<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 22, 2026 at 18:44 by All in One SEO v4.8.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cryptika.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cryptika Cybersecurity</title>
		<link><![CDATA[https://www.cryptika.com]]></link>
		<description><![CDATA[Cryptika Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Thu, 21 May 2026 21:50:25 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cryptika.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cryptika.com/alleged-kimwolf-botmaster-dort-arrested-charged-in-u-s-and-canada/]]></guid>
			<link><![CDATA[https://www.cryptika.com/alleged-kimwolf-botmaster-dort-arrested-charged-in-u-s-and-canada/]]></link>
			<title>Alleged Kimwolf Botmaster ‘Dort’ Arrested, Charged in U.S. and Canada</title>
			<pubDate><![CDATA[Thu, 21 May 2026 21:50:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-fake-microsoft-teams-downloads-to-deploy-valleyrat-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-fake-microsoft-teams-downloads-to-deploy-valleyrat-malware/]]></link>
			<title>Hackers Use Fake Microsoft Teams Downloads to Deploy ValleyRAT Malware</title>
			<pubDate><![CDATA[Thu, 21 May 2026 19:47:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/tamperedchef-malware-uses-signed-productivity-apps-to-deliver-stealers-and-rats/]]></guid>
			<link><![CDATA[https://www.cryptika.com/tamperedchef-malware-uses-signed-productivity-apps-to-deliver-stealers-and-rats/]]></link>
			<title>TamperedChef Malware Uses Signed Productivity Apps to Deliver Stealers and RATs</title>
			<pubDate><![CDATA[Thu, 21 May 2026 19:41:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/nine-year-old-linux-kernel-vulnerability-let-attackers-exfiltrate-ssh-private-keys/]]></guid>
			<link><![CDATA[https://www.cryptika.com/nine-year-old-linux-kernel-vulnerability-let-attackers-exfiltrate-ssh-private-keys/]]></link>
			<title>Nine-year-old Linux Kernel Vulnerability Let Attackers Exfiltrate SSH Private Keys</title>
			<pubDate><![CDATA[Thu, 21 May 2026 09:57:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/canadian-man-arrested-for-running-kimwolf-ddos-botnet-service-that-hacked-2-million-devices/]]></guid>
			<link><![CDATA[https://www.cryptika.com/canadian-man-arrested-for-running-kimwolf-ddos-botnet-service-that-hacked-2-million-devices/]]></link>
			<title>Canadian Man Arrested for Running KimWolf DDoS Botnet Service that Hacked 2 Million Devices</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:01:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-hide-malware-payloads-inside-nested-macos-like-folders-to-evade-scanning/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-hide-malware-payloads-inside-nested-macos-like-folders-to-evade-scanning/]]></link>
			<title>Hackers Hide Malware Payloads Inside Nested macOS-Like Folders to Evade Scanning</title>
			<pubDate><![CDATA[Fri, 22 May 2026 12:54:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/splunk-patches-multiple-vulnerabilities-that-enable-dos-attacks-and-expose-sensitive-data/]]></guid>
			<link><![CDATA[https://www.cryptika.com/splunk-patches-multiple-vulnerabilities-that-enable-dos-attacks-and-expose-sensitive-data/]]></link>
			<title>Splunk Patches Multiple Vulnerabilities that Enable DOS Attacks and Expose Sensitive Data</title>
			<pubDate><![CDATA[Fri, 22 May 2026 09:48:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-trend-micro-apex-one-vulnerability-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-trend-micro-apex-one-vulnerability-exploited-in-attacks/]]></link>
			<title>CISA Warns of Trend Micro Apex One Vulnerability Exploited in Attacks</title>
			<pubDate><![CDATA[Fri, 22 May 2026 09:35:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fbi-warns-of-kali365-attacking-microsoft-365-users-to-steal-logins-and-bypass-mfa/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fbi-warns-of-kali365-attacking-microsoft-365-users-to-steal-logins-and-bypass-mfa/]]></link>
			<title>FBI Warns of Kali365 Attacking Microsoft 365 Users to Steal Logins and Bypass MFA</title>
