<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 15, 2026 at 21:19 by All in One SEO v4.8.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cryptika.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cryptika Cybersecurity</title>
		<link><![CDATA[https://www.cryptika.com]]></link>
		<description><![CDATA[Cryptika Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Wed, 15 Apr 2026 14:16:38 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cryptika.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cryptika.com/google-microsoft-meta-tracking-you-even-if-you-opt-out-new-research/]]></guid>
			<link><![CDATA[https://www.cryptika.com/google-microsoft-meta-tracking-you-even-if-you-opt-out-new-research/]]></link>
			<title>Google, Microsoft, Meta Tracking You Even if You Opt Out – New Research</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:16:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-releases-cumulative-update-kb5083769-for-windows-11-version-25h2-and-24h2/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-releases-cumulative-update-kb5083769-for-windows-11-version-25h2-and-24h2/]]></link>
			<title>Microsoft Releases Cumulative Update KB5083769 for Windows 11, Version 25H2 and 24H2</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:14:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/windows-active-directory-vulnerability-allow-attackers-to-execute-malicious-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/windows-active-directory-vulnerability-allow-attackers-to-execute-malicious-code/]]></link>
			<title>Windows Active Directory Vulnerability Allow Attackers to Execute Malicious Code</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:11:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-php-composer-vulnerability-let-attackers-execute-arbitrary-commands/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-php-composer-vulnerability-let-attackers-execute-arbitrary-commands/]]></link>
			<title>New PHP Composer Vulnerability Let Attackers Execute Arbitrary Commands</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:08:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/muddywater-style-hackers-scan-12000-systems-before-hitting-middle-east-critical-sectors/]]></guid>
			<link><![CDATA[https://www.cryptika.com/muddywater-style-hackers-scan-12000-systems-before-hitting-middle-east-critical-sectors/]]></link>
			<title>MuddyWater-Style Hackers Scan 12,000+ Systems Before Hitting Middle East Critical Sectors</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 13:08:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-using-google-cloud-storage-to-bypass-email-filters-and-deliver-remcos-rat/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-using-google-cloud-storage-to-bypass-email-filters-and-deliver-remcos-rat/]]></link>
			<title>Hackers Using Google Cloud Storage to Bypass Email Filters and Deliver Remcos RAT</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 12:47:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-hide-backdoor-in-trusted-wordpress-plugins-for-8-months-before-activating-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-hide-backdoor-in-trusted-wordpress-plugins-for-8-months-before-activating-malware/]]></link>
			<title>Hackers Hide Backdoor in Trusted WordPress Plugins for 8 Months Before Activating Malware</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 12:14:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-create-hidden-mailbox-rules-in-microsoft-365-to-intercept-sensitive-business-emails/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-create-hidden-mailbox-rules-in-microsoft-365-to-intercept-sensitive-business-emails/]]></link>
			<title>Hackers Create Hidden Mailbox Rules in Microsoft 365 to Intercept Sensitive Business Emails</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 11:34:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/agentic-llm-browsers-expose-new-attack-surface-for-prompt-injection-and-data-theft/]]></guid>
			<link><![CDATA[https://www.cryptika.com/agentic-llm-browsers-expose-new-attack-surface-for-prompt-injection-and-data-theft/]]></link>
			<title>Agentic LLM Browsers Expose New Attack Surface for Prompt Injection and Data Theft</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 10:45:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/funnull-linked-triad-nexus-resurfaces-with-175-rotating-cname-domains-and-global-scam-portals/]]></guid>
			<link><![CDATA[https://www.cryptika.com/funnull-linked-triad-nexus-resurfaces-with-175-rotating-cname-domains-and-global-scam-portals/]]></link>
			<title>FUNNULL-Linked Triad Nexus Resurfaces With 175+ Rotating CNAME Domains and Global Scam Portals</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:19:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/windows-bitlocker-vulnerability-allows-attacker-to-bypass-security-feature/]]></guid>
			<link><![CDATA[https://www.cryptika.com/windows-bitlocker-vulnerability-allows-attacker-to-bypass-security-feature/]]></link>
			<title>Windows BitLocker Vulnerability Allows Attacker to Bypass  Security Feature</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:06:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-janaware-ransomware-targets-turkish-users-through-customized-adwind-rat/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-janaware-ransomware-targets-turkish-users-through-customized-adwind-rat/]]></link>
