<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 12, 2026 at 20:41 by All in One SEO v4.8.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cryptika.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cryptika Cybersecurity</title>
		<link><![CDATA[https://www.cryptika.com]]></link>
		<description><![CDATA[Cryptika Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Tue, 12 May 2026 15:46:07 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cryptika.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cryptika.com/threat-actors-leverage-vercels-ai-tools-to-mass‑produce-realistic-phishing-sites/]]></guid>
			<link><![CDATA[https://www.cryptika.com/threat-actors-leverage-vercels-ai-tools-to-mass‑produce-realistic-phishing-sites/]]></link>
			<title>Threat Actors Leverage Vercel’s AI Tools to Mass‑Produce Realistic Phishing Sites</title>
			<pubDate><![CDATA[Tue, 12 May 2026 15:46:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/zoom-rooms-and-workplace-vulnerabilities-allow-attackers-to-escalate-privileges/]]></guid>
			<link><![CDATA[https://www.cryptika.com/zoom-rooms-and-workplace-vulnerabilities-allow-attackers-to-escalate-privileges/]]></link>
			<title>Zoom Rooms and Workplace Vulnerabilities Allow Attackers to Escalate Privileges</title>
			<pubDate><![CDATA[Tue, 12 May 2026 15:43:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/north-korean-hackers-weaponize-git-hooks-to-deploy-cross-platform-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/north-korean-hackers-weaponize-git-hooks-to-deploy-cross-platform-malware/]]></link>
			<title>North Korean Hackers Weaponize Git Hooks to Deploy Cross-Platform Malware</title>
			<pubDate><![CDATA[Tue, 12 May 2026 13:24:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/malicious-chrome-mv3-extension-impersonates-tronlink-to-steal-crypto-wallet-credentials/]]></guid>
			<link><![CDATA[https://www.cryptika.com/malicious-chrome-mv3-extension-impersonates-tronlink-to-steal-crypto-wallet-credentials/]]></link>
			<title>Malicious Chrome MV3 Extension Impersonates TronLink to Steal Crypto Wallet Credentials</title>
			<pubDate><![CDATA[Tue, 12 May 2026 11:42:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/mistralai-pypi-package-compromised-to-inject-malicious-code-microsoft-warns/]]></guid>
			<link><![CDATA[https://www.cryptika.com/mistralai-pypi-package-compromised-to-inject-malicious-code-microsoft-warns/]]></link>
			<title>MistralAI PyPI Package Compromised to Inject Malicious Code – Microsoft Warns</title>
			<pubDate><![CDATA[Tue, 12 May 2026 11:04:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/claudes-chrome-extension-vulnerability-allows-malicious-extensions-to-steal-gmail-and-drive-data/]]></guid>
			<link><![CDATA[https://www.cryptika.com/claudes-chrome-extension-vulnerability-allows-malicious-extensions-to-steal-gmail-and-drive-data/]]></link>
			<title>Claude’s Chrome Extension Vulnerability Allows Malicious Extensions to Steal Gmail and Drive Data</title>
			<pubDate><![CDATA[Tue, 12 May 2026 10:40:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-php-soap-extension-vulnerabilities-enables-remote-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-php-soap-extension-vulnerabilities-enables-remote-code-execution-attacks/]]></link>
			<title>Critical PHP SOAP Extension Vulnerabilities Enables Remote Code Execution Attacks</title>
			<pubDate><![CDATA[Tue, 12 May 2026 08:34:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/magecart-hackers-abuse-google-tag-manager-to-inject-credit-card-skimmers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/magecart-hackers-abuse-google-tag-manager-to-inject-credit-card-skimmers/]]></link>
			<title>Magecart Hackers Abuse Google Tag Manager to Inject Credit Card Skimmers</title>
			<pubDate><![CDATA[Tue, 12 May 2026 08:30:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/teampcp-compromised-checkmarx-jenkins-ast-plugin-following-kics-supply-chain-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/teampcp-compromised-checkmarx-jenkins-ast-plugin-following-kics-supply-chain-attack/]]></link>
