<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 6, 2026 at 15:23 by All in One SEO v4.8.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cryptika.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cryptika Cybersecurity</title>
		<link><![CDATA[https://www.cryptika.com]]></link>
		<description><![CDATA[Cryptika Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Thu, 02 Apr 2026 11:54:43 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cryptika.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cryptika.com/apple-expands-ios-18-7-7-update-to-more-devices-to-shield-users-from-darksword-exploit-2/]]></guid>
			<link><![CDATA[https://www.cryptika.com/apple-expands-ios-18-7-7-update-to-more-devices-to-shield-users-from-darksword-exploit-2/]]></link>
			<title>Apple Expands iOS 18.7.7 Update to More Devices to Shield Users from DarkSword Exploit</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 11:54:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/blog/]]></guid>
			<link><![CDATA[https://www.cryptika.com/blog/]]></link>
			<title>Cybersecurity Blog</title>
			<pubDate><![CDATA[Sun, 05 Jun 2022 13:24:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/]]></guid>
			<link><![CDATA[https://www.cryptika.com/]]></link>
			<title>Cryptika Cyber Security</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 15:16:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/googles-bug-bounty-program-hits-all-time-high-with-17-million-in-2025-payouts/]]></guid>
			<link><![CDATA[https://www.cryptika.com/googles-bug-bounty-program-hits-all-time-high-with-17-million-in-2025-payouts/]]></link>
			<title>Google’s Bug Bounty Program Hits All-Time High With $17 Million in 2025 Payouts</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 11:29:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/apache-traffic-server-vulnerabilities-let-attackers-trigger-dos-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/apache-traffic-server-vulnerabilities-let-attackers-trigger-dos-attack/]]></link>
			<title>Apache Traffic Server Vulnerabilities Let Attackers Trigger DoS Attack</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 11:21:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-fortinet-forticlient-ems-0-day-vulnerability-actively-exploited-in-the-wild/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-fortinet-forticlient-ems-0-day-vulnerability-actively-exploited-in-the-wild/]]></link>
			<title>Critical Fortinet FortiClient EMS 0-Day Vulnerability Actively Exploited in the Wild</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 13:04:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-dgraph-database-vulnerability-let-attackers-bypass-authentication/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-dgraph-database-vulnerability-let-attackers-bypass-authentication/]]></link>
			<title>Critical Dgraph Database Vulnerability Let Attackers Bypass Authentication</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 11:15:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-poisoned-axios-package-and-phantom-dependency-to-spread-cross-platform-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-poisoned-axios-package-and-phantom-dependency-to-spread-cross-platform-malware/]]></link>
			<title>Hackers Use Poisoned Axios Package and Phantom Dependency to Spread Cross-Platform Malware</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 09:58:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-claude-code-flaw-silently-bypasses-developer-configured-security-rules/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-claude-code-flaw-silently-bypasses-developer-configured-security-rules/]]></link>
			<title>Critical Claude Code Flaw Silently Bypasses Developer-Configured Security Rules</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 09:16:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-progress-sharefile-bugs-let-attackers-take-over-servers-without-logging-in/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-progress-sharefile-bugs-let-attackers-take-over-servers-without-logging-in/]]></link>
			<title>New Progress ShareFile Bugs Let Attackers Take Over Servers Without Logging In</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 11:52:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-using-fake-microsoft-teams-domains-to-attack-users-via-malicious-payload/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-using-fake-microsoft-teams-domains-to-attack-users-via-malicious-payload/]]></link>
			<title>Hackers Using Fake “Microsoft Teams” Domains to Attack Users Via Malicious Payload</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 09:04:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/top-node-js-maintainers-targeted-in-sophisticated-social-engineering-scheme/]]></guid>
			<link><![CDATA[https://www.cryptika.com/top-node-js-maintainers-targeted-in-sophisticated-social-engineering-scheme/]]></link>
			<title>Top Node.js Maintainers Targeted in Sophisticated Social Engineering Scheme</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 09:07:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/top-10-best-user-access-management-tools-in-2026/]]></guid>