			<pubDate><![CDATA[Fri, 22 May 2026 09:31:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-can-weaponize-lenovo-driver-to-terminate-edr-processes/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-can-weaponize-lenovo-driver-to-terminate-edr-processes/]]></link>
			<title>Hackers Can Weaponize Lenovo Driver to Terminate EDR Processes</title>
			<pubDate><![CDATA[Fri, 22 May 2026 07:38:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/mini-shai-hulud-attack-forces-npm-to-reset-bypass-2fa-publishing-tokens/]]></guid>
			<link><![CDATA[https://www.cryptika.com/mini-shai-hulud-attack-forces-npm-to-reset-bypass-2fa-publishing-tokens/]]></link>
			<title>Mini Shai-Hulud Attack Forces npm to Reset Bypass-2FA Publishing Tokens</title>
			<pubDate><![CDATA[Fri, 22 May 2026 06:24:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fake-invitation-phishing-campaign-targets-u-s-organizations-with-credential-theft/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fake-invitation-phishing-campaign-targets-u-s-organizations-with-credential-theft/]]></link>
			<title>Fake Invitation Phishing Campaign Targets U.S. Organizations With Credential Theft</title>
			<pubDate><![CDATA[Thu, 21 May 2026 18:54:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/discord-announces-end-to-end-encryption-by-default-for-video-and-voice-messages/]]></guid>
			<link><![CDATA[https://www.cryptika.com/discord-announces-end-to-end-encryption-by-default-for-video-and-voice-messages/]]></link>
			<title>Discord Announces End-to-End Encryption by Default for Video and Voice Messages</title>
			<pubDate><![CDATA[Fri, 22 May 2026 03:08:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/megalodon-malware-compromised-5500-github-repos-within-6-hours/]]></guid>
			<link><![CDATA[https://www.cryptika.com/megalodon-malware-compromised-5500-github-repos-within-6-hours/]]></link>
			<title>Megalodon Malware Compromised 5,500+ GitHub Repos Within 6 Hours</title>
			<pubDate><![CDATA[Fri, 22 May 2026 02:31:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-fake-income-tax-assessment-pages-to-infect-windows-systems/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-fake-income-tax-assessment-pages-to-infect-windows-systems/]]></link>
			<title>Hackers Use Fake Income Tax Assessment Pages to Infect Windows Systems</title>
			<pubDate><![CDATA[Wed, 20 May 2026 22:13:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-chrome-vulnerabilities-enable-remote-code-execution-attacks-patch-now/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-chrome-vulnerabilities-enable-remote-code-execution-attacks-patch-now/]]></link>
			<title>Critical Chrome Vulnerabilities Enable Remote Code Execution Attacks – Patch Now!</title>
			<pubDate><![CDATA[Thu, 21 May 2026 17:16:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/flipper-unveils-new-flipper-one-modular-linux-cyberdeck/]]></guid>
			<link><![CDATA[https://www.cryptika.com/flipper-unveils-new-flipper-one-modular-linux-cyberdeck/]]></link>
			<title>Flipper Unveils New Flipper One Modular Linux Cyberdeck</title>
			<pubDate><![CDATA[Thu, 21 May 2026 12:55:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/p2pinfect-botnet-compromises-kubernetes-clusters-through-exposed-redis-instances/]]></guid>
			<link><![CDATA[https://www.cryptika.com/p2pinfect-botnet-compromises-kubernetes-clusters-through-exposed-redis-instances/]]></link>
			<title>P2PInfect Botnet Compromises Kubernetes Clusters Through Exposed Redis Instances</title>
			<pubDate><![CDATA[Thu, 21 May 2026 12:27:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/void-botnet-uses-ethereum-smart-contracts-for-seizure-resistant-c2-infrastructure/]]></guid>
			<link><![CDATA[https://www.cryptika.com/void-botnet-uses-ethereum-smart-contracts-for-seizure-resistant-c2-infrastructure/]]></link>
			<title>Void Botnet Uses Ethereum Smart Contracts for Seizure-Resistant C2 Infrastructure</title>
