<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 21:17 by All in One SEO v4.8.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cryptika.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cryptika Cybersecurity</title>
		<link><![CDATA[https://www.cryptika.com]]></link>
		<description><![CDATA[Cryptika Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Thu, 02 Apr 2026 16:58:08 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cryptika.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cryptika.com/how-elite-socs-cut-escalation-rates-by-arming-tier-1-with-better-threat-intelligence/]]></guid>
			<link><![CDATA[https://www.cryptika.com/how-elite-socs-cut-escalation-rates-by-arming-tier-1-with-better-threat-intelligence/]]></link>
			<title>How Elite SOCs Cut Escalation Rates by Arming Tier 1 With Better Threat Intelligence</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:58:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/14000-f5-big-ip-apm-devices-exposed-online-amid-active-rce-vulnerability-exploits/]]></guid>
			<link><![CDATA[https://www.cryptika.com/14000-f5-big-ip-apm-devices-exposed-online-amid-active-rce-vulnerability-exploits/]]></link>
			<title>14,000+ F5 BIG-IP APM Devices Exposed Online Amid Active RCE Vulnerability Exploits</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:02:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/kimsuky-deploys-malicious-lnk-files-to-deliver-python-based-backdoor-in-multi-stage-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/kimsuky-deploys-malicious-lnk-files-to-deliver-python-based-backdoor-in-multi-stage-attack/]]></link>
			<title>Kimsuky Deploys Malicious LNK Files to Deliver Python-Based Backdoor in Multi-Stage Attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:43:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/axios-maintainer-confirms-the-npm-compromise-was-via-a-targeted-social-engineering-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/axios-maintainer-confirms-the-npm-compromise-was-via-a-targeted-social-engineering-attack/]]></link>
			<title>Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:22:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-abuse-trusted-platforms-to-steal-bank-credentials-from-philippine-users/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-abuse-trusted-platforms-to-steal-bank-credentials-from-philippine-users/]]></link>
			<title>Hackers Abuse Trusted Platforms to Steal Bank Credentials From Philippine Users</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:09:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/malicious-chrome-extension-chatgpt-ad-blocker-steals-chatgpt-conversations/]]></guid>
			<link><![CDATA[https://www.cryptika.com/malicious-chrome-extension-chatgpt-ad-blocker-steals-chatgpt-conversations/]]></link>
			<title>Malicious Chrome Extension “ChatGPT Ad Blocker” Steals ChatGPT Conversations</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 11:23:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-phorpiex-botnet-to-spread-ransomware-sextortion-and-crypto-clipping-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-phorpiex-botnet-to-spread-ransomware-sextortion-and-crypto-clipping-malware/]]></link>
			<title>Hackers Use Phorpiex Botnet to Spread Ransomware, Sextortion, and Crypto-Clipping Malware</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 10:28:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-venom-stealer-to-turn-clickfix-lures-into-full-data-exfiltration-pipelines/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-venom-stealer-to-turn-clickfix-lures-into-full-data-exfiltration-pipelines/]]></link>
			<title>Hackers Use Venom Stealer to Turn ClickFix Lures Into Full Data Exfiltration Pipelines</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 10:19:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-clone-cert-ua-site-to-trick-victims-into-installing-go-based-rat/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-clone-cert-ua-site-to-trick-victims-into-installing-go-based-rat/]]></link>
			<title>Hackers Clone CERT-UA Site to Trick Victims Into Installing Go-Based RAT</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:15:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-forcing-upgrades-to-unmanaged-windows-11-version-24h2/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-forcing-upgrades-to-unmanaged-windows-11-version-24h2/]]></link>
			<title>Microsoft Forcing Upgrades to Unmanaged Windows 11, Version 24H2</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:19:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/multiple-tp-link-vulnerabilities-let-attackers-trigger-dos-and-crash-routers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/multiple-tp-link-vulnerabilities-let-attackers-trigger-dos-and-crash-routers/]]></link>
			<title>Multiple TP-Link Vulnerabilities Let Attackers Trigger DoS and Crash Routers</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:50:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-compromised-700-next-js-hosts-by-exploiting-react2shell-vulnerability/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-compromised-700-next-js-hosts-by-exploiting-react2shell-vulnerability/]]></link>