			<link><![CDATA[https://www.cryptika.com/top-10-best-user-access-management-tools-in-2026/]]></link>
			<title>Top 10 Best User Access Management Tools in 2026</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 06:10:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/top-10-best-vpn-for-chrome-in-2026/]]></guid>
			<link><![CDATA[https://www.cryptika.com/top-10-best-vpn-for-chrome-in-2026/]]></link>
			<title>Top 10 Best VPN For Chrome in 2026</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 06:05:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/linkedin-hidden-code-secretly-searches-your-browser-for-installed-extensions/]]></guid>
			<link><![CDATA[https://www.cryptika.com/linkedin-hidden-code-secretly-searches-your-browser-for-installed-extensions/]]></link>
			<title>LinkedIn Hidden Code Secretly Searches Your Browser for Installed Extensions</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 04:15:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/anthropic-officially-ends-claude-subscriptions-for-third-party-tools-like-openclaw/]]></guid>
			<link><![CDATA[https://www.cryptika.com/anthropic-officially-ends-claude-subscriptions-for-third-party-tools-like-openclaw/]]></link>
			<title>Anthropic Officially Ends Claude Subscriptions for Third-Party Tools Like OpenClaw</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 03:20:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-resokerrat-uses-telegram-bot-api-to-control-infected-windows-systems/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-resokerrat-uses-telegram-bot-api-to-control-infected-windows-systems/]]></link>
			<title>New ResokerRAT Uses Telegram Bot API to Control Infected Windows Systems</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 07:12:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-weaponize-claude-code-leak-to-spread-vidar-and-ghostsocks-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-weaponize-claude-code-leak-to-spread-vidar-and-ghostsocks-malware/]]></link>
			<title>Hackers Weaponize Claude Code Leak to Spread Vidar and GhostSocks Malware</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 09:32:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/metatron-open-source-ai-penetration-testing-assistant-brings-local-llm-analysis-to-linux/]]></guid>
			<link><![CDATA[https://www.cryptika.com/metatron-open-source-ai-penetration-testing-assistant-brings-local-llm-analysis-to-linux/]]></link>
			<title>METATRON – Open-Source AI Penetration Testing Assistant Brings Local LLM Analysis to Linux</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 06:38:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/36-malicious-npm-strapi-packages-used-to-deploy-redis-rce-and-persistent-c2-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/36-malicious-npm-strapi-packages-used-to-deploy-redis-rce-and-persistent-c2-malware/]]></link>
			<title>36 Malicious npm Strapi Packages Used to Deploy Redis RCE and Persistent C2 Malware</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 05:45:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-adds-trueconf-vulnerability-to-kev-catalog-following-active-exploitation/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-adds-trueconf-vulnerability-to-kev-catalog-following-active-exploitation/]]></link>
			<title>CISA Adds TrueConf Vulnerability to KEV Catalog Following Active Exploitation</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 03:44:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/2000-forticlient-ems-instances-exposed-online-amid-active-rce-vulnerability-exploits-in-the-wild/]]></guid>
			<link><![CDATA[https://www.cryptika.com/2000-forticlient-ems-instances-exposed-online-amid-active-rce-vulnerability-exploits-in-the-wild/]]></link>
			<title>2,000+ FortiClient EMS Instances Exposed Online Amid Active RCE Vulnerability Exploits in the Wild</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 03:41:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/google-deepmind-researchers-warn-hackers-can-hijack-ai-agents-through-malicious-web-content/]]></guid>
			<link><![CDATA[https://www.cryptika.com/google-deepmind-researchers-warn-hackers-can-hijack-ai-agents-through-malicious-web-content/]]></link>
			<title>Google DeepMind Researchers Warn Hackers Can Hijack AI Agents Through Malicious Web Content</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 02:52:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/]]></guid>
			<link><![CDATA[https://www.cryptika.com/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/]]></link>
			<title>Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 02:07:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/high-stakes-security-protecting-the-digital-infrastructure-of-the-gaming-industry/]]></guid>
			<link><![CDATA[https://www.cryptika.com/high-stakes-security-protecting-the-digital-infrastructure-of-the-gaming-industry/]]></link>
