<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 25, 2026 at 13:32 by All in One SEO v4.8.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cryptika.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cryptika Cybersecurity</title>
		<link><![CDATA[https://www.cryptika.com]]></link>
		<description><![CDATA[Cryptika Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Thu, 23 Apr 2026 12:53:24 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cryptika.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cryptika.com/fake-tradingview-ai-agent-site-is-delivering-needle-stealer-malware-via-fake-tradingclaw/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fake-tradingview-ai-agent-site-is-delivering-needle-stealer-malware-via-fake-tradingclaw/]]></link>
			<title>Fake TradingView AI Agent Site is Delivering Needle Stealer Malware via Fake TradingClaw</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 12:53:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-can-abuse-entra-agent-id-administrator-role-to-hijack-service-principals/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-can-abuse-entra-agent-id-administrator-role-to-hijack-service-principals/]]></link>
			<title>Hackers Can Abuse Entra Agent ID Administrator Role to Hijack Service Principals</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 06:37:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/adt-confirms-data-breach-following-shinyhunters-data-leak-claim/]]></guid>
			<link><![CDATA[https://www.cryptika.com/adt-confirms-data-breach-following-shinyhunters-data-leak-claim/]]></link>
			<title>ADT Confirms Data Breach Following ShinyHunters Data Leak Claim</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 02:25:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-exploiting-cisco-firepower-devices-using-n-day-vulnerabilities-to-gain-unauthorized-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-exploiting-cisco-firepower-devices-using-n-day-vulnerabilities-to-gain-unauthorized-access/]]></link>
			<title>Hackers Exploiting Cisco Firepower Devices’ Using n-day Vulnerabilities to Gain Unauthorized Access</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 02:05:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/claude-desktop-reportedly-adds-browser-access-bridge-to-multiple-chromium-based-browsers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/claude-desktop-reportedly-adds-browser-access-bridge-to-multiple-chromium-based-browsers/]]></link>
			<title>Claude Desktop Reportedly Adds Browser Access Bridge to Multiple Chromium-Based Browsers</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 16:20:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-fake-captcha-pages-to-trigger-costly-international-sms-fraud/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-fake-captcha-pages-to-trigger-costly-international-sms-fraud/]]></link>
			<title>Hackers Use Fake CAPTCHA Pages to Trigger Costly International SMS Fraud</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 13:40:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-pastebin-hosted-powershell-script-to-steal-telegram-sessions/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-pastebin-hosted-powershell-script-to-steal-telegram-sessions/]]></link>
			<title>Hackers Use Pastebin-Hosted PowerShell Script to Steal Telegram Sessions</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 13:23:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/void-dokkaebi-hackers-use-fake-job-interviews-to-spread-malware-via-code-repositories/]]></guid>
			<link><![CDATA[https://www.cryptika.com/void-dokkaebi-hackers-use-fake-job-interviews-to-spread-malware-via-code-repositories/]]></link>
			<title>Void Dokkaebi Hackers Use Fake Job Interviews to Spread Malware via Code Repositories</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 12:37:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/xiongmai-ip-camera-vulnerability-let-attackers-bypass-authentication-and-have-remote-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/xiongmai-ip-camera-vulnerability-let-attackers-bypass-authentication-and-have-remote-access/]]></link>
			<title>Xiongmai IP Camera Vulnerability Let Attackers Bypass Authentication and have Remote Access</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 11:40:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/python-vulnerability-allows-out-of-bounds-write-on-windows-systems/]]></guid>
			<link><![CDATA[https://www.cryptika.com/python-vulnerability-allows-out-of-bounds-write-on-windows-systems/]]></link>
			<title>Python Vulnerability Allows Out-of-Bounds Write on Windows Systems</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 11:38:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/udemy-data-breach-shinyhunters-allegedly-claims-compromise-of-1-4m-user-records/]]></guid>
			<link><![CDATA[https://www.cryptika.com/udemy-data-breach-shinyhunters-allegedly-claims-compromise-of-1-4m-user-records/]]></link>
			<title>Udemy Data Breach – ShinyHunters Allegedly Claims Compromise of 1.4M User Records</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 11:25:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-telegram-bots-to-track-900-successful-react2shell-exploits/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-telegram-bots-to-track-900-successful-react2shell-exploits/]]></link>