			<pubDate><![CDATA[Wed, 20 May 2026 21:38:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/trapdoor-android-ad-fraud-operation-uses-455-malicious-apps-to-generate-fake-clicks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/trapdoor-android-ad-fraud-operation-uses-455-malicious-apps-to-generate-fake-clicks/]]></link>
			<title>Trapdoor Android Ad Fraud Operation Uses 455 Malicious Apps to Generate Fake Clicks</title>
			<pubDate><![CDATA[Wed, 20 May 2026 20:08:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/github-internal-repositories-breached-via-weaponized-vs-code-extension/]]></guid>
			<link><![CDATA[https://www.cryptika.com/github-internal-repositories-breached-via-weaponized-vs-code-extension/]]></link>
			<title>GitHub Internal Repositories Breached Via Weaponized VS Code Extension</title>
			<pubDate><![CDATA[Thu, 21 May 2026 10:27:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/]]></guid>
			<link><![CDATA[https://www.cryptika.com/]]></link>
			<title>Cryptika Cyber Security</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 15:16:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/devilnfc-android-malware-uses-kiosk-mode-to-trap-victims-during-nfc-relay-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/devilnfc-android-malware-uses-kiosk-mode-to-trap-victims-during-nfc-relay-attacks/]]></link>
			<title>DevilNFC Android Malware Uses Kiosk Mode to Trap Victims During NFC Relay Attacks</title>
			<pubDate><![CDATA[Wed, 20 May 2026 17:37:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/pintheft-linux-vulnerability-let-attackers-gain-root-access-poc-released/]]></guid>
			<link><![CDATA[https://www.cryptika.com/pintheft-linux-vulnerability-let-attackers-gain-root-access-poc-released/]]></link>
			<title>PinTheft Linux Vulnerability Let Attackers Gain Root Access – PoC Released</title>
			<pubDate><![CDATA[Wed, 20 May 2026 17:22:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/how-to-close-the-most-expensive-gap-in-your-soc/]]></guid>
			<link><![CDATA[https://www.cryptika.com/how-to-close-the-most-expensive-gap-in-your-soc/]]></link>
			<title>How to Close the Most Expensive Gap in Your SOC </title>
			<pubDate><![CDATA[Wed, 20 May 2026 16:44:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-nginx-0-day-rce-nginx-poolslip-affects-millions-of-nginx-servers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-nginx-0-day-rce-nginx-poolslip-affects-millions-of-nginx-servers/]]></link>
			<title>New NGINX 0-Day RCE “nginx-poolslip” Affects Millions of NGINX Servers</title>
			<pubDate><![CDATA[Thu, 21 May 2026 08:01:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/two-u-s-executives-plead-guilty-in-india-based-tech-support-fraud-schemes/]]></guid>
			<link><![CDATA[https://www.cryptika.com/two-u-s-executives-plead-guilty-in-india-based-tech-support-fraud-schemes/]]></link>
			<title>Two U.S. Executives Plead Guilty in India-Based Tech-Support Fraud Schemes</title>
			<pubDate><![CDATA[Thu, 21 May 2026 04:59:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/gremlin-stealer-stores-c2-urls-and-exfiltration-paths-in-encrypted-resource-sections/]]></guid>
			<link><![CDATA[https://www.cryptika.com/gremlin-stealer-stores-c2-urls-and-exfiltration-paths-in-encrypted-resource-sections/]]></link>
			<title>Gremlin Stealer Stores C2 URLs and Exfiltration Paths in Encrypted Resource Sections</title>
			<pubDate><![CDATA[Thu, 21 May 2026 02:01:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-releases-mitigation-for-windows-bitlocker-security-bypass-0-day-vulnerability/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-releases-mitigation-for-windows-bitlocker-security-bypass-0-day-vulnerability/]]></link>
			<title>Microsoft Releases Mitigation for Windows BitLocker Security Bypass 0-Day Vulnerability</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:25:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-nginx-vulnerability-allow-remote-attackers-to-trigger-malicious-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-nginx-vulnerability-allow-remote-attackers-to-trigger-malicious-code/]]></link>