			<title>Hackers Compromised 700+ Next.js Hosts by Exploiting React2Shell Vulnerability</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 07:38:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cert-eu-confirms-trivy-supply-chain-attack-led-to-european-commission-aws-breach/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cert-eu-confirms-trivy-supply-chain-attack-led-to-european-commission-aws-breach/]]></link>
			<title>CERT-EU Confirms Trivy Supply Chain Attack Led to European Commission AWS Breach</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 07:25:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/north-korea-linked-hackers-compromise-axios-npm-package-in-major-supply-chain-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/north-korea-linked-hackers-compromise-axios-npm-package-in-major-supply-chain-attack/]]></link>
			<title>North Korea-Linked Hackers Compromise Axios npm Package in Major Supply Chain Attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 06:42:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/north-korea-related-campaign-abuses-github-as-c2-in-new-lnk-phishing-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/north-korea-related-campaign-abuses-github-as-c2-in-new-lnk-phishing-attacks/]]></link>
			<title>North Korea-Related Campaign Abuses GitHub as C2 in New LNK Phishing Attacks</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 05:53:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/20-best-application-performance-monitoring-tools-in-2026/]]></guid>
			<link><![CDATA[https://www.cryptika.com/20-best-application-performance-monitoring-tools-in-2026/]]></link>
			<title>20 Best Application Performance Monitoring Tools in 2026</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 05:30:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/best-vpn-for-linux-in-2026/]]></guid>
			<link><![CDATA[https://www.cryptika.com/best-vpn-for-linux-in-2026/]]></link>
			<title>Best VPN For Linux In 2026</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 05:20:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/adobe-breach-threat-actor-allegedly-claims-leak-of-13-million-support-tickets-and-employee-records/]]></guid>
			<link><![CDATA[https://www.cryptika.com/adobe-breach-threat-actor-allegedly-claims-leak-of-13-million-support-tickets-and-employee-records/]]></link>
			<title>Adobe Breach – Threat Actor Allegedly Claims Leak of 13 Million Support Tickets and Employee Records</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 02:29:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/qilin-ransomware-uses-malicious-dll-to-kill-almost-every-vendors-edr-solutions/]]></guid>
			<link><![CDATA[https://www.cryptika.com/qilin-ransomware-uses-malicious-dll-to-kill-almost-every-vendors-edr-solutions/]]></link>
			<title>Qilin Ransomware Uses Malicious DLL to Kill Almost Every Vendor’s EDR Solutions</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 15:42:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/openssh-10-3-fixes-shell-injection-and-multiple-ssh-security-issues/]]></guid>
			<link><![CDATA[https://www.cryptika.com/openssh-10-3-fixes-shell-injection-and-multiple-ssh-security-issues/]]></link>
			<title>OpenSSH 10.3 Fixes Shell Injection and Multiple SSH Security Issues</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:54:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-abuse-docx-rtf-js-and-python-in-stealthy-boeing-rfq-malware-campaign/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-abuse-docx-rtf-js-and-python-in-stealthy-boeing-rfq-malware-campaign/]]></link>
			<title>Hackers Abuse DOCX, RTF, JS, and Python in Stealthy Boeing RFQ Malware Campaign</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:53:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/magecart-hackers-uses-100-domains-to-hijack-estores-checkouts-and-steal-card-data/]]></guid>
			<link><![CDATA[https://www.cryptika.com/magecart-hackers-uses-100-domains-to-hijack-estores-checkouts-and-steal-card-data/]]></link>
			<title>Magecart Hackers Uses 100+ Domains to Hijack eStores Checkouts and Steal Card Data</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 17:13:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/]]></guid>
			<link><![CDATA[https://www.cryptika.com/]]></link>
			<title>Cryptika Cyber Security</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 15:16:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-actively-exploiting-critical-weblogic-rce-vulnerabilities-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-actively-exploiting-critical-weblogic-rce-vulnerabilities-in-attacks/]]></link>
			<title>Hackers Actively Exploiting Critical WebLogic RCE Vulnerabilities in Attacks</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 13:01:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-chrome-0-day-vulnerability-actively-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-chrome-0-day-vulnerability-actively-exploited-in-attacks/]]></link>