			<title>High-Stakes Security: Protecting the Digital Infrastructure of the Gaming Industry</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 22:00:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/14000-f5-big-ip-apm-devices-exposed-online-amid-active-rce-vulnerability-exploits/]]></guid>
			<link><![CDATA[https://www.cryptika.com/14000-f5-big-ip-apm-devices-exposed-online-amid-active-rce-vulnerability-exploits/]]></link>
			<title>14,000+ F5 BIG-IP APM Devices Exposed Online Amid Active RCE Vulnerability Exploits</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:02:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/kimsuky-deploys-malicious-lnk-files-to-deliver-python-based-backdoor-in-multi-stage-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/kimsuky-deploys-malicious-lnk-files-to-deliver-python-based-backdoor-in-multi-stage-attack/]]></link>
			<title>Kimsuky Deploys Malicious LNK Files to Deliver Python-Based Backdoor in Multi-Stage Attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:43:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/axios-maintainer-confirms-the-npm-compromise-was-via-a-targeted-social-engineering-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/axios-maintainer-confirms-the-npm-compromise-was-via-a-targeted-social-engineering-attack/]]></link>
			<title>Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:22:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-abuse-trusted-platforms-to-steal-bank-credentials-from-philippine-users/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-abuse-trusted-platforms-to-steal-bank-credentials-from-philippine-users/]]></link>
			<title>Hackers Abuse Trusted Platforms to Steal Bank Credentials From Philippine Users</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:09:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/how-elite-socs-cut-escalation-rates-by-arming-tier-1-with-better-threat-intelligence/]]></guid>
			<link><![CDATA[https://www.cryptika.com/how-elite-socs-cut-escalation-rates-by-arming-tier-1-with-better-threat-intelligence/]]></link>
			<title>How Elite SOCs Cut Escalation Rates by Arming Tier 1 With Better Threat Intelligence</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:58:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-clone-cert-ua-site-to-trick-victims-into-installing-go-based-rat/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-clone-cert-ua-site-to-trick-victims-into-installing-go-based-rat/]]></link>
			<title>Hackers Clone CERT-UA Site to Trick Victims Into Installing Go-Based RAT</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:15:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/qilin-ransomware-uses-malicious-dll-to-kill-almost-every-vendors-edr-solutions/]]></guid>
			<link><![CDATA[https://www.cryptika.com/qilin-ransomware-uses-malicious-dll-to-kill-almost-every-vendors-edr-solutions/]]></link>
			<title>Qilin Ransomware Uses Malicious DLL to Kill Almost Every Vendor’s EDR Solutions</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 15:42:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/openssh-10-3-fixes-shell-injection-and-multiple-ssh-security-issues/]]></guid>
			<link><![CDATA[https://www.cryptika.com/openssh-10-3-fixes-shell-injection-and-multiple-ssh-security-issues/]]></link>
			<title>OpenSSH 10.3 Fixes Shell Injection and Multiple SSH Security Issues</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:54:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-abuse-docx-rtf-js-and-python-in-stealthy-boeing-rfq-malware-campaign/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-abuse-docx-rtf-js-and-python-in-stealthy-boeing-rfq-malware-campaign/]]></link>
			<title>Hackers Abuse DOCX, RTF, JS, and Python in Stealthy Boeing RFQ Malware Campaign</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:53:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-chrome-0-day-vulnerability-actively-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-chrome-0-day-vulnerability-actively-exploited-in-attacks/]]></link>
			<title>CISA Warns of Chrome 0-Day Vulnerability Actively Exploited in Attacks</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:31:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-venom-stealer-to-turn-clickfix-lures-into-full-data-exfiltration-pipelines/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-venom-stealer-to-turn-clickfix-lures-into-full-data-exfiltration-pipelines/]]></link>
			<title>Hackers Use Venom Stealer to Turn ClickFix Lures Into Full Data Exfiltration Pipelines</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 10:19:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/novoice-on-google-play-with-22-exploits-attacks-millions-of-android-users/]]></guid>
			<link><![CDATA[https://www.cryptika.com/novoice-on-google-play-with-22-exploits-attacks-millions-of-android-users/]]></link>
			<title>NoVoice on Google Play with 22 Exploits Attacks Millions of Android Users</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 13:50:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/malicious-chrome-extension-chatgpt-ad-blocker-steals-chatgpt-conversations/]]></guid>