			<title>TeamPCP Compromised Checkmarx Jenkins AST Plugin Following KICS Supply Chain Attack</title>
			<pubDate><![CDATA[Tue, 12 May 2026 07:49:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/poc-exploit-released-for-android-zero-click-vulnerability-that-enables-remote-shell-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/poc-exploit-released-for-android-zero-click-vulnerability-that-enables-remote-shell-access/]]></link>
			<title>PoC Exploit Released for Android Zero-Click Vulnerability that Enables Remote Shell Access</title>
			<pubDate><![CDATA[Tue, 12 May 2026 07:29:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-bitunlocker-downgrade-attack-on-windows-11-allows-access-to-encrypted-disks-in-5-minutes/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-bitunlocker-downgrade-attack-on-windows-11-allows-access-to-encrypted-disks-in-5-minutes/]]></link>
			<title>New BitUnlocker Downgrade Attack on Windows 11 Allows Access to Encrypted Disks in 5 Minutes</title>
			<pubDate><![CDATA[Tue, 12 May 2026 04:12:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-abuse-cve-2026-41940-to-take-over-cpanel-and-whm-servers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-abuse-cve-2026-41940-to-take-over-cpanel-and-whm-servers/]]></link>
			<title>Hackers Abuse CVE-2026-41940 to Take Over cPanel and WHM Servers</title>
			<pubDate><![CDATA[Tue, 12 May 2026 03:37:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/84-tanstack-npm-packages-hacked-in-ongoing-supply-chain-attack-targeting-ci-credentials/]]></guid>
			<link><![CDATA[https://www.cryptika.com/84-tanstack-npm-packages-hacked-in-ongoing-supply-chain-attack-targeting-ci-credentials/]]></link>
			<title>84 TanStack npm Packages Hacked in Ongoing Supply-Chain Attack Targeting CI Credentials</title>
			<pubDate><![CDATA[Tue, 12 May 2026 02:44:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/scammers-use-short-lived-voip-numbers-and-reuse-windows-to-defeat-reputation-based-blocking/]]></guid>
			<link><![CDATA[https://www.cryptika.com/scammers-use-short-lived-voip-numbers-and-reuse-windows-to-defeat-reputation-based-blocking/]]></link>
			<title>Scammers Use Short-Lived VoIP Numbers and Reuse Windows to Defeat Reputation-Based Blocking</title>
			<pubDate><![CDATA[Thu, 07 May 2026 12:53:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/blog/]]></guid>
			<link><![CDATA[https://www.cryptika.com/blog/]]></link>
			<title>Cybersecurity Blog</title>
			<pubDate><![CDATA[Sun, 05 Jun 2022 13:24:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/]]></guid>
			<link><![CDATA[https://www.cryptika.com/]]></link>
			<title>Cryptika Cyber Security</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 15:16:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-microsoft-365-copilot-vulnerabilities-expose-sensitive-information/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-microsoft-365-copilot-vulnerabilities-expose-sensitive-information/]]></link>
			<title>Critical Microsoft 365 Copilot Vulnerabilities Expose sensitive Information</title>
			<pubDate><![CDATA[Sat, 09 May 2026 02:34:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/popular-go-library-fsnotify-raises-supply-chain-alarms-after-maintainer-access-changes/]]></guid>
			<link><![CDATA[https://www.cryptika.com/popular-go-library-fsnotify-raises-supply-chain-alarms-after-maintainer-access-changes/]]></link>
			<title>Popular Go Library fsnotify Raises Supply Chain Alarms After Maintainer Access Changes</title>
			<pubDate><![CDATA[Mon, 11 May 2026 16:14:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/tclbanker-malware-targets-users-through-self-propagating-whatsapp-and-outlook-worm-modules/]]></guid>
			<link><![CDATA[https://www.cryptika.com/tclbanker-malware-targets-users-through-self-propagating-whatsapp-and-outlook-worm-modules/]]></link>
			<title>TCLBANKER Malware Targets Users Through Self-Propagating WhatsApp and Outlook Worm Modules</title>
			<pubDate><![CDATA[Sat, 09 May 2026 06:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/nvidia-data-breach-reportedly-exposes-personal-information-of-geforce-users/]]></guid>
