<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 20, 2026 at 22:53 by All in One SEO v4.8.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cryptika.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cryptika Cybersecurity</title>
		<link><![CDATA[https://www.cryptika.com]]></link>
		<description><![CDATA[Cryptika Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Wed, 20 May 2026 17:37:54 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cryptika.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cryptika.com/devilnfc-android-malware-uses-kiosk-mode-to-trap-victims-during-nfc-relay-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/devilnfc-android-malware-uses-kiosk-mode-to-trap-victims-during-nfc-relay-attacks/]]></link>
			<title>DevilNFC Android Malware Uses Kiosk Mode to Trap Victims During NFC Relay Attacks</title>
			<pubDate><![CDATA[Wed, 20 May 2026 17:37:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/pintheft-linux-vulnerability-let-attackers-gain-root-access-poc-released/]]></guid>
			<link><![CDATA[https://www.cryptika.com/pintheft-linux-vulnerability-let-attackers-gain-root-access-poc-released/]]></link>
			<title>PinTheft Linux Vulnerability Let Attackers Gain Root Access – PoC Released</title>
			<pubDate><![CDATA[Wed, 20 May 2026 17:22:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/how-to-close-the-most-expensive-gap-in-your-soc/]]></guid>
			<link><![CDATA[https://www.cryptika.com/how-to-close-the-most-expensive-gap-in-your-soc/]]></link>
			<title>How to Close the Most Expensive Gap in Your SOC </title>
			<pubDate><![CDATA[Wed, 20 May 2026 16:44:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-releases-mitigation-for-windows-bitlocker-security-bypass-0-day-vulnerability/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-releases-mitigation-for-windows-bitlocker-security-bypass-0-day-vulnerability/]]></link>
			<title>Microsoft Releases Mitigation for Windows BitLocker Security Bypass 0-Day Vulnerability</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:25:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-nginx-vulnerability-allow-remote-attackers-to-trigger-malicious-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-nginx-vulnerability-allow-remote-attackers-to-trigger-malicious-code/]]></link>
			<title>New NGINX Vulnerability Allow Remote Attackers to Trigger Malicious Code</title>
			<pubDate><![CDATA[Wed, 20 May 2026 08:57:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/github-hacked-internal-source-code-repositories-compromised-via-employee-device/]]></guid>
			<link><![CDATA[https://www.cryptika.com/github-hacked-internal-source-code-repositories-compromised-via-employee-device/]]></link>
			<title>GitHub Hacked – Internal Source Code Repositories Compromised via Employee Device</title>
			<pubDate><![CDATA[Wed, 20 May 2026 04:47:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/poc-exploit-released-for-20-year-old-postgresql-rce-vulnerability/]]></guid>
			<link><![CDATA[https://www.cryptika.com/poc-exploit-released-for-20-year-old-postgresql-rce-vulnerability/]]></link>
			<title>PoC Exploit Released for 20-Year Old PostgreSQL RCE Vulnerability</title>
			<pubDate><![CDATA[Wed, 20 May 2026 04:26:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/shinyhunters-claims-credit-for-cyber-attack-on-online-learning-management-system/]]></guid>
			<link><![CDATA[https://www.cryptika.com/shinyhunters-claims-credit-for-cyber-attack-on-online-learning-management-system/]]></link>
			<title>ShinyHunters Claims Credit for Cyber-Attack on Online Learning Management System</title>
			<pubDate><![CDATA[Wed, 20 May 2026 03:51:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/github-source-code-breach-teampcp-claims-access-to-internal-source-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/github-source-code-breach-teampcp-claims-access-to-internal-source-code/]]></link>
			<title>GitHub Source Code Breach – TeamPCP Claims Access to Internal Source Code</title>
