<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 7, 2026 at 08:52 by All in One SEO v4.8.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cryptika.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cryptika Cybersecurity</title>
		<link><![CDATA[https://www.cryptika.com]]></link>
		<description><![CDATA[Cryptika Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Wed, 06 May 2026 23:54:48 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cryptika.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cryptika.com/darkhub-hacking-for-hire-portal-advertises-crypto-fraud-message-interception-and-monitoring/]]></guid>
			<link><![CDATA[https://www.cryptika.com/darkhub-hacking-for-hire-portal-advertises-crypto-fraud-message-interception-and-monitoring/]]></link>
			<title>Darkhub Hacking-for-Hire Portal Advertises Crypto Fraud, Message Interception, and Monitoring</title>
			<pubDate><![CDATA[Wed, 06 May 2026 23:54:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cloudz-rat-abuses-microsoft-phone-link-to-steal-sms-otps-and-mobile-notifications/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cloudz-rat-abuses-microsoft-phone-link-to-steal-sms-otps-and-mobile-notifications/]]></link>
			<title>CloudZ RAT Abuses Microsoft Phone Link to Steal SMS OTPs and Mobile Notifications</title>
			<pubDate><![CDATA[Wed, 06 May 2026 18:22:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/qlnx-targets-developers-with-credential-theft-designed-for-supply-chain-compromise/]]></guid>
			<link><![CDATA[https://www.cryptika.com/qlnx-targets-developers-with-credential-theft-designed-for-supply-chain-compromise/]]></link>
			<title>QLNX Targets Developers With Credential Theft Designed for Supply Chain Compromise</title>
			<pubDate><![CDATA[Wed, 06 May 2026 17:55:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/member-of-prolific-russian-ransomware-group-sentenced-to-102-months-in-prison/]]></guid>
			<link><![CDATA[https://www.cryptika.com/member-of-prolific-russian-ransomware-group-sentenced-to-102-months-in-prison/]]></link>
			<title>Member of Prolific Russian Ransomware Group Sentenced to 102 Months in Prison</title>
			<pubDate><![CDATA[Wed, 06 May 2026 17:19:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/argo-cds-serversidediff-vulnerability-enables-kubernetes-secret-extraction/]]></guid>
			<link><![CDATA[https://www.cryptika.com/argo-cds-serversidediff-vulnerability-enables-kubernetes-secret-extraction/]]></link>
			<title>Argo CD’s ServerSideDiff Vulnerability Enables Kubernetes Secret Extraction</title>
			<pubDate><![CDATA[Wed, 06 May 2026 17:17:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-phishing-attack-weaponizing-event-invitations-to-steal-login-credentials/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-phishing-attack-weaponizing-event-invitations-to-steal-login-credentials/]]></link>
			<title>New Phishing Attack Weaponizing Event Invitations to Steal Login Credentials</title>
			<pubDate><![CDATA[Thu, 07 May 2026 00:58:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-salat-malware-uses-quic-and-websocket-channels-for-stealthy-remote-control/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-salat-malware-uses-quic-and-websocket-channels-for-stealthy-remote-control/]]></link>
			<title>New Salat Malware Uses QUIC and WebSocket Channels for Stealthy Remote Control</title>
			<pubDate><![CDATA[Thu, 07 May 2026 00:35:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-femitbot-network-uses-telegram-mini-apps-to-push-crypto-fraud-and-android-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-femitbot-network-uses-telegram-mini-apps-to-push-crypto-fraud-and-android-malware/]]></link>
			<title>New FEMITBOT Network Uses Telegram Mini Apps to Push Crypto Fraud and Android Malware</title>
			<pubDate><![CDATA[Thu, 07 May 2026 00:11:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/salesforce-marketing-cloud-vulnerability-opened-door-to-email-data-exposure/]]></guid>
			<link><![CDATA[https://www.cryptika.com/salesforce-marketing-cloud-vulnerability-opened-door-to-email-data-exposure/]]></link>
			<title>Salesforce Marketing Cloud Vulnerability Opened Door to Email Data Exposure</title>