			<title>CISA Warns of Chrome 0-Day Vulnerability Actively Exploited in Attacks</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:31:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/novoice-on-google-play-with-22-exploits-attacks-millions-of-android-users/]]></guid>
			<link><![CDATA[https://www.cryptika.com/novoice-on-google-play-with-22-exploits-attacks-millions-of-android-users/]]></link>
			<title>NoVoice on Google Play with 22 Exploits Attacks Millions of Android Users</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 13:50:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/apple-expands-ios-18-7-7-update-to-more-devices-to-shield-users-from-darksword-exploit/]]></guid>
			<link><![CDATA[https://www.cryptika.com/apple-expands-ios-18-7-7-update-to-more-devices-to-shield-users-from-darksword-exploit/]]></link>
			<title>Apple Expands iOS 18.7.7 Update to More Devices to Shield Users from DarkSword Exploit</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 11:54:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/apple-expands-ios-18-7-7-update-to-more-devices-to-shield-users-from-darksword-exploit-2/]]></guid>
			<link><![CDATA[https://www.cryptika.com/apple-expands-ios-18-7-7-update-to-more-devices-to-shield-users-from-darksword-exploit-2/]]></link>
			<title>Apple Expands iOS 18.7.7 Update to More Devices to Shield Users from DarkSword Exploit</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 11:54:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-zap-ptk-add-on-maps-browser-based-security-findings-as-native-alert-into-zap/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-zap-ptk-add-on-maps-browser-based-security-findings-as-native-alert-into-zap/]]></link>
			<title>New ZAP PTK Add-On Maps Browser-Based Security Findings as Native Alert Into ZAP</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 11:27:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-zap-ptk-add-on-maps-browser-based-security-findings-as-native-alert-into-zap-2/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-zap-ptk-add-on-maps-browser-based-security-findings-as-native-alert-into-zap-2/]]></link>
			<title>New ZAP PTK Add-On Maps Browser-Based Security Findings as Native Alert Into ZAP</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 11:27:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/whatsapp-warns-users-targeted-by-spyware-attack-via-weaponized-version-of-the-app/]]></guid>
			<link><![CDATA[https://www.cryptika.com/whatsapp-warns-users-targeted-by-spyware-attack-via-weaponized-version-of-the-app/]]></link>
			<title>WhatsApp Warns Users Targeted by Spyware Attack via Weaponized Version of the App</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 11:05:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisco-smart-software-manager-vulnerability-let-attackers-execute-arbitrary-commands/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisco-smart-software-manager-vulnerability-let-attackers-execute-arbitrary-commands/]]></link>
			<title>Cisco Smart Software Manager Vulnerability Let Attackers Execute Arbitrary Commands</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:13:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/oracle-lays-off-30000-employees-to-ramp-up-investment-in-ai-technologies/]]></guid>
			<link><![CDATA[https://www.cryptika.com/oracle-lays-off-30000-employees-to-ramp-up-investment-in-ai-technologies/]]></link>
			<title>Oracle Lays Off 30,000 Employees to Ramp Up Investment in AI Technologies</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:06:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-px4-autopilot-vulnerability-let-attackers-gain-control-over-the-drones/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-px4-autopilot-vulnerability-let-attackers-gain-control-over-the-drones/]]></link>
			<title>Critical PX4 Autopilot Vulnerability Let Attackers Gain Control Over the Drones</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 09:36:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fbi-warns-of-chinese-mobile-apps-may-expose-user-data-to-cyberattacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fbi-warns-of-chinese-mobile-apps-may-expose-user-data-to-cyberattacks/]]></link>
			<title>FBI Warns of Chinese Mobile Apps May Expose User Data to Cyberattacks</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 09:35:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/google-clouds-vertex-ai-platform-vulnerability-allow-attackers-to-access-sensitive-data/]]></guid>
			<link><![CDATA[https://www.cryptika.com/google-clouds-vertex-ai-platform-vulnerability-allow-attackers-to-access-sensitive-data/]]></link>
			<title>Google Cloud’s Vertex AI platform Vulnerability Allow Attackers to Access Sensitive Data</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 13:06:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/ta416-expands-espionage-operations-across-europe-with-web-bug-recon-and-malware-delivery/]]></guid>
			<link><![CDATA[https://www.cryptika.com/ta416-expands-espionage-operations-across-europe-with-web-bug-recon-and-malware-delivery/]]></link>
