<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 5, 2026 at 21:39 by All in One SEO v4.8.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cryptika.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cryptika Cybersecurity</title>
		<link><![CDATA[https://www.cryptika.com]]></link>
		<description><![CDATA[Cryptika Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Tue, 05 May 2026 17:01:09 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cryptika.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cryptika.com/low-noise-high-confidence-optimizing-soc-costs-with-better-threat-intelligence/]]></guid>
			<link><![CDATA[https://www.cryptika.com/low-noise-high-confidence-optimizing-soc-costs-with-better-threat-intelligence/]]></link>
			<title>Low Noise, High Confidence: Optimizing SOC Costs with Better Threat Intelligence </title>
			<pubDate><![CDATA[Tue, 05 May 2026 17:01:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/gnutls-3-8-13-released-with-fix-for-12-vulnerabilities-affecting-network-communications/]]></guid>
			<link><![CDATA[https://www.cryptika.com/gnutls-3-8-13-released-with-fix-for-12-vulnerabilities-affecting-network-communications/]]></link>
			<title>GnuTLS 3.8.13 Released with Fix for 12 Vulnerabilities Affecting Network Communications</title>
			<pubDate><![CDATA[Tue, 05 May 2026 16:36:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisco-to-acquire-astrix-security-to-strengthen-ai-agent-and-non-human-identity-security/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisco-to-acquire-astrix-security-to-strengthen-ai-agent-and-non-human-identity-security/]]></link>
			<title>Cisco to Acquire Astrix Security to Strengthen AI Agent and Non-Human Identity Security</title>
			<pubDate><![CDATA[Tue, 05 May 2026 16:30:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/luxsci-launches-enterprise-grade-hipaa-compliant-email-security-for-mid-sized-healthcare-organizations/]]></guid>
			<link><![CDATA[https://www.cryptika.com/luxsci-launches-enterprise-grade-hipaa-compliant-email-security-for-mid-sized-healthcare-organizations/]]></link>
			<title>LuxSci Launches Enterprise-Grade HIPAA-Compliant Email Security for Mid-Sized Healthcare Organizations</title>
			<pubDate><![CDATA[Tue, 05 May 2026 14:44:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cerberus-stalkerware-on-google-play-leverages-accessibility-abuse-and-firebase-for-remote-control/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cerberus-stalkerware-on-google-play-leverages-accessibility-abuse-and-firebase-for-remote-control/]]></link>
			<title>Cerberus Stalkerware on Google Play Leverages Accessibility Abuse and Firebase for Remote Control</title>
			<pubDate><![CDATA[Tue, 05 May 2026 14:18:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/attackers-abuse-amazon-ses-to-send-authenticated-phishing-emails-that-bypass-security/]]></guid>
			<link><![CDATA[https://www.cryptika.com/attackers-abuse-amazon-ses-to-send-authenticated-phishing-emails-that-bypass-security/]]></link>
			<title>Attackers Abuse Amazon SES to Send Authenticated Phishing Emails That Bypass Security</title>
			<pubDate><![CDATA[Tue, 05 May 2026 11:12:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-attribution-framework-connects-apt-campaigns-through-strategic-operational-and-technical-layers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-attribution-framework-connects-apt-campaigns-through-strategic-operational-and-technical-layers/]]></link>
			<title>New Attribution Framework Connects APT Campaigns Through Strategic, Operational, and Technical Layers</title>
			<pubDate><![CDATA[Tue, 05 May 2026 10:08:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/beware-of-fake-notepad-for-mac-website-possibly-could-harm-your-machine/]]></guid>
			<link><![CDATA[https://www.cryptika.com/beware-of-fake-notepad-for-mac-website-possibly-could-harm-your-machine/]]></link>
			<title>Beware of Fake ‘Notepad++ for Mac’ Website, Possibly Could Harm your Machine</title>
			<pubDate><![CDATA[Tue, 05 May 2026 08:22:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-android-zero-click-vulnerability-grants-remote-shell-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-android-zero-click-vulnerability-grants-remote-shell-access/]]></link>