			<link><![CDATA[https://www.cryptika.com/nvidia-data-breach-reportedly-exposes-personal-information-of-geforce-users/]]></link>
			<title>NVIDIA Data Breach Reportedly Exposes Personal Information of GeForce Users</title>
			<pubDate><![CDATA[Sat, 09 May 2026 03:33:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/google-warns-of-hackers-using-ai-to-create-working-zero-day-exploit/]]></guid>
			<link><![CDATA[https://www.cryptika.com/google-warns-of-hackers-using-ai-to-create-working-zero-day-exploit/]]></link>
			<title>Google Warns of Hackers Using AI to Create Working Zero-Day Exploit</title>
			<pubDate><![CDATA[Mon, 11 May 2026 16:04:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-cpanel-and-whm-flaws-enable-code-execution-dos-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-cpanel-and-whm-flaws-enable-code-execution-dos-attacks/]]></link>
			<title>New cPanel and WHM Flaws Enable Code Execution, DoS Attacks</title>
			<pubDate><![CDATA[Sun, 10 May 2026 05:25:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-plugx-like-dll-sideloading-chain-in-fake-claude-malware-campaign/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-plugx-like-dll-sideloading-chain-in-fake-claude-malware-campaign/]]></link>
			<title>Hackers Use PlugX-Like DLL Sideloading Chain in Fake Claude Malware Campaign</title>
			<pubDate><![CDATA[Mon, 11 May 2026 15:55:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/shinyhunters-breaches-instructure-canvas-lms-through-free-for-teacher-account-program/]]></guid>
			<link><![CDATA[https://www.cryptika.com/shinyhunters-breaches-instructure-canvas-lms-through-free-for-teacher-account-program/]]></link>
			<title>ShinyHunters Breaches Instructure Canvas LMS Through Free-For-Teacher Account Program</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:21:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/lets-encrypt-halts-certificate-issuance-after-cross-signed-root-certificate-incident/]]></guid>
			<link><![CDATA[https://www.cryptika.com/lets-encrypt-halts-certificate-issuance-after-cross-signed-root-certificate-incident/]]></link>
			<title>Let’s Encrypt Halts Certificate Issuance After Cross-Signed Root Certificate Incident</title>
			<pubDate><![CDATA[Sat, 09 May 2026 03:00:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-fake-deepseek-tui-github-repositories-to-deliver-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-fake-deepseek-tui-github-repositories-to-deliver-malware/]]></link>
			<title>Hackers Use Fake DeepSeek TUI GitHub Repositories to Deliver Malware</title>
			<pubDate><![CDATA[Mon, 11 May 2026 15:11:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/crimenetwork-takedown-exposes-22000-users-and-over-100-illegal-sellers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/crimenetwork-takedown-exposes-22000-users-and-over-100-illegal-sellers/]]></link>
			<title>Crimenetwork Takedown Exposes 22,000 Users and Over 100 Illegal Sellers</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:17:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/trending-hugging-face-repo-with-200k-downloads-executes-malware-on-windows-machines/]]></guid>
			<link><![CDATA[https://www.cryptika.com/trending-hugging-face-repo-with-200k-downloads-executes-malware-on-windows-machines/]]></link>
			<title>Trending Hugging Face Repo With 200k Downloads Executes Malware on Windows Machines</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:35:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/macos-malware-leverages-google-ads-and-legitimate-claude-ai-shared-chats-to-deliver-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/macos-malware-leverages-google-ads-and-legitimate-claude-ai-shared-chats-to-deliver-malware/]]></link>
			<title>macOS Malware Leverages Google Ads and Legitimate Claude.ai Shared Chats to Deliver Malware</title>
			<pubDate><![CDATA[Mon, 11 May 2026 09:32:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/vidar-malware-targets-browser-credentials-cookies-crypto-wallets-and-system-data/]]></guid>