			<title>New JanaWare Ransomware Targets Turkish Users Through Customized Adwind RAT</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 07:38:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-defender-0-day-vulnerability-enables-privilege-escalation-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-defender-0-day-vulnerability-enables-privilege-escalation-attack/]]></link>
			<title>Microsoft Defender 0-Day Vulnerability Enables Privilege Escalation Attack</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 07:33:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/25000-endpoints-exposed-by-dragon-boss-solutions-update-domain-supply-chain-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/25000-endpoints-exposed-by-dragon-boss-solutions-update-domain-supply-chain-attack/]]></link>
			<title>25,000+ Endpoints Exposed by Dragon Boss Solutions Update Domain Supply Chain Attack</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 05:24:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/openai-launches-gpt-5-4-with-reverse-engineering-vulnerability-and-malware-analysis-features/]]></guid>
			<link><![CDATA[https://www.cryptika.com/openai-launches-gpt-5-4-with-reverse-engineering-vulnerability-and-malware-analysis-features/]]></link>
			<title>OpenAI Launches GPT-5.4 with Reverse Engineering, Vulnerability and Malware Analysis Features</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 03:09:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-sharepoint-server-0-day-vulnerability-actively-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-sharepoint-server-0-day-vulnerability-actively-exploited-in-attacks/]]></link>
			<title>Microsoft SharePoint Server 0-Day Vulnerability Actively Exploited in Attacks</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 02:30:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/patch-tuesday-april-2026-edition/]]></guid>
			<link><![CDATA[https://www.cryptika.com/patch-tuesday-april-2026-edition/]]></link>
			<title>Patch Tuesday, April 2026 Edition</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 21:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/security-risk-advisors-purple-team-participants-can-now-earn-cpe-credits/]]></guid>
			<link><![CDATA[https://www.cryptika.com/security-risk-advisors-purple-team-participants-can-now-earn-cpe-credits/]]></link>
			<title>Security Risk Advisors Purple Team Participants Can Now Earn CPE Credits</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 18:09:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fortinet-patches-11-vulnerabilities-across-fortisandbox-fortios-fortianalyzer-and-fortimanager/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fortinet-patches-11-vulnerabilities-across-fortisandbox-fortios-fortianalyzer-and-fortimanager/]]></link>
			<title>Fortinet Patches 11 Vulnerabilities Across FortiSandbox, FortiOS, FortiAnalyzer, and FortiManager</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 17:59:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-etcd-auth-bypass-flaw-allows-unauthorized-access-to-sensitive-cluster-apis/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-etcd-auth-bypass-flaw-allows-unauthorized-access-to-sensitive-cluster-apis/]]></link>
			<title>Critical etcd Auth Bypass Flaw Allows Unauthorized Access to Sensitive Cluster APIs</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 16:59:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/ivanti-neurons-for-itsm-vulnerabilities-allow-remote-attacker-to-obtain-user-sessions/]]></guid>
			<link><![CDATA[https://www.cryptika.com/ivanti-neurons-for-itsm-vulnerabilities-allow-remote-attacker-to-obtain-user-sessions/]]></link>
			<title>Ivanti Neurons for ITSM Vulnerabilities Allow Remote Attacker to Obtain User Sessions</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 16:52:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-microsoft-exchange-and-windows-clfs-vulnerabilities-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-microsoft-exchange-and-windows-clfs-vulnerabilities-exploited-in-attacks/]]></link>
			<title>CISA Warns of Microsoft Exchange and Windows CLFS Vulnerabilities Exploited in Attacks</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 16:31:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-mirax-android-rat-turns-infected-phones-into-residential-proxy-nodes/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-mirax-android-rat-turns-infected-phones-into-residential-proxy-nodes/]]></link>
			<title>New Mirax Android RAT Turns Infected Phones Into Residential Proxy Nodes</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:39:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-plugx-usb-worm-spreads-across-multiple-continents-using-dll-sideloading/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-plugx-usb-worm-spreads-across-multiple-continents-using-dll-sideloading/]]></link>
			<title>New PlugX USB Worm Spreads Across Multiple Continents Using DLL Sideloading</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:27:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/blog/]]></guid>
