<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 15, 2026 at 01:54 by All in One SEO v4.8.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cryptika.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cryptika Cybersecurity</title>
		<link><![CDATA[https://www.cryptika.com]]></link>
		<description><![CDATA[Cryptika Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Tue, 14 Apr 2026 21:47:59 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cryptika.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cryptika.com/patch-tuesday-april-2026-edition/]]></guid>
			<link><![CDATA[https://www.cryptika.com/patch-tuesday-april-2026-edition/]]></link>
			<title>Patch Tuesday, April 2026 Edition</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 21:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/security-risk-advisors-purple-team-participants-can-now-earn-cpe-credits/]]></guid>
			<link><![CDATA[https://www.cryptika.com/security-risk-advisors-purple-team-participants-can-now-earn-cpe-credits/]]></link>
			<title>Security Risk Advisors Purple Team Participants Can Now Earn CPE Credits</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 18:09:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fortinet-patches-11-vulnerabilities-across-fortisandbox-fortios-fortianalyzer-and-fortimanager/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fortinet-patches-11-vulnerabilities-across-fortisandbox-fortios-fortianalyzer-and-fortimanager/]]></link>
			<title>Fortinet Patches 11 Vulnerabilities Across FortiSandbox, FortiOS, FortiAnalyzer, and FortiManager</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 17:59:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-etcd-auth-bypass-flaw-allows-unauthorized-access-to-sensitive-cluster-apis/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-etcd-auth-bypass-flaw-allows-unauthorized-access-to-sensitive-cluster-apis/]]></link>
			<title>Critical etcd Auth Bypass Flaw Allows Unauthorized Access to Sensitive Cluster APIs</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 16:59:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/ivanti-neurons-for-itsm-vulnerabilities-allow-remote-attacker-to-obtain-user-sessions/]]></guid>
			<link><![CDATA[https://www.cryptika.com/ivanti-neurons-for-itsm-vulnerabilities-allow-remote-attacker-to-obtain-user-sessions/]]></link>
			<title>Ivanti Neurons for ITSM Vulnerabilities Allow Remote Attacker to Obtain User Sessions</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 16:52:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-microsoft-exchange-and-windows-clfs-vulnerabilities-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-microsoft-exchange-and-windows-clfs-vulnerabilities-exploited-in-attacks/]]></link>
			<title>CISA Warns of Microsoft Exchange and Windows CLFS Vulnerabilities Exploited in Attacks</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 16:31:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-mirax-android-rat-turns-infected-phones-into-residential-proxy-nodes/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-mirax-android-rat-turns-infected-phones-into-residential-proxy-nodes/]]></link>
			<title>New Mirax Android RAT Turns Infected Phones Into Residential Proxy Nodes</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:39:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-plugx-usb-worm-spreads-across-multiple-continents-using-dll-sideloading/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-plugx-usb-worm-spreads-across-multiple-continents-using-dll-sideloading/]]></link>
			<title>New PlugX USB Worm Spreads Across Multiple Continents Using DLL Sideloading</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:27:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-leave-credential-stuffing-botnet-wide-open-with-full-worker-access-and-root-passwords/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-leave-credential-stuffing-botnet-wide-open-with-full-worker-access-and-root-passwords/]]></link>
			<title>Hackers Leave Credential Stuffing Botnet Wide Open With Full Worker Access and Root Passwords</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:00:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/codex-hacks-samsung-tv-to-root-by-exploiting-world-writable-driver-interfaces/]]></guid>
			<link><![CDATA[https://www.cryptika.com/codex-hacks-samsung-tv-to-root-by-exploiting-world-writable-driver-interfaces/]]></link>
			<title>Codex Hacks Samsung TV to Root by Exploiting World-Writable Driver Interfaces</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 12:30:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-fortinet-sql-injection-vulnerability-actively-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-fortinet-sql-injection-vulnerability-actively-exploited-in-attacks/]]></link>
			<title>CISA Warns of Fortinet SQL Injection Vulnerability Actively Exploited in Attacks</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 12:14:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/blog/]]></guid>
			<link><![CDATA[https://www.cryptika.com/blog/]]></link>
			<title>Cybersecurity Blog</title>