			<pubDate><![CDATA[Wed, 06 May 2026 14:57:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/malicious-openclaw-deepseek-skill-exploits-agentic-ai-workflows-to-deliver-rat-and-stealer/]]></guid>
			<link><![CDATA[https://www.cryptika.com/malicious-openclaw-deepseek-skill-exploits-agentic-ai-workflows-to-deliver-rat-and-stealer/]]></link>
			<title>Malicious OpenClaw DeepSeek Skill Exploits Agentic AI Workflows to Deliver RAT and Stealer</title>
			<pubDate><![CDATA[Wed, 06 May 2026 14:04:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/iranian-nexus-operation-targets-oman-ministries-with-webshells-sql-escalation-and-data-theft/]]></guid>
			<link><![CDATA[https://www.cryptika.com/iranian-nexus-operation-targets-oman-ministries-with-webshells-sql-escalation-and-data-theft/]]></link>
			<title>Iranian-Nexus Operation Targets Oman Ministries With Webshells, SQL Escalation, and Data Theft</title>
			<pubDate><![CDATA[Wed, 06 May 2026 13:40:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/zero-auth-flaw-exposes-dod-contractor-to-cross-tenant-data-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/zero-auth-flaw-exposes-dod-contractor-to-cross-tenant-data-access/]]></link>
			<title>Zero-Auth Flaw Exposes DoD Contractor to Cross-Tenant Data Access</title>
			<pubDate><![CDATA[Wed, 06 May 2026 11:49:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/vimeo-data-breach-exposes-119000-users-unique-email-addresses/]]></guid>
			<link><![CDATA[https://www.cryptika.com/vimeo-data-breach-exposes-119000-users-unique-email-addresses/]]></link>
			<title>Vimeo Data Breach Exposes 119,000 Users Unique Email Addresses</title>
			<pubDate><![CDATA[Wed, 06 May 2026 10:13:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/azure-ad-conditional-access-bypassed-via-phantom-device-registration-and-prt-abuse/]]></guid>
			<link><![CDATA[https://www.cryptika.com/azure-ad-conditional-access-bypassed-via-phantom-device-registration-and-prt-abuse/]]></link>
			<title>Azure AD Conditional Access Bypassed Via Phantom Device Registration and PRT Abuse</title>
			<pubDate><![CDATA[Wed, 06 May 2026 08:31:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-palo-alto-firewalls-vulnerability-exploited-in-the-wild-to-gain-root-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-palo-alto-firewalls-vulnerability-exploited-in-the-wild-to-gain-root-access/]]></link>
			<title>Critical Palo Alto Firewalls Vulnerability Exploited in the Wild to Gain Root Access</title>
			<pubDate><![CDATA[Wed, 06 May 2026 02:55:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/low-noise-high-confidence-optimizing-soc-costs-with-better-threat-intelligence/]]></guid>
			<link><![CDATA[https://www.cryptika.com/low-noise-high-confidence-optimizing-soc-costs-with-better-threat-intelligence/]]></link>
			<title>Low Noise, High Confidence: Optimizing SOC Costs with Better Threat Intelligence </title>
			<pubDate><![CDATA[Tue, 05 May 2026 17:01:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/gnutls-3-8-13-released-with-fix-for-12-vulnerabilities-affecting-network-communications/]]></guid>
			<link><![CDATA[https://www.cryptika.com/gnutls-3-8-13-released-with-fix-for-12-vulnerabilities-affecting-network-communications/]]></link>
			<title>GnuTLS 3.8.13 Released with Fix for 12 Vulnerabilities Affecting Network Communications</title>
			<pubDate><![CDATA[Tue, 05 May 2026 16:36:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisco-to-acquire-astrix-security-to-strengthen-ai-agent-and-non-human-identity-security/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisco-to-acquire-astrix-security-to-strengthen-ai-agent-and-non-human-identity-security/]]></link>
			<title>Cisco to Acquire Astrix Security to Strengthen AI Agent and Non-Human Identity Security</title>
			<pubDate><![CDATA[Tue, 05 May 2026 16:30:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/luxsci-launches-enterprise-grade-hipaa-compliant-email-security-for-mid-sized-healthcare-organizations/]]></guid>
			<link><![CDATA[https://www.cryptika.com/luxsci-launches-enterprise-grade-hipaa-compliant-email-security-for-mid-sized-healthcare-organizations/]]></link>
