windows-bitlocker-vulnerability-allows-attacker-to-bypass-security-feature/]]></guid>
			<link><![CDATA[https://www.cryptika.com/windows-bitlocker-vulnerability-allows-attacker-to-bypass-security-feature/]]></link>
			<title>Windows BitLocker Vulnerability Allows Attacker to Bypass  Security Feature</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:06:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-janaware-ransomware-targets-turkish-users-through-customized-adwind-rat/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-janaware-ransomware-targets-turkish-users-through-customized-adwind-rat/]]></link>
			<title>New JanaWare Ransomware Targets Turkish Users Through Customized Adwind RAT</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 07:38:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-defender-0-day-vulnerability-enables-privilege-escalation-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-defender-0-day-vulnerability-enables-privilege-escalation-attack/]]></link>
			<title>Microsoft Defender 0-Day Vulnerability Enables Privilege Escalation Attack</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 07:33:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/25000-endpoints-exposed-by-dragon-boss-solutions-update-domain-supply-chain-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/25000-endpoints-exposed-by-dragon-boss-solutions-update-domain-supply-chain-attack/]]></link>
			<title>25,000+ Endpoints Exposed by Dragon Boss Solutions Update Domain Supply Chain Attack</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 05:24:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/openai-launches-gpt-5-4-with-reverse-engineering-vulnerability-and-malware-analysis-features/]]></guid>
			<link><![CDATA[https://www.cryptika.com/openai-launches-gpt-5-4-with-reverse-engineering-vulnerability-and-malware-analysis-features/]]></link>
			<title>OpenAI Launches GPT-5.4 with Reverse Engineering, Vulnerability and Malware Analysis Features</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 03:09:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-sharepoint-server-0-day-vulnerability-actively-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-sharepoint-server-0-day-vulnerability-actively-exploited-in-attacks/]]></link>
			<title>Microsoft SharePoint Server 0-Day Vulnerability Actively Exploited in Attacks</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 02:30:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/patch-tuesday-april-2026-edition/]]></guid>
			<link><![CDATA[https://www.cryptika.com/patch-tuesday-april-2026-edition/]]></link>
			<title>Patch Tuesday, April 2026 Edition</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 21:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/security-risk-advisors-purple-team-participants-can-now-earn-cpe-credits/]]></guid>
			<link><![CDATA[https://www.cryptika.com/security-risk-advisors-purple-team-participants-can-now-earn-cpe-credits/]]></link>
			<title>Security Risk Advisors Purple Team Participants Can Now Earn CPE Credits</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 18:09:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fortinet-patches-11-vulnerabilities-across-fortisandbox-fortios-fortianalyzer-and-fortimanager/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fortinet-patches-11-vulnerabilities-across-fortisandbox-fortios-fortianalyzer-and-fortimanager/]]></link>
			<title>Fortinet Patches 11 Vulnerabilities Across FortiSandbox, FortiOS, FortiAnalyzer, and FortiManager</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 17:59:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-etcd-auth-bypass-flaw-allows-unauthorized-access-to-sensitive-cluster-apis/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-etcd-auth-bypass-flaw-allows-unauthorized-access-to-sensitive-cluster-apis/]]></link>
			<title>Critical etcd Auth Bypass Flaw Allows Unauthorized Access to Sensitive Cluster APIs</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 16:59:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/ivanti-neurons-for-itsm-vulnerabilities-allow-remote-attacker-to-obtain-user-sessions/]]></guid>
			<link><![CDATA[https://www.cryptika.com/ivanti-neurons-for-itsm-vulnerabilities-allow-remote-attacker-to-obtain-user-sessions/]]></link>
			<title>Ivanti Neurons for ITSM Vulnerabilities Allow Remote Attacker to Obtain User Sessions</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 16:52:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-microsoft-exchange-and-windows-clfs-vulnerabilities-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-microsoft-exchange-and-windows-clfs-vulnerabilities-exploited-in-attacks/]]></link>
			<title>CISA Warns of Microsoft Exchange and Windows CLFS Vulnerabilities Exploited in Attacks</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 16:31:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-mirax-android-rat-turns-infected-phones-into-residential-proxy-nodes/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-mirax-android-rat-turns-infected-phones-into-residential-proxy-nodes/]]></link>
