<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 21, 2026 at 01:32 by All in One SEO v4.8.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cryptika.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cryptika Cybersecurity</title>
		<link><![CDATA[https://www.cryptika.com]]></link>
		<description><![CDATA[Cryptika Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Thu, 16 Apr 2026 04:34:27 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cryptika.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-abuse-google-discover-with-ai-generated-content-to-push-malicious-notifications/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-abuse-google-discover-with-ai-generated-content-to-push-malicious-notifications/]]></link>
			<title>Hackers Abuse Google Discover With AI-Generated Content to Push Malicious Notifications</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 04:34:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/blog/]]></guid>
			<link><![CDATA[https://www.cryptika.com/blog/]]></link>
			<title>Cybersecurity Blog</title>
			<pubDate><![CDATA[Sun, 05 Jun 2022 13:24:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/]]></guid>
			<link><![CDATA[https://www.cryptika.com/]]></link>
			<title>Cryptika Cyber Security</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 15:16:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/gh0st-rat-and-cloverplus-adware-delivered-together-in-new-dual-payload-malware-campaign/]]></guid>
			<link><![CDATA[https://www.cryptika.com/gh0st-rat-and-cloverplus-adware-delivered-together-in-new-dual-payload-malware-campaign/]]></link>
			<title>Gh0st RAT and CloverPlus Adware Delivered Together in New Dual-Payload Malware Campaign</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 20:39:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-appdomain-hijacking-to-turn-trusted-intel-utility-into-malware-launcher/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-appdomain-hijacking-to-turn-trusted-intel-utility-into-malware-launcher/]]></link>
			<title>Hackers Use AppDomain Hijacking to Turn Trusted Intel Utility Into Malware Launcher</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 20:31:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-teams-right-click-paste-broken-following-edge-browser-update/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-teams-right-click-paste-broken-following-edge-browser-update/]]></link>
			<title>Microsoft Teams Right-Click Paste Broken Following Edge Browser Update</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 06:48:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/north-korea-linked-unc1069-uses-fake-zoom-and-teams-meetings-to-hack-crypto-professionals/]]></guid>
			<link><![CDATA[https://www.cryptika.com/north-korea-linked-unc1069-uses-fake-zoom-and-teams-meetings-to-hack-crypto-professionals/]]></link>
			<title>North Korea-Linked UNC1069 Uses Fake Zoom and Teams Meetings to Hack Crypto Professionals</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 18:57:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/researchers-say-iranian-mois-uses-multiple-hacker-personas-for-one-coordinated-cyber-campaign/]]></guid>
			<link><![CDATA[https://www.cryptika.com/researchers-say-iranian-mois-uses-multiple-hacker-personas-for-one-coordinated-cyber-campaign/]]></link>
			<title>Researchers Say Iranian MOIS Uses Multiple Hacker Personas for One Coordinated Cyber Campaign</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 16:48:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/lovable-ai-app-builder-reportedly-exposes-thousands-of-projects-data-via-api-flaw/]]></guid>
			<link><![CDATA[https://www.cryptika.com/lovable-ai-app-builder-reportedly-exposes-thousands-of-projects-data-via-api-flaw/]]></link>
			<title>Lovable AI App Builder Reportedly Exposes Thousands of Projects Data via API Flaw</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 16:09:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/openai-expands-cyber-defense-program-with-gpt-5-4-cyber-access-for-trusted-organizations/]]></guid>
			<link><![CDATA[https://www.cryptika.com/openai-expands-cyber-defense-program-with-gpt-5-4-cyber-access-for-trusted-organizations/]]></link>
			<title>OpenAI Expands Cyber Defense Program With GPT-5.4-Cyber Access for Trusted Organizations</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 06:35:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/attackers-turn-qemu-into-a-stealth-backdoor-for-credential-theft-and-ransomware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/attackers-turn-qemu-into-a-stealth-backdoor-for-credential-theft-and-ransomware/]]></link>
			<title>Attackers Turn QEMU Into a Stealth Backdoor for Credential Theft and Ransomware</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 14:42:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/researcher-uses-claude-opus-to-build-a-working-chrome-exploit-chain/]]></guid>
			<link><![CDATA[https://www.cryptika.com/researcher-uses-claude-opus-to-build-a-working-chrome-exploit-chain/]]></link>