			<title>Hackers Use Telegram Bots to Track 900+ Successful React2Shell Exploits</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 08:06:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/ransomware-hackers-develop-custom-exfiltration-tool-to-steal-sensitive-data/]]></guid>
			<link><![CDATA[https://www.cryptika.com/ransomware-hackers-develop-custom-exfiltration-tool-to-steal-sensitive-data/]]></link>
			<title>Ransomware Hackers Develop Custom Exfiltration Tool to Steal Sensitive Data</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 07:45:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-abuse-ss7-and-diameter-protocols-to-track-mobile-users-worldwide/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-abuse-ss7-and-diameter-protocols-to-track-mobile-users-worldwide/]]></link>
			<title>Hackers Abuse SS7 and Diameter Protocols to Track Mobile Users Worldwide</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 06:11:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/109-fake-github-repositories-used-to-deliver-smartloader-and-stealc-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/109-fake-github-repositories-used-to-deliver-smartloader-and-stealc-malware/]]></link>
			<title>109 Fake GitHub Repositories Used to Deliver SmartLoader and StealC Malware</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 21:03:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-teams-issue-blocking-users-from-joining-meetings-following-edge-browser-update/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-teams-issue-blocking-users-from-joining-meetings-following-edge-browser-update/]]></link>
			<title>Microsoft Teams Issue Blocking Users From Joining Meetings Following Edge browser update</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 04:44:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-leverage-microsoft-teams-to-breach-organizations-posing-as-it-helpdesk-staff/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-leverage-microsoft-teams-to-breach-organizations-posing-as-it-helpdesk-staff/]]></link>
			<title>Hackers Leverage Microsoft Teams to Breach Organizations Posing as IT Helpdesk Staff</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 02:20:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/north-korean-hackers-use-fake-it-worker-scheme-to-infiltrate-companies-and-evade-sanctions/]]></guid>
			<link><![CDATA[https://www.cryptika.com/north-korean-hackers-use-fake-it-worker-scheme-to-infiltrate-companies-and-evade-sanctions/]]></link>
			<title>North Korean Hackers Use Fake IT Worker Scheme to Infiltrate Companies and Evade Sanctions</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 19:48:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/malicious-google-ads-target-crypto-users-with-wallet-drainers-and-seed-phrase-theft/]]></guid>
			<link><![CDATA[https://www.cryptika.com/malicious-google-ads-target-crypto-users-with-wallet-drainers-and-seed-phrase-theft/]]></link>
			<title>Malicious Google Ads Target Crypto Users With Wallet Drainers and Seed Phrase Theft</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 20:55:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cybercriminals-exploit-french-fintech-accounts-to-move-stolen-money-before-detection/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cybercriminals-exploit-french-fintech-accounts-to-move-stolen-money-before-detection/]]></link>
			<title>Cybercriminals Exploit French Fintech Accounts to Move Stolen Money Before Detection</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 19:45:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-abuse-fake-wallpaper-app-and-youtube-channel-to-spread-notnullosx-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-abuse-fake-wallpaper-app-and-youtube-channel-to-spread-notnullosx-malware/]]></link>
			<title>Hackers Abuse Fake Wallpaper App and YouTube Channel to Spread notnullOSX Malware</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 13:40:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/]]></guid>
			<link><![CDATA[https://www.cryptika.com/]]></link>
			<title>Cryptika Cyber Security</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 15:16:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-warns-jasper-sleet-uses-fake-it-worker-identities-to-infiltrate-cloud-environments/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-warns-jasper-sleet-uses-fake-it-worker-identities-to-infiltrate-cloud-environments/]]></link>
			<title>Microsoft Warns Jasper Sleet Uses Fake IT Worker Identities to Infiltrate Cloud Environments</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 17:44:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/claude-mythos-ai-model-uncovers-271-zero-day-vulnerabilities-in-firefox/]]></guid>
			<link><![CDATA[https://www.cryptika.com/claude-mythos-ai-model-uncovers-271-zero-day-vulnerabilities-in-firefox/]]></link>
			<title>Claude Mythos AI Model Uncovers 271 Zero-Day Vulnerabilities in Firefox</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 17:01:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-dindoor-backdoor-abuses-deno-runtime-and-msi-installers-to-evade-detection/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-dindoor-backdoor-abuses-deno-runtime-and-msi-installers-to-evade-detection/]]></link>