			<title>New NGINX Vulnerability Allow Remote Attackers to Trigger Malicious Code</title>
			<pubDate><![CDATA[Wed, 20 May 2026 08:57:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/github-hacked-internal-source-code-repositories-compromised-via-employee-device/]]></guid>
			<link><![CDATA[https://www.cryptika.com/github-hacked-internal-source-code-repositories-compromised-via-employee-device/]]></link>
			<title>GitHub Hacked – Internal Source Code Repositories Compromised via Employee Device</title>
			<pubDate><![CDATA[Wed, 20 May 2026 04:47:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-microsoft-defender-0‑days-actively-exploited-in-the-wild/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-microsoft-defender-0‑days-actively-exploited-in-the-wild/]]></link>
			<title>New Microsoft Defender 0‑Days Actively Exploited in the Wild</title>
			<pubDate><![CDATA[Thu, 21 May 2026 09:50:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/poc-exploit-released-for-20-year-old-postgresql-rce-vulnerability/]]></guid>
			<link><![CDATA[https://www.cryptika.com/poc-exploit-released-for-20-year-old-postgresql-rce-vulnerability/]]></link>
			<title>PoC Exploit Released for 20-Year Old PostgreSQL RCE Vulnerability</title>
			<pubDate><![CDATA[Wed, 20 May 2026 04:26:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/shinyhunters-claims-credit-for-cyber-attack-on-online-learning-management-system/]]></guid>
			<link><![CDATA[https://www.cryptika.com/shinyhunters-claims-credit-for-cyber-attack-on-online-learning-management-system/]]></link>
			<title>ShinyHunters Claims Credit for Cyber-Attack on Online Learning Management System</title>
			<pubDate><![CDATA[Wed, 20 May 2026 03:51:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/github-source-code-breach-teampcp-claims-access-to-internal-source-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/github-source-code-breach-teampcp-claims-access-to-internal-source-code/]]></link>
			<title>GitHub Source Code Breach – TeamPCP Claims Access to Internal Source Code</title>
			<pubDate><![CDATA[Wed, 20 May 2026 02:39:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/uac-0184-malware-chain-uses-bitsadmin-and-hta-files-for-gated-payload-delivery/]]></guid>
			<link><![CDATA[https://www.cryptika.com/uac-0184-malware-chain-uses-bitsadmin-and-hta-files-for-gated-payload-delivery/]]></link>
			<title>UAC-0184 Malware Chain Uses bitsadmin and HTA Files for Gated Payload Delivery</title>
			<pubDate><![CDATA[Tue, 19 May 2026 22:07:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/macos-malware-installs-fake-google-software-update-launchagent-for-persistence/]]></guid>
			<link><![CDATA[https://www.cryptika.com/macos-malware-installs-fake-google-software-update-launchagent-for-persistence/]]></link>
			<title>macOS Malware Installs Fake Google Software Update LaunchAgent for Persistence</title>
			<pubDate><![CDATA[Tue, 19 May 2026 21:50:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/wanttocry-ransomware-abuses-smb-services-to-remotely-encrypt-files/]]></guid>
			<link><![CDATA[https://www.cryptika.com/wanttocry-ransomware-abuses-smb-services-to-remotely-encrypt-files/]]></link>
			<title>WantToCry Ransomware Abuses SMB Services to Remotely Encrypt Files</title>
			<pubDate><![CDATA[Thu, 21 May 2026 07:30:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/the-gentlemen-ransomware-attacks-windows-linux-nas-bsd-and-esxi-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/the-gentlemen-ransomware-attacks-windows-linux-nas-bsd-and-esxi-attacks/]]></link>
			<title>The Gentlemen Ransomware Attacks Windows, Linux, NAS, BSD, and ESXi Attacks</title>
			<pubDate><![CDATA[Tue, 19 May 2026 20:12:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/kimsuky-hackers-use-lnk-and-jse-lures-to-target-recruiters-crypto-users-and-defense-officials/]]></guid>
			<link><![CDATA[https://www.cryptika.com/kimsuky-hackers-use-lnk-and-jse-lures-to-target-recruiters-crypto-users-and-defense-officials/]]></link>
			<title>Kimsuky Hackers Use LNK and JSE Lures to Target Recruiters, Crypto Users, and Defense Officials</title>