			<title>Critical Android Zero-Click Vulnerability Grants Remote Shell Access</title>
			<pubDate><![CDATA[Tue, 05 May 2026 07:24:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/pnpm-11-turns-on-minimum-release-age-by-default-to-reduce-npm-supply-chain-risk/]]></guid>
			<link><![CDATA[https://www.cryptika.com/pnpm-11-turns-on-minimum-release-age-by-default-to-reduce-npm-supply-chain-risk/]]></link>
			<title>pnpm 11 Turns On Minimum Release Age by Default to Reduce npm Supply Chain Risk</title>
			<pubDate><![CDATA[Tue, 05 May 2026 06:05:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-edge-stores-all-saved-passwords-in-cleartext-process-memory-at-launch/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-edge-stores-all-saved-passwords-in-cleartext-process-memory-at-launch/]]></link>
			<title>Microsoft Edge Stores All Saved Passwords in Cleartext Process Memory at Launch</title>
			<pubDate><![CDATA[Tue, 05 May 2026 03:46:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/apache-http-server-exposes-millions-of-servers-to-remote-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/apache-http-server-exposes-millions-of-servers-to-remote-code-execution-attacks/]]></link>
			<title>Apache HTTP Server Exposes Millions of Servers to Remote Code Execution Attacks</title>
			<pubDate><![CDATA[Tue, 05 May 2026 02:47:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-vect-2-0-ransomware-destroys-files-over-128-kb-across-windows-linux-and-esxi/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-vect-2-0-ransomware-destroys-files-over-128-kb-across-windows-linux-and-esxi/]]></link>
			<title>New VECT 2.0 Ransomware Destroys Files Over 128 KB Across Windows, Linux, and ESXi</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 08:43:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/blog/]]></guid>
			<link><![CDATA[https://www.cryptika.com/blog/]]></link>
			<title>Cybersecurity Blog</title>
			<pubDate><![CDATA[Sun, 05 Jun 2022 13:24:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/]]></guid>
			<link><![CDATA[https://www.cryptika.com/]]></link>
			<title>Cryptika Cyber Security</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 15:16:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-defender-mistakenly-flags-digicert-root-certificates-as-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-defender-mistakenly-flags-digicert-root-certificates-as-malware/]]></link>
			<title>Microsoft Defender Mistakenly Flags DigiCert Root Certificates as Malware</title>
			<pubDate><![CDATA[Sun, 03 May 2026 16:55:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/trellix-source-code-breach-hackers-gain-unauthorized-access-to-repository/]]></guid>
			<link><![CDATA[https://www.cryptika.com/trellix-source-code-breach-hackers-gain-unauthorized-access-to-repository/]]></link>
			<title>Trellix Source Code Breach – Hackers Gain Unauthorized Access to Repository</title>
			<pubDate><![CDATA[Sat, 02 May 2026 16:38:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/multiple-exim-mail-server-vulnerabilities-leads-to-crash-with-malicious-dns-data/]]></guid>
			<link><![CDATA[https://www.cryptika.com/multiple-exim-mail-server-vulnerabilities-leads-to-crash-with-malicious-dns-data/]]></link>
			<title>Multiple Exim Mail Server Vulnerabilities Leads to Crash with Malicious DNS data</title>
			<pubDate><![CDATA[Sat, 02 May 2026 11:14:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/attackers-deploy-aitm-phishing-pages-to-access-sharepoint-hubspot-and-google-workspace/]]></guid>
			<link><![CDATA[https://www.cryptika.com/attackers-deploy-aitm-phishing-pages-to-access-sharepoint-hubspot-and-google-workspace/]]></link>
			<title>Attackers Deploy AiTM Phishing Pages to Access SharePoint, HubSpot, and Google Workspace</title>
			<pubDate><![CDATA[Sat, 02 May 2026 06:36:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/attackers-abuse-google-appsheet-netlify-and-telegram-in-facebook-phishing-campaign/]]></guid>
			<link><![CDATA[https://www.cryptika.com/attackers-abuse-google-appsheet-netlify-and-telegram-in-facebook-phishing-campaign/]]></link>