			<link><![CDATA[https://www.cryptika.com/vidar-malware-targets-browser-credentials-cookies-crypto-wallets-and-system-data/]]></link>
			<title>Vidar Malware Targets Browser Credentials, Cookies, Crypto Wallets, and System Data</title>
			<pubDate><![CDATA[Mon, 11 May 2026 08:49:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/google-recaptcha-update-blocks-privacy-focused-android-users-from-sites/]]></guid>
			<link><![CDATA[https://www.cryptika.com/google-recaptcha-update-blocks-privacy-focused-android-users-from-sites/]]></link>
			<title>Google reCAPTCHA Update Blocks Privacy-Focused Android Users From Sites</title>
			<pubDate><![CDATA[Mon, 11 May 2026 08:45:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/jdownloader-downloader-hacked-to-infect-users-with-new-python-rat/]]></guid>
			<link><![CDATA[https://www.cryptika.com/jdownloader-downloader-hacked-to-infect-users-with-new-python-rat/]]></link>
			<title>JDownloader Downloader Hacked to Infect Users With New Python RAT</title>
			<pubDate><![CDATA[Mon, 11 May 2026 06:48:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/10-best-full-disk-encryption-tools-in-2026/]]></guid>
			<link><![CDATA[https://www.cryptika.com/10-best-full-disk-encryption-tools-in-2026/]]></link>
			<title>10 Best Full Disk Encryption Tools in 2026</title>
			<pubDate><![CDATA[Mon, 11 May 2026 04:36:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/top-10-best-interactive-malware-analysis-tools-in-2026/]]></guid>
			<link><![CDATA[https://www.cryptika.com/top-10-best-interactive-malware-analysis-tools-in-2026/]]></link>
			<title>Top 10 Best Interactive Malware Analysis Tools in 2026</title>
			<pubDate><![CDATA[Mon, 11 May 2026 04:31:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-pamdoora-backdoor-attacking-linux-systems-to-steal-ssh-credentials/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-pamdoora-backdoor-attacking-linux-systems-to-steal-ssh-credentials/]]></link>
			<title>New PamDOORa Backdoor Attacking Linux Systems to Steal SSH Credentials</title>
			<pubDate><![CDATA[Fri, 08 May 2026 19:12:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-deploy-modular-rat-with-credential-theft-and-screenshot-capture-capabilities/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-deploy-modular-rat-with-credential-theft-and-screenshot-capture-capabilities/]]></link>
			<title>Hackers Deploy Modular RAT With Credential Theft and Screenshot Capture Capabilities</title>
			<pubDate><![CDATA[Fri, 08 May 2026 19:01:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-ivanti-epmm-0-day-vulnerability-actively-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-ivanti-epmm-0-day-vulnerability-actively-exploited-in-attacks/]]></link>
			<title>New Ivanti EPMM 0-Day Vulnerability Actively Exploited in Attacks</title>
			<pubDate><![CDATA[Thu, 07 May 2026 16:29:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-palo-alto-pan-os-vulnerability-exploited-to-gain-root-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-palo-alto-pan-os-vulnerability-exploited-to-gain-root-access/]]></link>
			<title>CISA Warns of Palo Alto PAN-OS Vulnerability Exploited to Gain Root Access</title>
			<pubDate><![CDATA[Thu, 07 May 2026 15:59:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-cisco-network-vulnerability-let-remote-attacker-cause-dos-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-cisco-network-vulnerability-let-remote-attacker-cause-dos-attack/]]></link>
			<title>New Cisco Network Vulnerability Let Remote Attacker Cause DoS Attack</title>
			<pubDate><![CDATA[Thu, 07 May 2026 15:44:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-using-fake-claude-ai-installer-pages-to-trick-users-into-running-malware-on-their-systems/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-using-fake-claude-ai-installer-pages-to-trick-users-into-running-malware-on-their-systems/]]></link>
			<title>Hackers Using Fake Claude AI Installer Pages to Trick Users Into Running Malware on Their Systems</title>