			<pubDate><![CDATA[Tue, 19 May 2026 18:51:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/malware-campaign-uses-javascript-powershell-and-shellcode-to-deliver-crypto-clipper/]]></guid>
			<link><![CDATA[https://www.cryptika.com/malware-campaign-uses-javascript-powershell-and-shellcode-to-deliver-crypto-clipper/]]></link>
			<title>Malware Campaign Uses JavaScript, PowerShell, and Shellcode to Deliver Crypto Clipper</title>
			<pubDate><![CDATA[Tue, 19 May 2026 17:22:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/dirtydecrypt-linux-kernel-vulnerability-poc-exploit-code-released/]]></guid>
			<link><![CDATA[https://www.cryptika.com/dirtydecrypt-linux-kernel-vulnerability-poc-exploit-code-released/]]></link>
			<title>DirtyDecrypt Linux Kernel Vulnerability PoC Exploit Code Released</title>
			<pubDate><![CDATA[Tue, 19 May 2026 17:18:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/3-tactics-elite-socs-use-to-operationalize-threat-intelligence/]]></guid>
			<link><![CDATA[https://www.cryptika.com/3-tactics-elite-socs-use-to-operationalize-threat-intelligence/]]></link>
			<title>3 Tactics Elite SOCs Use to Operationalize Threat Intelligence</title>
			<pubDate><![CDATA[Tue, 19 May 2026 17:12:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-ghosttree-attack-causing-edr-products-to-hang-and-leave-files-unscanned/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-ghosttree-attack-causing-edr-products-to-hang-and-leave-files-unscanned/]]></link>
			<title>New GhostTree Attack Causing EDR Products to Hang and Leave Files Unscanned</title>
			<pubDate><![CDATA[Thu, 21 May 2026 04:16:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-postgresql-vulnerabilities-enables-code-execution-and-sql-injections/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-postgresql-vulnerabilities-enables-code-execution-and-sql-injections/]]></link>
			<title>Critical PostgreSQL Vulnerabilities Enables Code Execution and SQL Injections</title>
			<pubDate><![CDATA[Tue, 19 May 2026 15:44:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/two-thirds-of-nonhuman-accounts-are-unseen-and-unmanaged-according-to-orchid-securitys-identity-gap-report/]]></guid>
			<link><![CDATA[https://www.cryptika.com/two-thirds-of-nonhuman-accounts-are-unseen-and-unmanaged-according-to-orchid-securitys-identity-gap-report/]]></link>
			<title>Two-Thirds of Nonhuman Accounts Are Unseen and Unmanaged, According to Orchid Security’s Identity Gap Report</title>
			<pubDate><![CDATA[Tue, 19 May 2026 15:37:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/claude-codes-network-sandbox-vulnerability-exposes-user-credentials-and-source-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/claude-codes-network-sandbox-vulnerability-exposes-user-credentials-and-source-code/]]></link>
			<title>Claude Code’s Network Sandbox Vulnerability Exposes User Credentials and Source Code</title>
			<pubDate><![CDATA[Thu, 21 May 2026 02:45:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/attackers-use-cloudflare-storage-endpoint-to-exfiltrate-files-from-compromised-networks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/attackers-use-cloudflare-storage-endpoint-to-exfiltrate-files-from-compromised-networks/]]></link>
			<title>Attackers Use Cloudflare Storage Endpoint to Exfiltrate Files From Compromised Networks</title>
			<pubDate><![CDATA[Tue, 19 May 2026 14:01:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-voidstealer-malware-bypasses-chromes-protection-to-steal-user-data/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-voidstealer-malware-bypasses-chromes-protection-to-steal-user-data/]]></link>
			<title>New VoidStealer Malware Bypasses Chrome’s Protection to Steal User Data</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:53:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/blog/]]></guid>
			<link><![CDATA[https://www.cryptika.com/blog/]]></link>
			<title>Cybersecurity Blog</title>
			<pubDate><![CDATA[Sun, 05 Jun 2022 13:24:57 +0000]]></pubDate>
		</item>
				</channel>
</rss>