			<title>New DinDoor Backdoor Abuses Deno Runtime and MSI Installers to Evade Detection</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 12:41:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-teams-rolls-out-efficiency-mode-to-optimize-performance-on-low-end-devices/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-teams-rolls-out-efficiency-mode-to-optimize-performance-on-low-end-devices/]]></link>
			<title>Microsoft Teams Rolls Out Efficiency Mode to Optimize Performance on Low-End Devices</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 10:24:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-tropic-trooper-attack-uses-custom-beacon-listener-and-vs-code-tunnels-for-remote-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-tropic-trooper-attack-uses-custom-beacon-listener-and-vs-code-tunnels-for-remote-access/]]></link>
			<title>New Tropic Trooper Attack Uses Custom Beacon Listener and VS Code Tunnels for Remote Access</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 10:01:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/checkmarx-kics-official-docker-repo-compromised-to-inject-malicious-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/checkmarx-kics-official-docker-repo-compromised-to-inject-malicious-code/]]></link>
			<title>Checkmarx KICS Official Docker Repo Compromised to Inject Malicious Code</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 01:00:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/compromised-namastex-npm-packages-deliver-teampcp-style-canisterworm-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/compromised-namastex-npm-packages-deliver-teampcp-style-canisterworm-malware/]]></link>
			<title>Compromised Namastex npm Packages Deliver TeamPCP-Style CanisterWorm Malware</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 11:05:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/massive-sim-farm-as-a-service-network-exposes-87-control-panels-across-17-countries/]]></guid>
			<link><![CDATA[https://www.cryptika.com/massive-sim-farm-as-a-service-network-exposes-87-control-panels-across-17-countries/]]></link>
			<title>Massive SIM Farm-as-a-Service Network Exposes 87 Control Panels Across 17 Countries</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 11:02:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-atlassian-bamboo-data-center-and-server-flaw-enables-command-injection-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-atlassian-bamboo-data-center-and-server-flaw-enables-command-injection-attacks/]]></link>
			<title>Critical Atlassian Bamboo Data Center and Server Flaw Enables Command Injection Attacks</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:31:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-outlook-mailboxes-to-hide-linux-gogra-backdoor-communications/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-outlook-mailboxes-to-hide-linux-gogra-backdoor-communications/]]></link>
			<title>Hackers Use Outlook Mailboxes to Hide Linux GoGra Backdoor Communications</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 12:02:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/crowdstrike-logscale-vulnerability-allows-remote-attackers-to-read-arbitrary-files-from-server/]]></guid>
			<link><![CDATA[https://www.cryptika.com/crowdstrike-logscale-vulnerability-allows-remote-attackers-to-read-arbitrary-files-from-server/]]></link>
			<title>CrowdStrike LogScale Vulnerability Allows Remote Attackers to Read Arbitrary Files from Server</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 07:47:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-signed-binary-used-to-sneak-lotuslite-into-india-focused-espionage-campaign/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-signed-binary-used-to-sneak-lotuslite-into-india-focused-espionage-campaign/]]></link>
			<title>Microsoft-Signed Binary Used to Sneak LOTUSLITE Into India-Focused Espionage Campaign</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 06:57:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-emergency-net-10-0-7-update-to-patch-elevation-of-privilege-vulnerability/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-emergency-net-10-0-7-update-to-patch-elevation-of-privilege-vulnerability/]]></link>
			<title>Microsoft Emergency .NET 10.0.7 Update to Patch Elevation of Privilege Vulnerability</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 04:29:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/unauthorized-group-gains-access-to-anthropics-exclusive-cyber-tool-mythos/]]></guid>
			<link><![CDATA[https://www.cryptika.com/unauthorized-group-gains-access-to-anthropics-exclusive-cyber-tool-mythos/]]></link>
			<title>Unauthorized Group Gains Access to Anthropic’s Exclusive Cyber Tool Mythos</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 03:19:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/breachlock-named-representative-vendor-in-the-2026-gartner-market-guide-for-adversarial-exposure-validation/]]></guid>
			<link><![CDATA[https://www.cryptika.com/breachlock-named-representative-vendor-in-the-2026-gartner-market-guide-for-adversarial-exposure-validation/]]></link>
			<title>BreachLock Named Representative Vendor in the 2026 Gartner Market Guide for Adversarial Exposure Validation</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 16:46:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/vercel-confirms-security-breach-set-of-customer-account-compromised/]]></guid>