			<pubDate><![CDATA[Wed, 20 May 2026 02:39:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/uac-0184-malware-chain-uses-bitsadmin-and-hta-files-for-gated-payload-delivery/]]></guid>
			<link><![CDATA[https://www.cryptika.com/uac-0184-malware-chain-uses-bitsadmin-and-hta-files-for-gated-payload-delivery/]]></link>
			<title>UAC-0184 Malware Chain Uses bitsadmin and HTA Files for Gated Payload Delivery</title>
			<pubDate><![CDATA[Tue, 19 May 2026 22:07:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/macos-malware-installs-fake-google-software-update-launchagent-for-persistence/]]></guid>
			<link><![CDATA[https://www.cryptika.com/macos-malware-installs-fake-google-software-update-launchagent-for-persistence/]]></link>
			<title>macOS Malware Installs Fake Google Software Update LaunchAgent for Persistence</title>
			<pubDate><![CDATA[Tue, 19 May 2026 21:50:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/the-gentlemen-ransomware-attacks-windows-linux-nas-bsd-and-esxi-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/the-gentlemen-ransomware-attacks-windows-linux-nas-bsd-and-esxi-attacks/]]></link>
			<title>The Gentlemen Ransomware Attacks Windows, Linux, NAS, BSD, and ESXi Attacks</title>
			<pubDate><![CDATA[Tue, 19 May 2026 20:12:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/kimsuky-hackers-use-lnk-and-jse-lures-to-target-recruiters-crypto-users-and-defense-officials/]]></guid>
			<link><![CDATA[https://www.cryptika.com/kimsuky-hackers-use-lnk-and-jse-lures-to-target-recruiters-crypto-users-and-defense-officials/]]></link>
			<title>Kimsuky Hackers Use LNK and JSE Lures to Target Recruiters, Crypto Users, and Defense Officials</title>
			<pubDate><![CDATA[Tue, 19 May 2026 18:51:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/malware-campaign-uses-javascript-powershell-and-shellcode-to-deliver-crypto-clipper/]]></guid>
			<link><![CDATA[https://www.cryptika.com/malware-campaign-uses-javascript-powershell-and-shellcode-to-deliver-crypto-clipper/]]></link>
			<title>Malware Campaign Uses JavaScript, PowerShell, and Shellcode to Deliver Crypto Clipper</title>
			<pubDate><![CDATA[Tue, 19 May 2026 17:22:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/dirtydecrypt-linux-kernel-vulnerability-poc-exploit-code-released/]]></guid>
			<link><![CDATA[https://www.cryptika.com/dirtydecrypt-linux-kernel-vulnerability-poc-exploit-code-released/]]></link>
			<title>DirtyDecrypt Linux Kernel Vulnerability PoC Exploit Code Released</title>
			<pubDate><![CDATA[Tue, 19 May 2026 17:18:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/3-tactics-elite-socs-use-to-operationalize-threat-intelligence/]]></guid>
			<link><![CDATA[https://www.cryptika.com/3-tactics-elite-socs-use-to-operationalize-threat-intelligence/]]></link>
			<title>3 Tactics Elite SOCs Use to Operationalize Threat Intelligence</title>
			<pubDate><![CDATA[Tue, 19 May 2026 17:12:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-postgresql-vulnerabilities-enables-code-execution-and-sql-injections/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-postgresql-vulnerabilities-enables-code-execution-and-sql-injections/]]></link>
			<title>Critical PostgreSQL Vulnerabilities Enables Code Execution and SQL Injections</title>
			<pubDate><![CDATA[Tue, 19 May 2026 15:44:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/two-thirds-of-nonhuman-accounts-are-unseen-and-unmanaged-according-to-orchid-securitys-identity-gap-report/]]></guid>
			<link><![CDATA[https://www.cryptika.com/two-thirds-of-nonhuman-accounts-are-unseen-and-unmanaged-according-to-orchid-securitys-identity-gap-report/]]></link>
			<title>Two-Thirds of Nonhuman Accounts Are Unseen and Unmanaged, According to Orchid Security’s Identity Gap Report</title>
			<pubDate><![CDATA[Tue, 19 May 2026 15:37:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/attackers-use-cloudflare-storage-endpoint-to-exfiltrate-files-from-compromised-networks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/attackers-use-cloudflare-storage-endpoint-to-exfiltrate-files-from-compromised-networks/]]></link>