			<link><![CDATA[https://www.cryptika.com/blog/]]></link>
			<title>Cybersecurity Blog</title>
			<pubDate><![CDATA[Sun, 05 Jun 2022 13:24:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-leave-credential-stuffing-botnet-wide-open-with-full-worker-access-and-root-passwords/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-leave-credential-stuffing-botnet-wide-open-with-full-worker-access-and-root-passwords/]]></link>
			<title>Hackers Leave Credential Stuffing Botnet Wide Open With Full Worker Access and Root Passwords</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:00:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/codex-hacks-samsung-tv-to-root-by-exploiting-world-writable-driver-interfaces/]]></guid>
			<link><![CDATA[https://www.cryptika.com/codex-hacks-samsung-tv-to-root-by-exploiting-world-writable-driver-interfaces/]]></link>
			<title>Codex Hacks Samsung TV to Root by Exploiting World-Writable Driver Interfaces</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 12:30:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-fortinet-sql-injection-vulnerability-actively-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-fortinet-sql-injection-vulnerability-actively-exploited-in-attacks/]]></link>
			<title>CISA Warns of Fortinet SQL Injection Vulnerability Actively Exploited in Attacks</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 12:14:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-weaponize-obsidian-shell-commands-plugin-to-launch-cross-platform-malware-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-weaponize-obsidian-shell-commands-plugin-to-launch-cross-platform-malware-attacks/]]></link>
			<title>Hackers Weaponize Obsidian Shell Commands Plugin to Launch Cross-Platform Malware Attacks</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:39:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-bypass-phishing-emails-and-target-okta-identity-systems-instead/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-bypass-phishing-emails-and-target-okta-identity-systems-instead/]]></link>
			<title>Hackers Bypass Phishing Emails and Target Okta Identity Systems Instead</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 10:57:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/booking-com-confirms-data-breach-hackers-accessed-customers-personal-information/]]></guid>
			<link><![CDATA[https://www.cryptika.com/booking-com-confirms-data-breach-hackers-accessed-customers-personal-information/]]></link>
			<title>Booking.com Confirms Data Breach — Hackers Accessed Customers’ Personal Information</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 10:28:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/apt41-turns-linux-cloud-servers-into-credential-theft-targets-with-new-winnti-backdoor/]]></guid>
			<link><![CDATA[https://www.cryptika.com/apt41-turns-linux-cloud-servers-into-credential-theft-targets-with-new-winnti-backdoor/]]></link>
			<title>APT41 Turns Linux Cloud Servers Into Credential Theft Targets With New Winnti Backdoor</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:44:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/w3ll-phishing-kit-takedown-hits-global-credential-theft-and-mfa-bypass-operation/]]></guid>
			<link><![CDATA[https://www.cryptika.com/w3ll-phishing-kit-takedown-hits-global-credential-theft-and-mfa-bypass-operation/]]></link>
			<title>W3LL Phishing Kit Takedown Hits Global Credential Theft and MFA Bypass Operation</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:41:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-fake-proxifier-installer-on-github-to-spread-clipbanker-crypto-stealing-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-fake-proxifier-installer-on-github-to-spread-clipbanker-crypto-stealing-malware/]]></link>
			<title>Hackers Use Fake Proxifier Installer on GitHub to Spread ClipBanker Crypto-Stealing Malware</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 04:56:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/rockstars-gta-game-hacked-attackers-published-78-6-million-records-online/]]></guid>
			<link><![CDATA[https://www.cryptika.com/rockstars-gta-game-hacked-attackers-published-78-6-million-records-online/]]></link>
			<title>Rockstar’s GTA Game Hacked – Attackers published 78.6 Million Records Online</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 02:01:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/]]></guid>
			<link><![CDATA[https://www.cryptika.com/]]></link>
			<title>Cryptika Cyber Security</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 15:16:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/claude-ai-reportedly-down-for-hundreds-of-users-with-intermittent-500-errors/]]></guid>
			<link><![CDATA[https://www.cryptika.com/claude-ai-reportedly-down-for-hundreds-of-users-with-intermittent-500-errors/]]></link>
			<title>Claude AI Reportedly Down for Hundreds of Users With Intermittent 500 Errors</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 16:52:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-abuse-github-and-jira-notifications-to-deliver-phishing-through-trusted-saas-channels/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-abuse-github-and-jira-notifications-to-deliver-phishing-through-trusted-saas-channels/]]></link>