			<title>Researcher Uses Claude Opus to Build a Working Chrome Exploit Chain</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 12:16:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fiverr-allegedly-leaks-user-information-to-google-indexing-researchers-say/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fiverr-allegedly-leaks-user-information-to-google-indexing-researchers-say/]]></link>
			<title>Fiverr Allegedly Leaks User Information to Google Indexing, Researchers Say</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 09:02:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/nexcorium-associated-mirai-variant-uses-tbk-dvr-exploit-to-scale-botnet-operations/]]></guid>
			<link><![CDATA[https://www.cryptika.com/nexcorium-associated-mirai-variant-uses-tbk-dvr-exploit-to-scale-botnet-operations/]]></link>
			<title>Nexcorium-Associated Mirai Variant Uses TBK DVR Exploit to Scale Botnet Operations</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 08:42:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/nearly-6-million-internet-facing-ftp-servers-still-exposed-in-2026-censys-warns/]]></guid>
			<link><![CDATA[https://www.cryptika.com/nearly-6-million-internet-facing-ftp-servers-still-exposed-in-2026-censys-warns/]]></link>
			<title>Nearly 6 Million Internet-Facing FTP Servers Still Exposed in 2026, Censys Warns</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 02:43:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/poc-exploit-released-for-fortisandbox-vulnerability-that-allows-attacker-to-execute-commands/]]></guid>
			<link><![CDATA[https://www.cryptika.com/poc-exploit-released-for-fortisandbox-vulnerability-that-allows-attacker-to-execute-commands/]]></link>
			<title>PoC Exploit Released for FortiSandbox Vulnerability that Allows Attacker to Execute Commands</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 02:38:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-miningdropper-to-deliver-infostealers-rats-and-banking-malware-on-android/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-miningdropper-to-deliver-infostealers-rats-and-banking-malware-on-android/]]></link>
			<title>Hackers Use MiningDropper to Deliver Infostealers, RATs, and Banking Malware on Android</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 11:27:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/apple-works-on-fix-for-iphone-passcode-bug-linked-to-missing-czech-keyboard-character/]]></guid>
			<link><![CDATA[https://www.cryptika.com/apple-works-on-fix-for-iphone-passcode-bug-linked-to-missing-czech-keyboard-character/]]></link>
			<title>Apple Works on Fix for iPhone Passcode Bug Linked to Missing Czech Keyboard Character</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 12:50:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-rdp-alert-after-april-2026-security-update-warns-of-unknown-connections/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-rdp-alert-after-april-2026-security-update-warns-of-unknown-connections/]]></link>
			<title>New RDP Alert After April 2026 Security Update Warns of Unknown Connections</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:14:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-fud-crypt-to-generate-microsoft-signed-malware-with-built-in-persistence-and-c2/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-fud-crypt-to-generate-microsoft-signed-malware-with-built-in-persistence-and-c2/]]></link>
			<title>Hackers Use FUD Crypt to Generate Microsoft-Signed Malware With Built-In Persistence and C2</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:08:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/nist-shifts-to-risk-based-nvd-model-as-cve-submissions-surge-263-since-2020/]]></guid>
			<link><![CDATA[https://www.cryptika.com/nist-shifts-to-risk-based-nvd-model-as-cve-submissions-surge-263-since-2020/]]></link>
			<title>NIST Shifts to Risk-Based NVD Model as CVE Submissions Surge 263% Since 2020</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 08:05:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/google-uses-gemini-ai-to-stop-malicious-ads-from-threat-actors-8-3-billion-ads-blocked/]]></guid>
			<link><![CDATA[https://www.cryptika.com/google-uses-gemini-ai-to-stop-malicious-ads-from-threat-actors-8-3-billion-ads-blocked/]]></link>
			<title>Google Uses Gemini AI to Stop Malicious Ads From Threat Actors – 8.3 billion ads Blocked</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 08:02:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-vulnerability-in-flowise-allows-remote-command-execution-via-mcp-adapters/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-vulnerability-in-flowise-allows-remote-command-execution-via-mcp-adapters/]]></link>
			<title>Critical Vulnerability In Flowise Allows Remote Command Execution Via MCP Adapters</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 04:15:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/vercel-confirms-data-breach-hackers-claim-access-to-internal-systems/]]></guid>
			<link><![CDATA[https://www.cryptika.com/vercel-confirms-data-breach-hackers-claim-access-to-internal-systems/]]></link>