			<title>Attackers Abuse Google AppSheet, Netlify, and Telegram in Facebook Phishing Campaign</title>
			<pubDate><![CDATA[Sat, 02 May 2026 05:36:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cpanelsniper-poc-exploit-disclosed-for-cpanel-vulnerability-44000-servers-compromised/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cpanelsniper-poc-exploit-disclosed-for-cpanel-vulnerability-44000-servers-compromised/]]></link>
			<title>cPanelSniper – PoC Exploit Disclosed for cPanel Vulnerability, 44,000 Servers Compromised</title>
			<pubDate><![CDATA[Sat, 02 May 2026 02:57:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-microstealer-malware-actively-attacking-telecom-education-sectors/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-microstealer-malware-actively-attacking-telecom-education-sectors/]]></link>
			<title>New MicroStealer Malware Actively Attacking Telecom &amp; Education Sectors</title>
			<pubDate><![CDATA[Mon, 04 May 2026 16:28:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-xlabs_v1-botnet-targets-minecraft-servers-through-adb-exposed-android-devices/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-xlabs_v1-botnet-targets-minecraft-servers-through-adb-exposed-android-devices/]]></link>
			<title>New xlabs_v1 Botnet Targets Minecraft Servers Through ADB-Exposed Android Devices</title>
			<pubDate><![CDATA[Mon, 04 May 2026 14:35:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-linux-kernel-0-day-vulnerability-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-linux-kernel-0-day-vulnerability-exploited-in-attacks/]]></link>
			<title>CISA Warns of Linux Kernel 0-Day Vulnerability Exploited in Attacks</title>
			<pubDate><![CDATA[Mon, 04 May 2026 11:57:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/apache-mina-vulnerabilities-enables-remote-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/apache-mina-vulnerabilities-enables-remote-code-execution-attacks/]]></link>
			<title>Apache MINA Vulnerabilities Enables Remote Code Execution Attacks</title>
			<pubDate><![CDATA[Mon, 04 May 2026 11:24:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-cpanel-whm-vulnerability-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-cpanel-whm-vulnerability-exploited-in-attacks/]]></link>
			<title>CISA Warns of cPanel &amp; WHM Vulnerability Exploited in Attacks</title>
			<pubDate><![CDATA[Mon, 04 May 2026 08:59:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/criminal-ip-and-securonix-threatq-collaborate-to-enhance-threat-intelligence-operations/]]></guid>
			<link><![CDATA[https://www.cryptika.com/criminal-ip-and-securonix-threatq-collaborate-to-enhance-threat-intelligence-operations/]]></link>
			<title>Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations</title>
			<pubDate><![CDATA[Fri, 01 May 2026 17:40:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/etherrat-campaign-uses-seo-poisoning-and-github-facades-to-target-enterprise-admins/]]></guid>
			<link><![CDATA[https://www.cryptika.com/etherrat-campaign-uses-seo-poisoning-and-github-facades-to-target-enterprise-admins/]]></link>
			<title>EtherRAT Campaign Uses SEO Poisoning and GitHub Facades to Target Enterprise Admins</title>
			<pubDate><![CDATA[Fri, 01 May 2026 15:25:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/targeted-large-scale-campaign-attacking-u-s-organizations-with-fake-event-invitations/]]></guid>
			<link><![CDATA[https://www.cryptika.com/targeted-large-scale-campaign-attacking-u-s-organizations-with-fake-event-invitations/]]></link>
			<title>Targeted Large-Scale Campaign Attacking U.S. Organizations with Fake Event Invitations</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 15:54:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-spyware-platform-lets-buyers-rebrand-and-resell-android-surveillance-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-spyware-platform-lets-buyers-rebrand-and-resell-android-surveillance-malware/]]></link>
			<title>New Spyware Platform Lets Buyers Rebrand and Resell Android Surveillance Malware</title>