			<title>Attackers Use Cloudflare Storage Endpoint to Exfiltrate Files From Compromised Networks</title>
			<pubDate><![CDATA[Tue, 19 May 2026 14:01:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-voidstealer-malware-bypasses-chromes-protection-to-steal-user-data/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-voidstealer-malware-bypasses-chromes-protection-to-steal-user-data/]]></link>
			<title>New VoidStealer Malware Bypasses Chrome’s Protection to Steal User Data</title>
			<pubDate><![CDATA[Tue, 19 May 2026 12:53:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/nx-console-vs-code-extension-compromised-to-steal-developer-and-cloud-secrets/]]></guid>
			<link><![CDATA[https://www.cryptika.com/nx-console-vs-code-extension-compromised-to-steal-developer-and-cloud-secrets/]]></link>
			<title>Nx Console VS Code Extension Compromised to Steal Developer and Cloud Secrets</title>
			<pubDate><![CDATA[Tue, 19 May 2026 11:50:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-to-retire-teams-together-mode-to-enhance-performance-improvements/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-to-retire-teams-together-mode-to-enhance-performance-improvements/]]></link>
			<title>Microsoft to Retire Teams Together Mode to Enhance Performance Improvements</title>
			<pubDate><![CDATA[Tue, 19 May 2026 10:37:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-compromise-antv-packages-in-mini-shai-hulud-npm-attack-wave/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-compromise-antv-packages-in-mini-shai-hulud-npm-attack-wave/]]></link>
			<title>Hackers Compromise @antv Packages in Mini Shai-Hulud npm Attack Wave</title>
			<pubDate><![CDATA[Tue, 19 May 2026 09:07:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-admin-exposes-aws-govcloud-credentials-on-public-github-repository/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-admin-exposes-aws-govcloud-credentials-on-public-github-repository/]]></link>
			<title>CISA Admin Exposes AWS GovCloud Credentials on Public GitHub Repository</title>
			<pubDate><![CDATA[Tue, 19 May 2026 08:39:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/blog/]]></guid>
			<link><![CDATA[https://www.cryptika.com/blog/]]></link>
			<title>Cybersecurity Blog</title>
			<pubDate><![CDATA[Sun, 05 Jun 2022 13:24:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-abuse-microsoft-entra-id-accounts-to-exfiltrate-microsoft-365-and-azure-data/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-abuse-microsoft-entra-id-accounts-to-exfiltrate-microsoft-365-and-azure-data/]]></link>
			<title>Hackers Abuse Microsoft Entra ID Accounts to Exfiltrate Microsoft 365 and Azure Data</title>
			<pubDate><![CDATA[Tue, 19 May 2026 06:59:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/mythos-preview-builds-poc-exploits-in-automated-vulnerability-research/]]></guid>
			<link><![CDATA[https://www.cryptika.com/mythos-preview-builds-poc-exploits-in-automated-vulnerability-research/]]></link>
			<title>Mythos Preview Builds PoC Exploits in Automated Vulnerability Research</title>
			<pubDate><![CDATA[Tue, 19 May 2026 03:34:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/]]></guid>
			<link><![CDATA[https://www.cryptika.com/]]></link>
			<title>Cryptika Cyber Security</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 15:16:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-admin-leaked-aws-govcloud-keys-on-github/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-admin-leaked-aws-govcloud-keys-on-github/]]></link>
			<title>CISA Admin Leaked AWS GovCloud Keys on Github</title>
			<pubDate><![CDATA[Mon, 18 May 2026 20:48:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-actively-exploiting-critical-nginx-rce-vulnerability-in-the-wild/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-actively-exploiting-critical-nginx-rce-vulnerability-in-the-wild/]]></link>
			<title>Hackers Actively Exploiting Critical NGINX RCE Vulnerability in the Wild</title>
			<pubDate><![CDATA[Mon, 18 May 2026 16:43:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-n8n-vulnerabilities-expose-automation-nodes-to-full-rce/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-n8n-vulnerabilities-expose-automation-nodes-to-full-rce/]]></link>