			<pubDate><![CDATA[Sun, 05 Jun 2022 13:24:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-weaponize-obsidian-shell-commands-plugin-to-launch-cross-platform-malware-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-weaponize-obsidian-shell-commands-plugin-to-launch-cross-platform-malware-attacks/]]></link>
			<title>Hackers Weaponize Obsidian Shell Commands Plugin to Launch Cross-Platform Malware Attacks</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:39:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-bypass-phishing-emails-and-target-okta-identity-systems-instead/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-bypass-phishing-emails-and-target-okta-identity-systems-instead/]]></link>
			<title>Hackers Bypass Phishing Emails and Target Okta Identity Systems Instead</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 10:57:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/booking-com-confirms-data-breach-hackers-accessed-customers-personal-information/]]></guid>
			<link><![CDATA[https://www.cryptika.com/booking-com-confirms-data-breach-hackers-accessed-customers-personal-information/]]></link>
			<title>Booking.com Confirms Data Breach — Hackers Accessed Customers’ Personal Information</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 10:28:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/apt41-turns-linux-cloud-servers-into-credential-theft-targets-with-new-winnti-backdoor/]]></guid>
			<link><![CDATA[https://www.cryptika.com/apt41-turns-linux-cloud-servers-into-credential-theft-targets-with-new-winnti-backdoor/]]></link>
			<title>APT41 Turns Linux Cloud Servers Into Credential Theft Targets With New Winnti Backdoor</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:44:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/w3ll-phishing-kit-takedown-hits-global-credential-theft-and-mfa-bypass-operation/]]></guid>
			<link><![CDATA[https://www.cryptika.com/w3ll-phishing-kit-takedown-hits-global-credential-theft-and-mfa-bypass-operation/]]></link>
			<title>W3LL Phishing Kit Takedown Hits Global Credential Theft and MFA Bypass Operation</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:41:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/researcher-reverse-engineered-0-day-used-to-disable-crowdstrike-edr/]]></guid>
			<link><![CDATA[https://www.cryptika.com/researcher-reverse-engineered-0-day-used-to-disable-crowdstrike-edr/]]></link>
			<title>Researcher Reverse Engineered 0-Day Used to Disable CrowdStrike EDR</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:39:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-fake-proxifier-installer-on-github-to-spread-clipbanker-crypto-stealing-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-fake-proxifier-installer-on-github-to-spread-clipbanker-crypto-stealing-malware/]]></link>
			<title>Hackers Use Fake Proxifier Installer on GitHub to Spread ClipBanker Crypto-Stealing Malware</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 04:56:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/rockstars-gta-game-hacked-attackers-published-78-6-million-records-online/]]></guid>
			<link><![CDATA[https://www.cryptika.com/rockstars-gta-game-hacked-attackers-published-78-6-million-records-online/]]></link>
			<title>Rockstar’s GTA Game Hacked – Attackers published 78.6 Million Records Online</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 02:01:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/]]></guid>
			<link><![CDATA[https://www.cryptika.com/]]></link>
			<title>Cryptika Cyber Security</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 15:16:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/claude-ai-reportedly-down-for-hundreds-of-users-with-intermittent-500-errors/]]></guid>
			<link><![CDATA[https://www.cryptika.com/claude-ai-reportedly-down-for-hundreds-of-users-with-intermittent-500-errors/]]></link>
			<title>Claude AI Reportedly Down for Hundreds of Users With Intermittent 500 Errors</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 16:52:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-abuse-github-and-jira-notifications-to-deliver-phishing-through-trusted-saas-channels/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-abuse-github-and-jira-notifications-to-deliver-phishing-through-trusted-saas-channels/]]></link>
			<title>Hackers Abuse GitHub and Jira Notifications to Deliver Phishing Through Trusted SaaS Channels</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 15:52:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/mozilla-criticizes-microsoft-for-installing-copilot-on-windows-without-user-consent/]]></guid>
			<link><![CDATA[https://www.cryptika.com/mozilla-criticizes-microsoft-for-installing-copilot-on-windows-without-user-consent/]]></link>
			<title>Mozilla Criticizes Microsoft for Installing Copilot on Windows Without User Consent</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:53:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/how-threat-intelligence-drives-a-real-roi-boost-for-your-soc/]]></guid>
			<link><![CDATA[https://www.cryptika.com/how-threat-intelligence-drives-a-real-roi-boost-for-your-soc/]]></link>