			<title>Vercel Confirms Data Breach — Hackers Claim Access to Internal Systems</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 02:29:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-target-tp-link-routers-with-mirai-malware-in-cve-2023-33538-exploitation-attempts/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-target-tp-link-routers-with-mirai-malware-in-cve-2023-33538-exploitation-attempts/]]></link>
			<title>Hackers Target TP-Link Routers With Mirai Malware in CVE-2023-33538 Exploitation Attempts</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 17:53:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/email-borne-worm-surge-drives-new-threat-wave-across-industrial-control-systems/]]></guid>
			<link><![CDATA[https://www.cryptika.com/email-borne-worm-surge-drives-new-threat-wave-across-industrial-control-systems/]]></link>
			<title>Email-Borne Worm Surge Drives New Threat Wave Across Industrial Control Systems</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 16:04:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fake-zoom-sdk-update-delivers-sapphire-sleet-malware-in-new-macos-intrusion-chain/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fake-zoom-sdk-update-delivers-sapphire-sleet-malware-in-new-macos-intrusion-chain/]]></link>
			<title>Fake Zoom SDK Update Delivers Sapphire Sleet Malware in New macOS Intrusion Chain</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 15:17:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/two-u-s-nationals-sentenced-for-running-laptop-farm-for-dprk-remote-workers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/two-u-s-nationals-sentenced-for-running-laptop-farm-for-dprk-remote-workers/]]></link>
			<title>Two U.S. Nationals Sentenced for Running Laptop Farm for DPRK Remote Workers</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:49:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/attackers-weaponize-cve-2026-39987-to-spread-blockchain-based-backdoor-via-hugging-face/]]></guid>
			<link><![CDATA[https://www.cryptika.com/attackers-weaponize-cve-2026-39987-to-spread-blockchain-based-backdoor-via-hugging-face/]]></link>
			<title>Attackers Weaponize CVE-2026-39987 to Spread Blockchain-Based Backdoor Via Hugging Face</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 14:14:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/about/about-cryptika-cybersecurity-kuwait/]]></guid>
			<link><![CDATA[https://www.cryptika.com/about/about-cryptika-cybersecurity-kuwait/]]></link>
			<title>About Cryptika Cybersecurity &#8211; Kuwait</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:42:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fake-ledger-hardware-wallets-on-chinese-marketplaces-steal-crypto-seeds-and-pins/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fake-ledger-hardware-wallets-on-chinese-marketplaces-steal-crypto-seeds-and-pins/]]></link>
			<title>Fake Ledger Hardware Wallets on Chinese Marketplaces Steal Crypto Seeds and PINs</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 14:07:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/anthropic-releases-claude-opus-4-7-with-automated-real-time-cybersecurity-safeguards/]]></guid>
			<link><![CDATA[https://www.cryptika.com/anthropic-releases-claude-opus-4-7-with-automated-real-time-cybersecurity-safeguards/]]></link>
			<title>Anthropic Releases Claude Opus 4.7 with Automated Real-Time Cybersecurity Safeguards</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 13:28:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/about/about-cryptika-cyber-security-doha-qatar/]]></guid>
			<link><![CDATA[https://www.cryptika.com/about/about-cryptika-cyber-security-doha-qatar/]]></link>
			<title>About Cryptika Cybersecurity &#8211; Qatar</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:41:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/payouts-king-rises-as-new-ransomware-threat-linked-to-former-blackbasta-affiliates/]]></guid>
			<link><![CDATA[https://www.cryptika.com/payouts-king-rises-as-new-ransomware-threat-linked-to-former-blackbasta-affiliates/]]></link>
			<title>Payouts King Rises as New Ransomware Threat Linked to Former BlackBasta Affiliates</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 10:44:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-apache-activemq-input-validation-vulnerability-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-apache-activemq-input-validation-vulnerability-exploited-in-attacks/]]></link>
			<title>CISA Warns of Apache ActiveMQ Input Validation Vulnerability Exploited in Attacks</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 10:36:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/leaked-windows-defender-0-day-vulnerability-actively-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/leaked-windows-defender-0-day-vulnerability-actively-exploited-in-attacks/]]></link>
			<title>Leaked Windows Defender 0-Day Vulnerability Actively Exploited in Attacks</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 10:24:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-confirms-windows-servers-enter-reboot-loops-following-april-patches/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-confirms-windows-servers-enter-reboot-loops-following-april-patches/]]></link>