			<title>Critical n8n Vulnerabilities Expose Automation Nodes to Full RCE</title>
			<pubDate><![CDATA[Mon, 18 May 2026 14:38:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/linus-torvalds-says-ai-bug-reports-have-made-linux-security-mailing-list-unmanageable/]]></guid>
			<link><![CDATA[https://www.cryptika.com/linus-torvalds-says-ai-bug-reports-have-made-linux-security-mailing-list-unmanageable/]]></link>
			<title>Linus Torvalds Says AI Bug Reports Have Made Linux Security Mailing List Unmanageable</title>
			<pubDate><![CDATA[Mon, 18 May 2026 10:40:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/four-malicious-npm-packages-steal-ssh-keys-cloud-credentials-and-crypto-wallets/]]></guid>
			<link><![CDATA[https://www.cryptika.com/four-malicious-npm-packages-steal-ssh-keys-cloud-credentials-and-crypto-wallets/]]></link>
			<title>Four Malicious npm Packages Steal SSH Keys, Cloud Credentials, and Crypto Wallets</title>
			<pubDate><![CDATA[Mon, 18 May 2026 09:57:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-microsoft-exchange-server-vulnerability-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-microsoft-exchange-server-vulnerability-exploited-in-attacks/]]></link>
			<title>CISA Warns of Microsoft Exchange Server Vulnerability Exploited in Attacks</title>
			<pubDate><![CDATA[Mon, 18 May 2026 08:32:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/1-million-wordpress-sites-affected-by-avada-builder-file-read-and-sql-injection-flaws/]]></guid>
			<link><![CDATA[https://www.cryptika.com/1-million-wordpress-sites-affected-by-avada-builder-file-read-and-sql-injection-flaws/]]></link>
			<title>1 Million WordPress Sites Affected by Avada Builder File Read and SQL Injection Flaws</title>
			<pubDate><![CDATA[Mon, 18 May 2026 08:30:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-confirms-windows-11-update-fails-with-error-0x800f0922/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-confirms-windows-11-update-fails-with-error-0x800f0922/]]></link>
			<title>Microsoft Confirms Windows 11 Update Fails With Error 0x800f0922</title>
			<pubDate><![CDATA[Mon, 18 May 2026 06:24:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-windows-miniplasma-zero-day-let-attackers-gain-system-access-poc-released/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-windows-miniplasma-zero-day-let-attackers-gain-system-access-poc-released/]]></link>
			<title>New Windows ‘MiniPlasma’ Zero-Day Let Attackers Gain SYSTEM Access – PoC Released</title>
			<pubDate><![CDATA[Mon, 18 May 2026 06:00:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-wordpress-plugin-vulnerability-exposes-websites-to-authentication-bypass-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-wordpress-plugin-vulnerability-exposes-websites-to-authentication-bypass-attacks/]]></link>
			<title>Critical WordPress Plugin Vulnerability Exposes Websites to Authentication Bypass Attacks</title>
			<pubDate><![CDATA[Mon, 18 May 2026 04:06:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/grafana-labs-security-breach-hackers-access-github-and-download-codebase/]]></guid>
			<link><![CDATA[https://www.cryptika.com/grafana-labs-security-breach-hackers-access-github-and-download-codebase/]]></link>
			<title>Grafana Labs Security Breach – Hackers Access GitHub and Download Codebase</title>
			<pubDate><![CDATA[Sun, 17 May 2026 08:32:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/first-public-macos-kernel-exploit-on-apple-m5-prepared-using-mythos-preview-in-five-days/]]></guid>
			<link><![CDATA[https://www.cryptika.com/first-public-macos-kernel-exploit-on-apple-m5-prepared-using-mythos-preview-in-five-days/]]></link>
			<title>First Public macOS Kernel Exploit on Apple M5 Prepared Using Mythos Preview in Five Days</title>
			<pubDate><![CDATA[Sun, 17 May 2026 02:48:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-exchange-windows-11-and-cursor-zero-days-exploited-on-pwn2own-day-2/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-exchange-windows-11-and-cursor-zero-days-exploited-on-pwn2own-day-2/]]></link>