			<title>How Threat Intelligence Drives a Real ROI Boost for Your SOC </title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:51:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/iran-linked-cyberav3ngers-sets-sights-on-water-utilities-and-industrial-controllers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/iran-linked-cyberav3ngers-sets-sights-on-water-utilities-and-industrial-controllers/]]></link>
			<title>Iran-Linked CyberAv3ngers Sets Sights on Water Utilities and Industrial Controllers</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 13:36:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/ransomware-gangs-expand-use-of-edr-killers-beyond-vulnerable-drivers-eset-warns/]]></guid>
			<link><![CDATA[https://www.cryptika.com/ransomware-gangs-expand-use-of-edr-killers-beyond-vulnerable-drivers-eset-warns/]]></link>
			<title>Ransomware Gangs Expand Use of EDR Killers Beyond Vulnerable Drivers, ESET Warns</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 05:13:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-hide-vipertunnel-python-backdoor-inside-fake-dll-and-obfuscated-loader-chain/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-hide-vipertunnel-python-backdoor-inside-fake-dll-and-obfuscated-loader-chain/]]></link>
			<title>Hackers Hide VIPERTUNNEL Python Backdoor Inside Fake DLL and Obfuscated Loader Chain</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 12:34:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-hide-vipertunnel-python-backdoor-inside-fake-dll-and-obfuscated-loader-chain-2/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-hide-vipertunnel-python-backdoor-inside-fake-dll-and-obfuscated-loader-chain-2/]]></link>
			<title>Hackers Hide VIPERTUNNEL Python Backdoor Inside Fake DLL and Obfuscated Loader Chain</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 12:34:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hacker-uses-claude-and-chatgpt-to-breach-multiple-government-agencies/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hacker-uses-claude-and-chatgpt-to-breach-multiple-government-agencies/]]></link>
			<title>Hacker Uses Claude and ChatGPT to Breach Multiple Government Agencies</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 03:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/apt37-abuses-facebook-telegram-and-tampered-installer-in-new-targeted-intrusion-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/apt37-abuses-facebook-telegram-and-tampered-installer-in-new-targeted-intrusion-attack/]]></link>
			<title>APT37 Abuses Facebook, Telegram, and Tampered Installer in New Targeted Intrusion Attack</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 10:37:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/openai-warns-macos-users-to-update-chatgpt-and-codex-immediately/]]></guid>
			<link><![CDATA[https://www.cryptika.com/openai-warns-macos-users-to-update-chatgpt-and-codex-immediately/]]></link>
			<title>OpenAI Warns macOS Users to Update ChatGPT and Codex Immediately</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 16:56:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/google-launches-gmail-end-to-end-encryption-for-android-and-ios/]]></guid>
			<link><![CDATA[https://www.cryptika.com/google-launches-gmail-end-to-end-encryption-for-android-and-ios/]]></link>
			<title>Google Launches Gmail End-to-End Encryption for Android and iOS</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 08:56:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/basic-fit-data-breach-exposes-millions-of-users-across-multiple-countries/]]></guid>
			<link><![CDATA[https://www.cryptika.com/basic-fit-data-breach-exposes-millions-of-users-across-multiple-countries/]]></link>
			<title>Basic-Fit Data Breach Exposes Millions of Users Across Multiple Countries</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 10:34:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/adobe-patches-acrobat-reader-0-day-vulnerability-exploited-in-the-wild/]]></guid>
			<link><![CDATA[https://www.cryptika.com/adobe-patches-acrobat-reader-0-day-vulnerability-exploited-in-the-wild/]]></link>
			<title>Adobe Patches Acrobat Reader 0-Day Vulnerability Exploited in the Wild</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 08:23:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/google-unveils-device-bound-chrome-sessions-in-anti-cookie-theft-move/]]></guid>
			<link><![CDATA[https://www.cryptika.com/google-unveils-device-bound-chrome-sessions-in-anti-cookie-theft-move/]]></link>
			<title>Google Unveils Device-Bound Chrome Sessions in Anti-Cookie-Theft Move</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 06:52:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/anthropic-launches-claude-beta-for-word-bringing-ai-powered-editing-to-microsoft-docs/]]></guid>
			<link><![CDATA[https://www.cryptika.com/anthropic-launches-claude-beta-for-word-bringing-ai-powered-editing-to-microsoft-docs/]]></link>
			<title>Anthropic Launches Claude Beta for Word, Bringing AI-Powered Editing to Microsoft Docs</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 02:10:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/elon-musk-announces-to-launch-xchat-with-self-destruct-message-features/]]></guid>
			<link><![CDATA[https://www.cryptika.com/elon-musk-announces-to-launch-xchat-with-self-destruct-message-features/]]></link>