			<title>Microsoft Confirms Windows Servers Enter Reboot Loops Following April Patches</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 08:51:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/windows-snipping-tool-vulnerability-allows-attacker-to-perform-spoofing-over-a-network/]]></guid>
			<link><![CDATA[https://www.cryptika.com/windows-snipping-tool-vulnerability-allows-attacker-to-perform-spoofing-over-a-network/]]></link>
			<title>Windows Snipping Tool Vulnerability Allows Attacker to Perform Spoofing Over a Network</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 08:41:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/spankrat-exploits-windows-explorer-processes-for-stealth-and-delayed-detection/]]></guid>
			<link><![CDATA[https://www.cryptika.com/spankrat-exploits-windows-explorer-processes-for-stealth-and-delayed-detection/]]></link>
			<title>SpankRAT Exploits Windows Explorer Processes for Stealth and Delayed Detection</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 17:31:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/about/in-jordan/]]></guid>
			<link><![CDATA[https://www.cryptika.com/about/in-jordan/]]></link>
			<title>Jordan Cyber Security | Information Security</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 13:18:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-365-web-services-hit-by-google-chrome-147-compatibility-issue/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-365-web-services-hit-by-google-chrome-147-compatibility-issue/]]></link>
			<title>Microsoft 365 Web Services Hit by Google Chrome 147 Compatibility Issue</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 12:54:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/about/cybersecurity-in-dubai/]]></guid>
			<link><![CDATA[https://www.cryptika.com/about/cybersecurity-in-dubai/]]></link>
			<title>About Cryptika Cybersecurity &#8211; Dubai</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:40:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/about/]]></guid>
			<link><![CDATA[https://www.cryptika.com/about/]]></link>
			<title>About Cryptika Cyber Security</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:36:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-uac-0247-campaign-steals-browser-and-whatsapp-data-from-hospitals-and-governments/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-uac-0247-campaign-steals-browser-and-whatsapp-data-from-hospitals-and-governments/]]></link>
			<title>New UAC-0247 Campaign Steals Browser and WhatsApp Data From Hospitals and Governments</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:32:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-cisco-ise-vulnerabilities-let-remote-attackers-execute-malicious-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-cisco-ise-vulnerabilities-let-remote-attackers-execute-malicious-code/]]></link>
			<title>Critical Cisco ISE Vulnerabilities Let Remote Attackers Execute Malicious Code</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:32:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/31-high-impact-vulnerabilities-exploited-in-march-as-interlock-hits-cisco-fmc-zero-day/]]></guid>
			<link><![CDATA[https://www.cryptika.com/31-high-impact-vulnerabilities-exploited-in-march-as-interlock-hits-cisco-fmc-zero-day/]]></link>
			<title>31 High-Impact Vulnerabilities Exploited in March as Interlock Hits Cisco FMC Zero-Day</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 08:51:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-chrome-privacy-analysis-shows-how-fingerprinting-and-header-leaks-can-expose-users/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-chrome-privacy-analysis-shows-how-fingerprinting-and-header-leaks-can-expose-users/]]></link>
			<title>New Chrome Privacy Analysis Shows How Fingerprinting and Header Leaks Can Expose Users</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 08:36:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/splunk-enterprise-and-cloud-platform-vulnerability-enables-remote-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/splunk-enterprise-and-cloud-platform-vulnerability-enables-remote-code-execution-attacks/]]></link>
			<title>Splunk Enterprise and Cloud Platform Vulnerability Enables Remote Code Execution Attacks</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 07:42:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/1250-c2-servers-mapped-across-russian-hosting-across-165-providers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/1250-c2-servers-mapped-across-russian-hosting-across-165-providers/]]></link>
			<title>1,250+ C2 Servers Mapped Across Russian Hosting Across 165 Providers</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 06:14:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/one-click-rce-in-azure-windows-admin-center-allow-attacker-to-execute-arbitrary-commands/]]></guid>
			<link><![CDATA[https://www.cryptika.com/one-click-rce-in-azure-windows-admin-center-allow-attacker-to-execute-arbitrary-commands/]]></link>
			<title>One-Click RCE in Azure Windows Admin Center Allow Attacker to Execute Arbitrary Commands</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 08:30:37 +0000]]></pubDate>
		</item>
				</channel>
</rss>