			<title>Microsoft Exchange, Windows 11, and Cursor Zero-Days Exploited on Pwn2Own Day 2</title>
			<pubDate><![CDATA[Sat, 16 May 2026 10:51:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/jdownloader-website-compromised-to-distribute-malicious-windows-and-linux-installers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/jdownloader-website-compromised-to-distribute-malicious-windows-and-linux-installers/]]></link>
			<title>JDownloader Website Compromised to Distribute Malicious Windows and Linux Installers</title>
			<pubDate><![CDATA[Sat, 16 May 2026 10:23:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/malicious-jpeg-images-could-trigger-php-memory-safety-vulnerabilities/]]></guid>
			<link><![CDATA[https://www.cryptika.com/malicious-jpeg-images-could-trigger-php-memory-safety-vulnerabilities/]]></link>
			<title>Malicious JPEG Images Could Trigger PHP Memory Safety Vulnerabilities</title>
			<pubDate><![CDATA[Sat, 16 May 2026 09:01:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/linux-kernel-vulnerability-ssh-keysign-pwn-lets-attackers-read-ssh-keys-and-shadow-passwords/]]></guid>
			<link><![CDATA[https://www.cryptika.com/linux-kernel-vulnerability-ssh-keysign-pwn-lets-attackers-read-ssh-keys-and-shadow-passwords/]]></link>
			<title>Linux Kernel Vulnerability “ssh-keysign-pwn” Lets Attackers Read SSH Keys and Shadow Passwords</title>
			<pubDate><![CDATA[Sat, 16 May 2026 07:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/google-project-zero-discloses-zero-click-exploit-chain-for-pixel-10-devices/]]></guid>
			<link><![CDATA[https://www.cryptika.com/google-project-zero-discloses-zero-click-exploit-chain-for-pixel-10-devices/]]></link>
			<title>Google Project Zero Discloses Zero-Click Exploit Chain for Pixel 10 Devices</title>
			<pubDate><![CDATA[Sat, 16 May 2026 04:02:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/android-16-vpn-bypass-lets-malicious-apps-reveal-users-real-ip-address/]]></guid>
			<link><![CDATA[https://www.cryptika.com/android-16-vpn-bypass-lets-malicious-apps-reveal-users-real-ip-address/]]></link>
			<title>Android 16 VPN Bypass Lets Malicious Apps Reveal Users Real IP Address</title>
			<pubDate><![CDATA[Sat, 16 May 2026 02:51:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fast16-malware-manipulated-nuclear-weapons-simulation-data-to-sabotage-test-results/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fast16-malware-manipulated-nuclear-weapons-simulation-data-to-sabotage-test-results/]]></link>
			<title>Fast16 Malware Manipulated Nuclear Weapons Simulation Data to Sabotage Test Results</title>
			<pubDate><![CDATA[Mon, 18 May 2026 03:43:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/gunra-ransomware-expands-raas-operations-after-shifting-from-conti-based-locker/]]></guid>
			<link><![CDATA[https://www.cryptika.com/gunra-ransomware-expands-raas-operations-after-shifting-from-conti-based-locker/]]></link>
			<title>Gunra Ransomware Expands RaaS Operations After Shifting From Conti-Based Locker</title>
			<pubDate><![CDATA[Fri, 15 May 2026 15:46:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/openclaw-chain-vulnerabilities-expose-245000-public-ai-agent-servers-to-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/openclaw-chain-vulnerabilities-expose-245000-public-ai-agent-servers-to-attack/]]></link>
			<title>OpenClaw Chain Vulnerabilities Expose 245,000 Public AI Agent Servers to Attack</title>
			<pubDate><![CDATA[Fri, 15 May 2026 15:41:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/shai-hulud-worm-steals-npm-github-aws-and-kubernetes-secrets-from-developers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/shai-hulud-worm-steals-npm-github-aws-and-kubernetes-secrets-from-developers/]]></link>
			<title>Shai-Hulud Worm Steals npm, GitHub, AWS, and Kubernetes Secrets From Developers</title>
			<pubDate><![CDATA[Fri, 15 May 2026 15:29:19 +0000]]></pubDate>
		</item>
				</channel>
</rss>