			<link><![CDATA[https://www.cryptika.com/vercel-confirms-security-breach-set-of-customer-account-compromised/]]></link>
			<title>Vercel Confirms Security Breach – Set of Customer Account Compromised</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 10:03:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/the-ungoverned-workforce-cybersecurity-insiders-finds-92-lack-visibility-into-ai-identities/]]></guid>
			<link><![CDATA[https://www.cryptika.com/the-ungoverned-workforce-cybersecurity-insiders-finds-92-lack-visibility-into-ai-identities/]]></link>
			<title>The Ungoverned Workforce: Cybersecurity Insiders Finds 92% Lack Visibility Into AI Identities</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 16:22:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/scattered-spider-member-tylerb-pleads-guilty/]]></guid>
			<link><![CDATA[https://www.cryptika.com/scattered-spider-member-tylerb-pleads-guilty/]]></link>
			<title>‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 14:53:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-abuse-github-issue-notifications-to-phish-developers-through-malicious-oauth-apps/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-abuse-github-issue-notifications-to-phish-developers-through-malicious-oauth-apps/]]></link>
			<title>Hackers Abuse GitHub Issue Notifications to Phish Developers Through Malicious OAuth Apps</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 13:42:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-cisco-catalyst-sd-wan-manager-vulnerabilities-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-cisco-catalyst-sd-wan-manager-vulnerabilities-exploited-in-attacks/]]></link>
			<title>CISA Warns of Cisco Catalyst SD-WAN Manager Vulnerabilities Exploited in Attacks</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 13:01:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/6000-apache-activemq-instances-vulnerable-to-cve-2026-34197-exposed-online/]]></guid>
			<link><![CDATA[https://www.cryptika.com/6000-apache-activemq-instances-vulnerable-to-cve-2026-34197-exposed-online/]]></link>
			<title>6000+ Apache ActiveMQ Instances Vulnerable to CVE-2026-34197 Exposed Online</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 12:32:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-pack2theroot-vulnerability-let-attackers-gain-root-access-or-compromise-the-system/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-pack2theroot-vulnerability-let-attackers-gain-root-access-or-compromise-the-system/]]></link>
			<title>Critical Pack2TheRoot Vulnerability Let Attackers Gain Root Access or Compromise the System</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 06:51:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/gentlemen-raas-attacking-windows-linux-with-additional-locker-written-in-c-for-esxi/]]></guid>
			<link><![CDATA[https://www.cryptika.com/gentlemen-raas-attacking-windows-linux-with-additional-locker-written-in-c-for-esxi/]]></link>
			<title>Gentlemen RaaS Attacking Windows, Linux With additional locker written in C for ESXi</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 11:57:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/ai-powered-exploitation-may-collapse-the-patch-window-for-defenders/]]></guid>
			<link><![CDATA[https://www.cryptika.com/ai-powered-exploitation-may-collapse-the-patch-window-for-defenders/]]></link>
			<title>AI-Powered Exploitation May Collapse the Patch Window for Defenders</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 10:59:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/apple-fixes-notification-privacy-flaw-that-allowed-fbi-to-access-deleted-signal-messages/]]></guid>
			<link><![CDATA[https://www.cryptika.com/apple-fixes-notification-privacy-flaw-that-allowed-fbi-to-access-deleted-signal-messages/]]></link>
			<title>Apple Fixes Notification Privacy Flaw That Allowed FBI to Access Deleted Signal Messages</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 05:56:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/claude-code-gemini-cli-and-github-copilot-vulnerable-to-prompt-injection-via-github-comments/]]></guid>
			<link><![CDATA[https://www.cryptika.com/claude-code-gemini-cli-and-github-copilot-vulnerable-to-prompt-injection-via-github-comments/]]></link>
			<title>Claude Code, Gemini CLI, and GitHub Copilot Vulnerable to Prompt Injection via GitHub Comments</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 08:33:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/sidewinder-uses-fake-chrome-pdf-viewer-and-zimbra-clone-to-steal-government-webmail-credentials/]]></guid>
			<link><![CDATA[https://www.cryptika.com/sidewinder-uses-fake-chrome-pdf-viewer-and-zimbra-clone-to-steal-government-webmail-credentials/]]></link>
			<title>SideWinder Uses Fake Chrome PDF Viewer and Zimbra Clone to Steal Government Webmail Credentials</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 07:54:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/blog/]]></guid>
			<link><![CDATA[https://www.cryptika.com/blog/]]></link>
			<title>Cybersecurity Blog</title>
			<pubDate><![CDATA[Sun, 05 Jun 2022 13:24:57 +0000]]></pubDate>
		</item>
				</channel>
</rss>