			<title>New Mirax Android RAT Turns Infected Phones Into Residential Proxy Nodes</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:39:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-plugx-usb-worm-spreads-across-multiple-continents-using-dll-sideloading/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-plugx-usb-worm-spreads-across-multiple-continents-using-dll-sideloading/]]></link>
			<title>New PlugX USB Worm Spreads Across Multiple Continents Using DLL Sideloading</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:27:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-leave-credential-stuffing-botnet-wide-open-with-full-worker-access-and-root-passwords/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-leave-credential-stuffing-botnet-wide-open-with-full-worker-access-and-root-passwords/]]></link>
			<title>Hackers Leave Credential Stuffing Botnet Wide Open With Full Worker Access and Root Passwords</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:00:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/codex-hacks-samsung-tv-to-root-by-exploiting-world-writable-driver-interfaces/]]></guid>
			<link><![CDATA[https://www.cryptika.com/codex-hacks-samsung-tv-to-root-by-exploiting-world-writable-driver-interfaces/]]></link>
			<title>Codex Hacks Samsung TV to Root by Exploiting World-Writable Driver Interfaces</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 12:30:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-fortinet-sql-injection-vulnerability-actively-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-fortinet-sql-injection-vulnerability-actively-exploited-in-attacks/]]></link>
			<title>CISA Warns of Fortinet SQL Injection Vulnerability Actively Exploited in Attacks</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 12:14:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-weaponize-obsidian-shell-commands-plugin-to-launch-cross-platform-malware-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-weaponize-obsidian-shell-commands-plugin-to-launch-cross-platform-malware-attacks/]]></link>
			<title>Hackers Weaponize Obsidian Shell Commands Plugin to Launch Cross-Platform Malware Attacks</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:39:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-bypass-phishing-emails-and-target-okta-identity-systems-instead/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-bypass-phishing-emails-and-target-okta-identity-systems-instead/]]></link>
			<title>Hackers Bypass Phishing Emails and Target Okta Identity Systems Instead</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 10:57:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/booking-com-confirms-data-breach-hackers-accessed-customers-personal-information/]]></guid>
			<link><![CDATA[https://www.cryptika.com/booking-com-confirms-data-breach-hackers-accessed-customers-personal-information/]]></link>
			<title>Booking.com Confirms Data Breach — Hackers Accessed Customers’ Personal Information</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 10:28:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/]]></guid>
			<link><![CDATA[https://www.cryptika.com/]]></link>
			<title>Cryptika Cyber Security</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 15:16:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/apt41-turns-linux-cloud-servers-into-credential-theft-targets-with-new-winnti-backdoor/]]></guid>
			<link><![CDATA[https://www.cryptika.com/apt41-turns-linux-cloud-servers-into-credential-theft-targets-with-new-winnti-backdoor/]]></link>
			<title>APT41 Turns Linux Cloud Servers Into Credential Theft Targets With New Winnti Backdoor</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:44:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/w3ll-phishing-kit-takedown-hits-global-credential-theft-and-mfa-bypass-operation/]]></guid>
			<link><![CDATA[https://www.cryptika.com/w3ll-phishing-kit-takedown-hits-global-credential-theft-and-mfa-bypass-operation/]]></link>
			<title>W3LL Phishing Kit Takedown Hits Global Credential Theft and MFA Bypass Operation</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:41:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-fake-proxifier-installer-on-github-to-spread-clipbanker-crypto-stealing-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-fake-proxifier-installer-on-github-to-spread-clipbanker-crypto-stealing-malware/]]></link>
			<title>Hackers Use Fake Proxifier Installer on GitHub to Spread ClipBanker Crypto-Stealing Malware</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 04:56:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/rockstars-gta-game-hacked-attackers-published-78-6-million-records-online/]]></guid>
			<link><![CDATA[https://www.cryptika.com/rockstars-gta-game-hacked-attackers-published-78-6-million-records-online/]]></link>
			<title>Rockstar’s GTA Game Hacked – Attackers published 78.6 Million Records Online</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 02:01:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/blog/]]></guid>
			<link><![CDATA[https://www.cryptika.com/blog/]]></link>
			<title>Cybersecurity Blog</title>
			<pubDate><![CDATA[Sun, 05 Jun 2022 13:24:57 +0000]]></pubDate>
		</item>
				</channel>
</rss>