			<title>Hackers Abuse GitHub and Jira Notifications to Deliver Phishing Through Trusted SaaS Channels</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 15:52:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/mozilla-criticizes-microsoft-for-installing-copilot-on-windows-without-user-consent/]]></guid>
			<link><![CDATA[https://www.cryptika.com/mozilla-criticizes-microsoft-for-installing-copilot-on-windows-without-user-consent/]]></link>
			<title>Mozilla Criticizes Microsoft for Installing Copilot on Windows Without User Consent</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:53:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/how-threat-intelligence-drives-a-real-roi-boost-for-your-soc/]]></guid>
			<link><![CDATA[https://www.cryptika.com/how-threat-intelligence-drives-a-real-roi-boost-for-your-soc/]]></link>
			<title>How Threat Intelligence Drives a Real ROI Boost for Your SOC </title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:51:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/iran-linked-cyberav3ngers-sets-sights-on-water-utilities-and-industrial-controllers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/iran-linked-cyberav3ngers-sets-sights-on-water-utilities-and-industrial-controllers/]]></link>
			<title>Iran-Linked CyberAv3ngers Sets Sights on Water Utilities and Industrial Controllers</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 13:36:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-hide-vipertunnel-python-backdoor-inside-fake-dll-and-obfuscated-loader-chain/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-hide-vipertunnel-python-backdoor-inside-fake-dll-and-obfuscated-loader-chain/]]></link>
			<title>Hackers Hide VIPERTUNNEL Python Backdoor Inside Fake DLL and Obfuscated Loader Chain</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 12:34:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-hide-vipertunnel-python-backdoor-inside-fake-dll-and-obfuscated-loader-chain-2/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-hide-vipertunnel-python-backdoor-inside-fake-dll-and-obfuscated-loader-chain-2/]]></link>
			<title>Hackers Hide VIPERTUNNEL Python Backdoor Inside Fake DLL and Obfuscated Loader Chain</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 12:34:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/apt37-abuses-facebook-telegram-and-tampered-installer-in-new-targeted-intrusion-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/apt37-abuses-facebook-telegram-and-tampered-installer-in-new-targeted-intrusion-attack/]]></link>
			<title>APT37 Abuses Facebook, Telegram, and Tampered Installer in New Targeted Intrusion Attack</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 10:37:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/basic-fit-data-breach-exposes-millions-of-users-across-multiple-countries/]]></guid>
			<link><![CDATA[https://www.cryptika.com/basic-fit-data-breach-exposes-millions-of-users-across-multiple-countries/]]></link>
			<title>Basic-Fit Data Breach Exposes Millions of Users Across Multiple Countries</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 10:34:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/adobe-patches-acrobat-reader-0-day-vulnerability-exploited-in-the-wild/]]></guid>
			<link><![CDATA[https://www.cryptika.com/adobe-patches-acrobat-reader-0-day-vulnerability-exploited-in-the-wild/]]></link>
			<title>Adobe Patches Acrobat Reader 0-Day Vulnerability Exploited in the Wild</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 08:23:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/elon-musk-announces-to-launch-xchat-with-self-destruct-message-features/]]></guid>
			<link><![CDATA[https://www.cryptika.com/elon-musk-announces-to-launch-xchat-with-self-destruct-message-features/]]></link>
			<title>Elon Musk Announces to Launch XChat With Self-Destruct Message Features</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 08:15:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-confirms-recent-windows-11-updates-break-push-button-reset/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-confirms-recent-windows-11-updates-break-push-button-reset/]]></link>
			<title>Microsoft Confirms Recent Windows 11 Updates Break Push Button Reset</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 08:09:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-wordpress-plugin-flaw-lets-attackers-bypass-authentication-and-gain-admin-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-wordpress-plugin-flaw-lets-attackers-bypass-authentication-and-gain-admin-access/]]></link>
			<title>Critical WordPress Plugin Flaw Lets Attackers Bypass Authentication and Gain Admin Access</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 07:17:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/whatsapps-end-to-end-encryption-by-default-claim-called-major-consumer-fraud-by-pavel-durov/]]></guid>
			<link><![CDATA[https://www.cryptika.com/whatsapps-end-to-end-encryption-by-default-claim-called-major-consumer-fraud-by-pavel-durov/]]></link>
			<title>WhatsApp’s ‘End-to-End Encryption by Default’ Claim Called Major Consumer Fraud by Pavel Durov</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 02:46:24 +0000]]></pubDate>
		</item>
				</channel>
</rss>