			<link><![CDATA[https://www.cryptika.com/malicious-chrome-extension-chatgpt-ad-blocker-steals-chatgpt-conversations/]]></link>
			<title>Malicious Chrome Extension “ChatGPT Ad Blocker” Steals ChatGPT Conversations</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 11:23:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-forcing-upgrades-to-unmanaged-windows-11-version-24h2/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-forcing-upgrades-to-unmanaged-windows-11-version-24h2/]]></link>
			<title>Microsoft Forcing Upgrades to Unmanaged Windows 11, Version 24H2</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:19:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/multiple-tp-link-vulnerabilities-let-attackers-trigger-dos-and-crash-routers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/multiple-tp-link-vulnerabilities-let-attackers-trigger-dos-and-crash-routers/]]></link>
			<title>Multiple TP-Link Vulnerabilities Let Attackers Trigger DoS and Crash Routers</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:50:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-compromised-700-next-js-hosts-by-exploiting-react2shell-vulnerability/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-compromised-700-next-js-hosts-by-exploiting-react2shell-vulnerability/]]></link>
			<title>Hackers Compromised 700+ Next.js Hosts by Exploiting React2Shell Vulnerability</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 07:38:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cert-eu-confirms-trivy-supply-chain-attack-led-to-european-commission-aws-breach/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cert-eu-confirms-trivy-supply-chain-attack-led-to-european-commission-aws-breach/]]></link>
			<title>CERT-EU Confirms Trivy Supply Chain Attack Led to European Commission AWS Breach</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 07:25:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/north-korea-linked-hackers-compromise-axios-npm-package-in-major-supply-chain-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/north-korea-linked-hackers-compromise-axios-npm-package-in-major-supply-chain-attack/]]></link>
			<title>North Korea-Linked Hackers Compromise Axios npm Package in Major Supply Chain Attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 06:42:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/north-korea-related-campaign-abuses-github-as-c2-in-new-lnk-phishing-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/north-korea-related-campaign-abuses-github-as-c2-in-new-lnk-phishing-attacks/]]></link>
			<title>North Korea-Related Campaign Abuses GitHub as C2 in New LNK Phishing Attacks</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 05:53:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/20-best-application-performance-monitoring-tools-in-2026/]]></guid>
			<link><![CDATA[https://www.cryptika.com/20-best-application-performance-monitoring-tools-in-2026/]]></link>
			<title>20 Best Application Performance Monitoring Tools in 2026</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 05:30:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-details-steps-to-mitigate-the-axios-npm-supply-chain-compromise/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-details-steps-to-mitigate-the-axios-npm-supply-chain-compromise/]]></link>
			<title>Microsoft Details Steps to Mitigate the Axios npm Supply Chain Compromise</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:37:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-phorpiex-botnet-to-spread-ransomware-sextortion-and-crypto-clipping-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-phorpiex-botnet-to-spread-ransomware-sextortion-and-crypto-clipping-malware/]]></link>
			<title>Hackers Use Phorpiex Botnet to Spread Ransomware, Sextortion, and Crypto-Clipping Malware</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 10:28:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/apple-expands-ios-18-7-7-update-to-more-devices-to-shield-users-from-darksword-exploit/]]></guid>
			<link><![CDATA[https://www.cryptika.com/apple-expands-ios-18-7-7-update-to-more-devices-to-shield-users-from-darksword-exploit/]]></link>
			<title>Apple Expands iOS 18.7.7 Update to More Devices to Shield Users from DarkSword Exploit</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 11:54:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/best-vpn-for-linux-in-2026/]]></guid>
			<link><![CDATA[https://www.cryptika.com/best-vpn-for-linux-in-2026/]]></link>
			<title>Best VPN For Linux In 2026</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 05:20:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/adobe-breach-threat-actor-allegedly-claims-leak-of-13-million-support-tickets-and-employee-records/]]></guid>
			<link><![CDATA[https://www.cryptika.com/adobe-breach-threat-actor-allegedly-claims-leak-of-13-million-support-tickets-and-employee-records/]]></link>
			<title>Adobe Breach – Threat Actor Allegedly Claims Leak of 13 Million Support Tickets and Employee Records</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 02:29:28 +0000]]></pubDate>
		</item>
				</channel>
</rss>