			<title>Elon Musk Announces to Launch XChat With Self-Destruct Message Features</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 08:15:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-confirms-recent-windows-11-updates-break-push-button-reset/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-confirms-recent-windows-11-updates-break-push-button-reset/]]></link>
			<title>Microsoft Confirms Recent Windows 11 Updates Break Push Button Reset</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 08:09:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-wordpress-plugin-flaw-lets-attackers-bypass-authentication-and-gain-admin-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-wordpress-plugin-flaw-lets-attackers-bypass-authentication-and-gain-admin-access/]]></link>
			<title>Critical WordPress Plugin Flaw Lets Attackers Bypass Authentication and Gain Admin Access</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 07:17:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/whatsapps-end-to-end-encryption-by-default-claim-called-major-consumer-fraud-by-pavel-durov/]]></guid>
			<link><![CDATA[https://www.cryptika.com/whatsapps-end-to-end-encryption-by-default-claim-called-major-consumer-fraud-by-pavel-durov/]]></link>
			<title>WhatsApp’s ‘End-to-End Encryption by Default’ Claim Called Major Consumer Fraud by Pavel Durov</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 02:46:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/engagesdk-vulnerability-exposes-millions-of-crypto-wallet-users-to-cyberattacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/engagesdk-vulnerability-exposes-millions-of-crypto-wallet-users-to-cyberattacks/]]></link>
			<title>EngageSDK Vulnerability Exposes Millions of Crypto Wallet Users to Cyberattacks</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 17:58:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-aitm-session-hijacking-to-redirect-employee-salaries-in-new-storm-2755-campaign/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-aitm-session-hijacking-to-redirect-employee-salaries-in-new-storm-2755-campaign/]]></link>
			<title>Hackers Use AiTM Session Hijacking to Redirect Employee Salaries in New Storm-2755 Campaign</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 17:44:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-fake-bts-world-tour-ticket-sites-to-scam-fans-across-multiple-countries/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-fake-bts-world-tour-ticket-sites-to-scam-fans-across-multiple-countries/]]></link>
			<title>Hackers Use Fake BTS World Tour Ticket Sites to Scam Fans Across Multiple Countries</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 13:43:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/censys-warns-5219-rockwell-allen-bradley-plcs-are-exposed-amid-iranian-apt-activity/]]></guid>
			<link><![CDATA[https://www.cryptika.com/censys-warns-5219-rockwell-allen-bradley-plcs-are-exposed-amid-iranian-apt-activity/]]></link>
			<title>Censys Warns 5,219 Rockwell/Allen-Bradley PLCs Are Exposed Amid Iranian APT Activity</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 13:16:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-exploit-github-copilot-flaw-to-exfiltrate-sensitive-data/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-exploit-github-copilot-flaw-to-exfiltrate-sensitive-data/]]></link>
			<title>Hackers Exploit GitHub Copilot Flaw to Exfiltrate Sensitive Data</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 12:55:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hpe-aruba-private-5g-platform-vulnerability-enables-credential-theft-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hpe-aruba-private-5g-platform-vulnerability-enables-credential-theft-attacks/]]></link>
			<title>HPE Aruba Private 5G Platform Vulnerability Enables Credential Theft Attacks</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 12:54:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-impersonate-secure-messaging-apps-to-deploy-prospy-in-middle-east-espionage-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-impersonate-secure-messaging-apps-to-deploy-prospy-in-middle-east-espionage-attacks/]]></link>
			<title>Hackers Impersonate Secure Messaging Apps to Deploy ProSpy in Middle East Espionage Attacks</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 12:43:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/muddywater-turns-to-russian-malware-as-a-service-in-new-chainshell-campaign/]]></guid>
			<link><![CDATA[https://www.cryptika.com/muddywater-turns-to-russian-malware-as-a-service-in-new-chainshell-campaign/]]></link>
			<title>MuddyWater Turns to Russian Malware-as-a-Service in New ChainShell Campaign</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:09:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/multiple-tp-link-vulnerabilities-allow-attackers-to-seize-control-of-the-device/]]></guid>
			<link><![CDATA[https://www.cryptika.com/multiple-tp-link-vulnerabilities-allow-attackers-to-seize-control-of-the-device/]]></link>
			<title>Multiple TP-Link Vulnerabilities Allow Attackers to Seize Control of the Device</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 09:16:08 +0000]]></pubDate>
		</item>
				</channel>
</rss>