			<title>LuxSci Launches Enterprise-Grade HIPAA-Compliant Email Security for Mid-Sized Healthcare Organizations</title>
			<pubDate><![CDATA[Tue, 05 May 2026 14:44:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cerberus-stalkerware-on-google-play-leverages-accessibility-abuse-and-firebase-for-remote-control/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cerberus-stalkerware-on-google-play-leverages-accessibility-abuse-and-firebase-for-remote-control/]]></link>
			<title>Cerberus Stalkerware on Google Play Leverages Accessibility Abuse and Firebase for Remote Control</title>
			<pubDate><![CDATA[Tue, 05 May 2026 14:18:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/attackers-abuse-amazon-ses-to-send-authenticated-phishing-emails-that-bypass-security/]]></guid>
			<link><![CDATA[https://www.cryptika.com/attackers-abuse-amazon-ses-to-send-authenticated-phishing-emails-that-bypass-security/]]></link>
			<title>Attackers Abuse Amazon SES to Send Authenticated Phishing Emails That Bypass Security</title>
			<pubDate><![CDATA[Tue, 05 May 2026 11:12:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-attribution-framework-connects-apt-campaigns-through-strategic-operational-and-technical-layers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-attribution-framework-connects-apt-campaigns-through-strategic-operational-and-technical-layers/]]></link>
			<title>New Attribution Framework Connects APT Campaigns Through Strategic, Operational, and Technical Layers</title>
			<pubDate><![CDATA[Tue, 05 May 2026 10:08:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/beware-of-fake-notepad-for-mac-website-possibly-could-harm-your-machine/]]></guid>
			<link><![CDATA[https://www.cryptika.com/beware-of-fake-notepad-for-mac-website-possibly-could-harm-your-machine/]]></link>
			<title>Beware of Fake ‘Notepad++ for Mac’ Website, Possibly Could Harm your Machine</title>
			<pubDate><![CDATA[Tue, 05 May 2026 08:22:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-android-zero-click-vulnerability-grants-remote-shell-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-android-zero-click-vulnerability-grants-remote-shell-access/]]></link>
			<title>Critical Android Zero-Click Vulnerability Grants Remote Shell Access</title>
			<pubDate><![CDATA[Tue, 05 May 2026 07:24:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/blog/]]></guid>
			<link><![CDATA[https://www.cryptika.com/blog/]]></link>
			<title>Cybersecurity Blog</title>
			<pubDate><![CDATA[Sun, 05 Jun 2022 13:24:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-edge-stores-all-saved-passwords-in-cleartext-process-memory-at-launch/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-edge-stores-all-saved-passwords-in-cleartext-process-memory-at-launch/]]></link>
			<title>Microsoft Edge Stores All Saved Passwords in Cleartext Process Memory at Launch</title>
			<pubDate><![CDATA[Tue, 05 May 2026 03:46:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/apache-http-server-exposes-millions-of-servers-to-remote-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/apache-http-server-exposes-millions-of-servers-to-remote-code-execution-attacks/]]></link>
			<title>Apache HTTP Server Exposes Millions of Servers to Remote Code Execution Attacks</title>
			<pubDate><![CDATA[Tue, 05 May 2026 02:47:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/attackers-deploy-aitm-phishing-pages-to-access-sharepoint-hubspot-and-google-workspace/]]></guid>
			<link><![CDATA[https://www.cryptika.com/attackers-deploy-aitm-phishing-pages-to-access-sharepoint-hubspot-and-google-workspace/]]></link>
			<title>Attackers Deploy AiTM Phishing Pages to Access SharePoint, HubSpot, and Google Workspace</title>
			<pubDate><![CDATA[Sat, 02 May 2026 06:36:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/]]></guid>
			<link><![CDATA[https://www.cryptika.com/]]></link>
			<title>Cryptika Cyber Security</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 15:16:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/pnpm-11-turns-on-minimum-release-age-by-default-to-reduce-npm-supply-chain-risk/]]></guid>