			<pubDate><![CDATA[Fri, 01 May 2026 14:32:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/attackers-abuse-captcha-and-clickfix-tactics-to-boost-credential-theft-campaigns/]]></guid>
			<link><![CDATA[https://www.cryptika.com/attackers-abuse-captcha-and-clickfix-tactics-to-boost-credential-theft-campaigns/]]></link>
			<title>Attackers Abuse CAPTCHA and ClickFix Tactics to Boost Credential Theft Campaigns</title>
			<pubDate><![CDATA[Fri, 01 May 2026 13:55:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-ddos-malware-exploits-jenkins-to-attack-valve-source-engine-game-servers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-ddos-malware-exploits-jenkins-to-attack-valve-source-engine-game-servers/]]></link>
			<title>New DDoS Malware Exploits Jenkins to Attack Valve Source Engine Game Servers</title>
			<pubDate><![CDATA[Fri, 01 May 2026 13:07:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/openai-releases-5-point-action-plan-to-strengthen-ai-powered-cyber-defense/]]></guid>
			<link><![CDATA[https://www.cryptika.com/openai-releases-5-point-action-plan-to-strengthen-ai-powered-cyber-defense/]]></link>
			<title>OpenAI Releases 5-Point Action Plan to Strengthen AI-Powered Cyber Defense</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:50:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/ransomware-victims-jump-to-7831-as-ai-crime-tools-scale-global-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/ransomware-victims-jump-to-7831-as-ai-crime-tools-scale-global-attacks/]]></link>
			<title>Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global Attacks</title>
			<pubDate><![CDATA[Fri, 01 May 2026 09:43:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/sap-npm-packages-compromised-to-harvest-developer-and-ci-cd-secrets/]]></guid>
			<link><![CDATA[https://www.cryptika.com/sap-npm-packages-compromised-to-harvest-developer-and-ci-cd-secrets/]]></link>
			<title>SAP npm Packages Compromised to Harvest Developer and CI/CD Secrets</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 17:02:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/lazarus-hackers-attacking-macos-users-with-mach-o-man-malware-kit/]]></guid>
			<link><![CDATA[https://www.cryptika.com/lazarus-hackers-attacking-macos-users-with-mach-o-man-malware-kit/]]></link>
			<title>Lazarus Hackers Attacking macOS Users With ‘Mach-O Man’ Malware Kit</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 16:50:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/brinker-introduces-a-novel-approach-to-deepfake-detection/]]></guid>
			<link><![CDATA[https://www.cryptika.com/brinker-introduces-a-novel-approach-to-deepfake-detection/]]></link>
			<title>Brinker Introduces a Novel Approach to Deepfake Detection</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 13:45:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/minecraft-players-targeted-by-lofystealer-using-node-js-loader-and-in-memory-browser-injection/]]></guid>
			<link><![CDATA[https://www.cryptika.com/minecraft-players-targeted-by-lofystealer-using-node-js-loader-and-in-memory-browser-injection/]]></link>
			<title>Minecraft Players Targeted by LofyStealer Using Node.js Loader and In-Memory Browser Injection</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 11:54:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/deepdoor-stealer-harvests-browser-passwords-cloud-tokens-ssh-keys-and-wi-fi-credentials/]]></guid>
			<link><![CDATA[https://www.cryptika.com/deepdoor-stealer-harvests-browser-passwords-cloud-tokens-ssh-keys-and-wi-fi-credentials/]]></link>
			<title>Deep#Door Stealer Harvests Browser Passwords, Cloud Tokens, SSH Keys, and Wi-Fi Credentials</title>
			<pubDate><![CDATA[Fri, 01 May 2026 09:26:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/china-aligned-attackers-use-shadowpad-iox-proxy-and-wmic-in-multi-stage-espionage-campaign/]]></guid>
			<link><![CDATA[https://www.cryptika.com/china-aligned-attackers-use-shadowpad-iox-proxy-and-wmic-in-multi-stage-espionage-campaign/]]></link>
			<title>China-Aligned Attackers Use ShadowPad, IOX Proxy, and WMIC in Multi-Stage Espionage Campaign</title>