			<title>TA416 Expands Espionage Operations Across Europe With Web Bug Recon and Malware Delivery</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 09:16:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-copilot-terms-of-service-label-copilot-is-for-entertainment-purposes-only/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-copilot-terms-of-service-label-copilot-is-for-entertainment-purposes-only/]]></link>
			<title>Microsoft Copilot Terms of Service Label Copilot is for Entertainment Purposes Only</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 08:45:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-whatsapp-attack-chain-uses-vbs-scripts-cloud-downloads-and-msi-backdoors/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-whatsapp-attack-chain-uses-vbs-scripts-cloud-downloads-and-msi-backdoors/]]></link>
			<title>New WhatsApp Attack Chain Uses VBS Scripts, Cloud Downloads, and MSI Backdoors</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 08:24:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-cisco-imc-vulnerability-let-attackers-bypass-authentication/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-cisco-imc-vulnerability-let-attackers-bypass-authentication/]]></link>
			<title>Critical Cisco IMC Vulnerability Let Attackers Bypass Authentication</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 07:26:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/remcos-rat-infection-chain-hides-behind-obfuscated-scripts-and-trusted-windows-binaries/]]></guid>
			<link><![CDATA[https://www.cryptika.com/remcos-rat-infection-chain-hides-behind-obfuscated-scripts-and-trusted-windows-binaries/]]></link>
			<title>Remcos RAT Infection Chain Hides Behind Obfuscated Scripts and Trusted Windows Binaries</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 07:06:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/top-20-best-digital-forensic-tools-in-2026/]]></guid>
			<link><![CDATA[https://www.cryptika.com/top-20-best-digital-forensic-tools-in-2026/]]></link>
			<title>Top 20 Best Digital Forensic Tools in 2026</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 05:30:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/vim-modeline-bypass-vulnerability-let-attackers-execute-arbitrary-os-commands/]]></guid>
			<link><![CDATA[https://www.cryptika.com/vim-modeline-bypass-vulnerability-let-attackers-execute-arbitrary-os-commands/]]></link>
			<title>Vim Modeline Bypass Vulnerability Let Attackers Execute Arbitrary OS Commands</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 02:31:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/public-poc-exploit-released-for-nginx-ui-backup-restore-vulnerability/]]></guid>
			<link><![CDATA[https://www.cryptika.com/public-poc-exploit-released-for-nginx-ui-backup-restore-vulnerability/]]></link>
			<title>Public PoC Exploit Released for Nginx-UI Backup Restore Vulnerability</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 02:29:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-to-remove-exif-data-for-images-shared-on-teams/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-to-remove-exif-data-for-images-shared-on-teams/]]></link>
			<title>Microsoft to Remove EXIF Data for Images Shared on Teams</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 02:05:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/russian-hackers-using-remote-access-toolkit-ctrl-for-rdp-hijacking/]]></guid>
			<link><![CDATA[https://www.cryptika.com/russian-hackers-using-remote-access-toolkit-ctrl-for-rdp-hijacking/]]></link>
			<title>Russian Hackers Using Remote Access Toolkit “CTRL” for  RDP Hijacking</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 12:58:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-details-steps-to-mitigate-the-axios-npm-supply-chain-compromise/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-details-steps-to-mitigate-the-axios-npm-supply-chain-compromise/]]></link>
			<title>Microsoft Details Steps to Mitigate the Axios npm Supply Chain Compromise</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:37:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-hijack-hotel-booking-workflows-to-scam-guests-with-fake-payment-requests/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-hijack-hotel-booking-workflows-to-scam-guests-with-fake-payment-requests/]]></link>
			<title>Hackers Hijack Hotel Booking Workflows to Scam Guests With Fake Payment Requests</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 10:56:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisco-source-code-and-data-leak-allegedly-claimed-by-shinyhunters/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisco-source-code-and-data-leak-allegedly-claimed-by-shinyhunters/]]></link>
			<title>Cisco Source Code and Data Leak Allegedly Claimed by ShinyHunters</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 10:55:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/blog/]]></guid>
			<link><![CDATA[https://www.cryptika.com/blog/]]></link>
			<title>Cybersecurity Blog</title>
			<pubDate><![CDATA[Sun, 05 Jun 2022 13:24:57 +0000]]></pubDate>
		</item>
				</channel>
</rss>