			<link><![CDATA[https://www.cryptika.com/pnpm-11-turns-on-minimum-release-age-by-default-to-reduce-npm-supply-chain-risk/]]></link>
			<title>pnpm 11 Turns On Minimum Release Age by Default to Reduce npm Supply Chain Risk</title>
			<pubDate><![CDATA[Tue, 05 May 2026 06:05:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cpanelsniper-poc-exploit-disclosed-for-cpanel-vulnerability-44000-servers-compromised/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cpanelsniper-poc-exploit-disclosed-for-cpanel-vulnerability-44000-servers-compromised/]]></link>
			<title>cPanelSniper – PoC Exploit Disclosed for cPanel Vulnerability, 44,000 Servers Compromised</title>
			<pubDate><![CDATA[Sat, 02 May 2026 02:57:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-microstealer-malware-actively-attacking-telecom-education-sectors/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-microstealer-malware-actively-attacking-telecom-education-sectors/]]></link>
			<title>New MicroStealer Malware Actively Attacking Telecom &amp; Education Sectors</title>
			<pubDate><![CDATA[Mon, 04 May 2026 16:28:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-xlabs_v1-botnet-targets-minecraft-servers-through-adb-exposed-android-devices/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-xlabs_v1-botnet-targets-minecraft-servers-through-adb-exposed-android-devices/]]></link>
			<title>New xlabs_v1 Botnet Targets Minecraft Servers Through ADB-Exposed Android Devices</title>
			<pubDate><![CDATA[Mon, 04 May 2026 14:35:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-linux-kernel-0-day-vulnerability-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-linux-kernel-0-day-vulnerability-exploited-in-attacks/]]></link>
			<title>CISA Warns of Linux Kernel 0-Day Vulnerability Exploited in Attacks</title>
			<pubDate><![CDATA[Mon, 04 May 2026 11:57:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-defender-mistakenly-flags-digicert-root-certificates-as-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-defender-mistakenly-flags-digicert-root-certificates-as-malware/]]></link>
			<title>Microsoft Defender Mistakenly Flags DigiCert Root Certificates as Malware</title>
			<pubDate><![CDATA[Sun, 03 May 2026 16:55:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/trellix-source-code-breach-hackers-gain-unauthorized-access-to-repository/]]></guid>
			<link><![CDATA[https://www.cryptika.com/trellix-source-code-breach-hackers-gain-unauthorized-access-to-repository/]]></link>
			<title>Trellix Source Code Breach – Hackers Gain Unauthorized Access to Repository</title>
			<pubDate><![CDATA[Sat, 02 May 2026 16:38:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/multiple-exim-mail-server-vulnerabilities-leads-to-crash-with-malicious-dns-data/]]></guid>
			<link><![CDATA[https://www.cryptika.com/multiple-exim-mail-server-vulnerabilities-leads-to-crash-with-malicious-dns-data/]]></link>
			<title>Multiple Exim Mail Server Vulnerabilities Leads to Crash with Malicious DNS data</title>
			<pubDate><![CDATA[Sat, 02 May 2026 11:14:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/attackers-abuse-google-appsheet-netlify-and-telegram-in-facebook-phishing-campaign/]]></guid>
			<link><![CDATA[https://www.cryptika.com/attackers-abuse-google-appsheet-netlify-and-telegram-in-facebook-phishing-campaign/]]></link>
			<title>Attackers Abuse Google AppSheet, Netlify, and Telegram in Facebook Phishing Campaign</title>
			<pubDate><![CDATA[Sat, 02 May 2026 05:36:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/apache-mina-vulnerabilities-enables-remote-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/apache-mina-vulnerabilities-enables-remote-code-execution-attacks/]]></link>
			<title>Apache MINA Vulnerabilities Enables Remote Code Execution Attacks</title>
			<pubDate><![CDATA[Mon, 04 May 2026 11:24:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-cpanel-whm-vulnerability-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-cpanel-whm-vulnerability-exploited-in-attacks/]]></link>
			<title>CISA Warns of cPanel &amp; WHM Vulnerability Exploited in Attacks</title>
			<pubDate><![CDATA[Mon, 04 May 2026 08:59:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/criminal-ip-and-securonix-threatq-collaborate-to-enhance-threat-intelligence-operations/]]></guid>