			<pubDate><![CDATA[Fri, 01 May 2026 08:17:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-fake-captcha-campaign-uses-sms-pumping-fraud-to-run-up-victims-phone-bills/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-fake-captcha-campaign-uses-sms-pumping-fraud-to-run-up-victims-phone-bills/]]></link>
			<title>New Fake CAPTCHA Campaign Uses SMS Pumping Fraud to Run Up Victims’ Phone Bills</title>
			<pubDate><![CDATA[Fri, 01 May 2026 07:44:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-windows-11-april-2026-security-update-breaks-third-party-backup-applications/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-windows-11-april-2026-security-update-breaks-third-party-backup-applications/]]></link>
			<title>Microsoft Windows 11 April 2026 Security Update Breaks Third-Party Backup Applications</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 17:24:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/qilin-ransomware-enumerates-rdp-authentication-history-on-a-compromised-server/]]></guid>
			<link><![CDATA[https://www.cryptika.com/qilin-ransomware-enumerates-rdp-authentication-history-on-a-compromised-server/]]></link>
			<title>Qilin Ransomware Enumerates RDP Authentication History on a Compromised Server</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 16:05:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/anti-ddos-firm-heaped-attacks-on-brazilian-isps/]]></guid>
			<link><![CDATA[https://www.cryptika.com/anti-ddos-firm-heaped-attacks-on-brazilian-isps/]]></link>
			<title>Anti-DDoS Firm Heaped Attacks on Brazilian ISPs</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 14:04:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cve-mcp-server-turns-claude-into-a-full-spectrum-security-analyst-with-27-tools-across-21-apis/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cve-mcp-server-turns-claude-into-a-full-spectrum-security-analyst-with-27-tools-across-21-apis/]]></link>
			<title>CVE MCP Server Turns Claude Into a Full-Spectrum Security Analyst With 27 Tools Across 21 APIs</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 08:42:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/claude-generated-commit-adds-promptmink-malware-to-crypto-trading-agent/]]></guid>
			<link><![CDATA[https://www.cryptika.com/claude-generated-commit-adds-promptmink-malware-to-crypto-trading-agent/]]></link>
			<title>Claude-Generated Commit Adds PromptMink Malware to Crypto Trading Agent</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 08:39:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cursor-ai-extension-access-developer-tokens-leads-to-full-credential-compromise/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cursor-ai-extension-access-developer-tokens-leads-to-full-credential-compromise/]]></link>
			<title>Cursor AI Extension Access Developer Tokens Leads to Full Credential Compromise</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 04:07:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/linux-kernel-0-day-copy-fail-roots-every-major-distribution-since-2017/]]></guid>
			<link><![CDATA[https://www.cryptika.com/linux-kernel-0-day-copy-fail-roots-every-major-distribution-since-2017/]]></link>
			<title>Linux Kernel 0-Day “Copy Fail” Roots Every Major Distribution Since 2017</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 02:31:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-wireshark-vulnerabilities-let-attackers-execute-arbitrary-code-via-malformed-packets/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-wireshark-vulnerabilities-let-attackers-execute-arbitrary-code-via-malformed-packets/]]></link>
			<title>Critical Wireshark Vulnerabilities Let Attackers Execute Arbitrary Code Via Malformed Packets</title>
			<pubDate><![CDATA[Fri, 01 May 2026 05:08:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/anthropic-launches-claude-security-in-public-beta-for-enterprise-customers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/anthropic-launches-claude-security-in-public-beta-for-enterprise-customers/]]></link>
			<title>Anthropic Launches Claude Security in Public Beta for Enterprise Customers</title>
			<pubDate><![CDATA[Fri, 01 May 2026 04:09:52 +0000]]></pubDate>
		</item>
				</channel>
</rss>