			<pubDate><![CDATA[Thu, 07 May 2026 13:00:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/skoda-security-incident-exposes-customers-data-from-online-shop/]]></guid>
			<link><![CDATA[https://www.cryptika.com/skoda-security-incident-exposes-customers-data-from-online-shop/]]></link>
			<title>Škoda Security Incident Exposes Customers Data From Online Shop</title>
			<pubDate><![CDATA[Fri, 08 May 2026 17:53:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-fake-openclaw-installer-to-steal-crypto-wallet-and-password-manager-credentials/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-fake-openclaw-installer-to-steal-crypto-wallet-and-password-manager-credentials/]]></link>
			<title>Hackers Use Fake OpenClaw Installer to Steal Crypto Wallet and Password Manager Credentials</title>
			<pubDate><![CDATA[Fri, 08 May 2026 17:15:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-zichatbot-malware-uses-zulip-rest-apis-as-command-and-control-server/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-zichatbot-malware-uses-zulip-rest-apis-as-command-and-control-server/]]></link>
			<title>New ZiChatBot Malware Uses Zulip REST APIs as Command and Control Server</title>
			<pubDate><![CDATA[Fri, 08 May 2026 14:06:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/trellix-breach-ransomhouse-claims-access-to-parts-of-source-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/trellix-breach-ransomhouse-claims-access-to-parts-of-source-code/]]></link>
			<title>Trellix Breach – RansomHouse Claims Access to Parts of Source Code</title>
			<pubDate><![CDATA[Fri, 08 May 2026 11:18:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/mozilla-patches-423-firefox-0-day-vulnerabilities-with-claude-mythos-and-other-ai-models/]]></guid>
			<link><![CDATA[https://www.cryptika.com/mozilla-patches-423-firefox-0-day-vulnerabilities-with-claude-mythos-and-other-ai-models/]]></link>
			<title>Mozilla Patches 423 Firefox 0-Day Vulnerabilities with Claude Mythos and Other AI Models</title>
			<pubDate><![CDATA[Fri, 08 May 2026 08:08:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-spring-vulnerabilities-expose-arbitrary-files-and-gcp-secrets/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-spring-vulnerabilities-expose-arbitrary-files-and-gcp-secrets/]]></link>
			<title>Critical Spring Vulnerabilities Expose Arbitrary Files and GCP Secrets</title>
			<pubDate><![CDATA[Fri, 08 May 2026 07:35:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/dirty-frag-linux-vulnerability-let-attackers-gain-root-privileges-poc-released/]]></guid>
			<link><![CDATA[https://www.cryptika.com/dirty-frag-linux-vulnerability-let-attackers-gain-root-privileges-poc-released/]]></link>
			<title>Dirty Frag Linux Vulnerability Let Attackers Gain Root Privileges – PoC Released</title>
			<pubDate><![CDATA[Fri, 08 May 2026 04:06:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/dirty-frag-linux-vulnerability-let-attackers-gain-root-privileges-poc-released-2/]]></guid>
			<link><![CDATA[https://www.cryptika.com/dirty-frag-linux-vulnerability-let-attackers-gain-root-privileges-poc-released-2/]]></link>
			<title>Dirty Frag Linux Vulnerability Let Attackers Gain Root Privileges – PoC Released</title>
			<pubDate><![CDATA[Fri, 08 May 2026 04:06:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/multiple-critical-vulnerabilities-patched-in-next-js-and-react-server-components/]]></guid>
			<link><![CDATA[https://www.cryptika.com/multiple-critical-vulnerabilities-patched-in-next-js-and-react-server-components/]]></link>
			<title>Multiple Critical Vulnerabilities Patched in Next.js and React Server Components</title>
			<pubDate><![CDATA[Fri, 08 May 2026 03:01:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/canvas-breach-disrupts-schools-colleges-nationwide/]]></guid>
			<link><![CDATA[https://www.cryptika.com/canvas-breach-disrupts-schools-colleges-nationwide/]]></link>
			<title>Canvas Breach Disrupts Schools &amp; Colleges Nationwide</title>
			<pubDate><![CDATA[Fri, 08 May 2026 02:58:46 +0000]]></pubDate>
		</item>
				</channel>
</rss>