			<link><![CDATA[https://www.cryptika.com/criminal-ip-and-securonix-threatq-collaborate-to-enhance-threat-intelligence-operations/]]></link>
			<title>Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations</title>
			<pubDate><![CDATA[Fri, 01 May 2026 17:40:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/etherrat-campaign-uses-seo-poisoning-and-github-facades-to-target-enterprise-admins/]]></guid>
			<link><![CDATA[https://www.cryptika.com/etherrat-campaign-uses-seo-poisoning-and-github-facades-to-target-enterprise-admins/]]></link>
			<title>EtherRAT Campaign Uses SEO Poisoning and GitHub Facades to Target Enterprise Admins</title>
			<pubDate><![CDATA[Fri, 01 May 2026 15:25:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-spyware-platform-lets-buyers-rebrand-and-resell-android-surveillance-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-spyware-platform-lets-buyers-rebrand-and-resell-android-surveillance-malware/]]></link>
			<title>New Spyware Platform Lets Buyers Rebrand and Resell Android Surveillance Malware</title>
			<pubDate><![CDATA[Fri, 01 May 2026 14:32:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/attackers-abuse-captcha-and-clickfix-tactics-to-boost-credential-theft-campaigns/]]></guid>
			<link><![CDATA[https://www.cryptika.com/attackers-abuse-captcha-and-clickfix-tactics-to-boost-credential-theft-campaigns/]]></link>
			<title>Attackers Abuse CAPTCHA and ClickFix Tactics to Boost Credential Theft Campaigns</title>
			<pubDate><![CDATA[Fri, 01 May 2026 13:55:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-ddos-malware-exploits-jenkins-to-attack-valve-source-engine-game-servers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-ddos-malware-exploits-jenkins-to-attack-valve-source-engine-game-servers/]]></link>
			<title>New DDoS Malware Exploits Jenkins to Attack Valve Source Engine Game Servers</title>
			<pubDate><![CDATA[Fri, 01 May 2026 13:07:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/ransomware-victims-jump-to-7831-as-ai-crime-tools-scale-global-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/ransomware-victims-jump-to-7831-as-ai-crime-tools-scale-global-attacks/]]></link>
			<title>Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global Attacks</title>
			<pubDate><![CDATA[Fri, 01 May 2026 09:43:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/deepdoor-stealer-harvests-browser-passwords-cloud-tokens-ssh-keys-and-wi-fi-credentials/]]></guid>
			<link><![CDATA[https://www.cryptika.com/deepdoor-stealer-harvests-browser-passwords-cloud-tokens-ssh-keys-and-wi-fi-credentials/]]></link>
			<title>Deep#Door Stealer Harvests Browser Passwords, Cloud Tokens, SSH Keys, and Wi-Fi Credentials</title>
			<pubDate><![CDATA[Fri, 01 May 2026 09:26:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/china-aligned-attackers-use-shadowpad-iox-proxy-and-wmic-in-multi-stage-espionage-campaign/]]></guid>
			<link><![CDATA[https://www.cryptika.com/china-aligned-attackers-use-shadowpad-iox-proxy-and-wmic-in-multi-stage-espionage-campaign/]]></link>
			<title>China-Aligned Attackers Use ShadowPad, IOX Proxy, and WMIC in Multi-Stage Espionage Campaign</title>
			<pubDate><![CDATA[Fri, 01 May 2026 08:17:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-fake-captcha-campaign-uses-sms-pumping-fraud-to-run-up-victims-phone-bills/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-fake-captcha-campaign-uses-sms-pumping-fraud-to-run-up-victims-phone-bills/]]></link>
			<title>New Fake CAPTCHA Campaign Uses SMS Pumping Fraud to Run Up Victims’ Phone Bills</title>
			<pubDate><![CDATA[Fri, 01 May 2026 07:44:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-wireshark-vulnerabilities-let-attackers-execute-arbitrary-code-via-malformed-packets/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-wireshark-vulnerabilities-let-attackers-execute-arbitrary-code-via-malformed-packets/]]></link>
			<title>Critical Wireshark Vulnerabilities Let Attackers Execute Arbitrary Code Via Malformed Packets</title>
			<pubDate><![CDATA[Fri, 01 May 2026 05:08:44 +0000]]></pubDate>
		</item>
				</channel>
</rss>
