<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 15, 2026 at 20:39 by All in One SEO v4.8.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cryptika.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cryptika Cybersecurity</title>
		<link><![CDATA[https://www.cryptika.com]]></link>
		<description><![CDATA[Cryptika Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Fri, 15 May 2026 15:46:30 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cryptika.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cryptika.com/gunra-ransomware-expands-raas-operations-after-shifting-from-conti-based-locker/]]></guid>
			<link><![CDATA[https://www.cryptika.com/gunra-ransomware-expands-raas-operations-after-shifting-from-conti-based-locker/]]></link>
			<title>Gunra Ransomware Expands RaaS Operations After Shifting From Conti-Based Locker</title>
			<pubDate><![CDATA[Fri, 15 May 2026 15:46:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/sandworm-hackers-pivot-from-compromised-it-systems-toward-critical-ot-assets/]]></guid>
			<link><![CDATA[https://www.cryptika.com/sandworm-hackers-pivot-from-compromised-it-systems-toward-critical-ot-assets/]]></link>
			<title>Sandworm Hackers Pivot From Compromised IT Systems Toward Critical OT Assets</title>
			<pubDate><![CDATA[Thu, 14 May 2026 20:14:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/openclaw-chain-vulnerabilities-expose-245000-public-ai-agent-servers-to-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/openclaw-chain-vulnerabilities-expose-245000-public-ai-agent-servers-to-attack/]]></link>
			<title>OpenClaw Chain Vulnerabilities Expose 245,000 Public AI Agent Servers to Attack</title>
			<pubDate><![CDATA[Fri, 15 May 2026 15:41:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/shai-hulud-worm-steals-npm-github-aws-and-kubernetes-secrets-from-developers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/shai-hulud-worm-steals-npm-github-aws-and-kubernetes-secrets-from-developers/]]></link>
			<title>Shai-Hulud Worm Steals npm, GitHub, AWS, and Kubernetes Secrets From Developers</title>
			<pubDate><![CDATA[Fri, 15 May 2026 15:29:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-edge-windows-11-and-litellm-hacked-in-pwn2own-berlin-2026/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-edge-windows-11-and-litellm-hacked-in-pwn2own-berlin-2026/]]></link>
			<title>Microsoft Edge, Windows 11 and LiteLLM Hacked in Pwn2Own Berlin 2026</title>
			<pubDate><![CDATA[Fri, 15 May 2026 13:20:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/tycoon-2fa-operators-adopt-oauth-device-code-phishing-to-bypass-mfa/]]></guid>
			<link><![CDATA[https://www.cryptika.com/tycoon-2fa-operators-adopt-oauth-device-code-phishing-to-bypass-mfa/]]></link>
			<title>Tycoon 2FA Operators Adopt OAuth Device Code Phishing to Bypass MFA</title>
			<pubDate><![CDATA[Fri, 15 May 2026 11:33:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/praisonai-vulnerability-exploited-within-hours-of-public-disclosure/]]></guid>
			<link><![CDATA[https://www.cryptika.com/praisonai-vulnerability-exploited-within-hours-of-public-disclosure/]]></link>
			<title>PraisonAI Vulnerability Exploited Within Hours of Public Disclosure</title>
			<pubDate><![CDATA[Fri, 15 May 2026 11:14:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/amazon-redshift-jdbc-driver-vulnerabilities-enables-remote-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/amazon-redshift-jdbc-driver-vulnerabilities-enables-remote-code-execution-attacks/]]></link>
			<title>Amazon Redshift JDBC Driver Vulnerabilities Enables Remote Code Execution Attacks</title>
			<pubDate><![CDATA[Fri, 15 May 2026 11:12:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-details-kazuar-malwares-modular-architecture-and-p2p-botnet-operations/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-details-kazuar-malwares-modular-architecture-and-p2p-botnet-operations/]]></link>
			<title>Microsoft Details Kazuar Malware’s Modular Architecture and P2P Botnet Operations</title>
			<pubDate><![CDATA[Fri, 15 May 2026 08:53:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/vmware-fusion-vulnerability-let-attackers-escalate-privilege-to-root/]]></guid>
			<link><![CDATA[https://www.cryptika.com/vmware-fusion-vulnerability-let-attackers-escalate-privilege-to-root/]]></link>
			<title>VMware Fusion Vulnerability Let Attackers Escalate Privilege to Root</title>
			<pubDate><![CDATA[Fri, 15 May 2026 08:24:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-abuse-scheduled-tasks-to-maintain-persistence-in-frostyneighbor-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-abuse-scheduled-tasks-to-maintain-persistence-in-frostyneighbor-attacks/]]></link>
			<title>Hackers Abuse Scheduled Tasks to Maintain Persistence in FrostyNeighbor Attacks</title>
			<pubDate><![CDATA[Fri, 15 May 2026 08:04:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/openai-confirms-security-breach-via-tanstack-npm-supply-chain-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/openai-confirms-security-breach-via-tanstack-npm-supply-chain-attack/]]></link>
			<title>OpenAI Confirms Security Breach Via TanStack npm Supply Chain Attack</title>
			<pubDate><![CDATA[Fri, 15 May 2026 04:03:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisco-catalyst-sd-wan-controller-0-day-actively-exploited-to-gain-admin-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisco-catalyst-sd-wan-controller-0-day-actively-exploited-to-gain-admin-access/]]></link>
			<title>Cisco Catalyst SD-WAN Controller 0-Day Actively Exploited to Gain Admin Access</title>
			<pubDate><![CDATA[Fri, 15 May 2026 02:30:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/chinese-apt-hackers-exploit-microsoft-exchange-to-breach-energy-sector-network/]]></guid>
			<link><![CDATA[https://www.cryptika.com/chinese-apt-hackers-exploit-microsoft-exchange-to-breach-energy-sector-network/]]></link>
			<title>Chinese APT Hackers Exploit Microsoft Exchange to Breach Energy Sector Network</title>
			<pubDate><![CDATA[Thu, 14 May 2026 20:01:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-malware-framework-enables-screen-control-browser-artifact-access-and-uac-bypass/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-malware-framework-enables-screen-control-browser-artifact-access-and-uac-bypass/]]></link>
			<title>New Malware Framework Enables Screen Control, Browser Artifact Access, and UAC Bypass</title>
			<pubDate><![CDATA[Thu, 14 May 2026 18:32:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/anthropics-mythos-ai-reportedly-found-macos-vulnerabilities-that-could-bypass-apple-security/]]></guid>
			<link><![CDATA[https://www.cryptika.com/anthropics-mythos-ai-reportedly-found-macos-vulnerabilities-that-could-bypass-apple-security/]]></link>
			<title>Anthropic’s Mythos AI Reportedly Found macOS Vulnerabilities that Could Bypass Apple Security</title>
			<pubDate><![CDATA[Thu, 14 May 2026 17:42:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-compromise-170-npm-packages-to-steal-github-npm-aws-and-kubernetes-secrets/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-compromise-170-npm-packages-to-steal-github-npm-aws-and-kubernetes-secrets/]]></link>
			<title>Hackers Compromise 170 npm Packages to Steal GitHub, npm, AWS, and Kubernetes Secrets</title>
			<pubDate><![CDATA[Thu, 14 May 2026 17:21:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/how-top-socs-and-mssps-prevent-phishing-incidents-missed-by-email-filters/]]></guid>
			<link><![CDATA[https://www.cryptika.com/how-top-socs-and-mssps-prevent-phishing-incidents-missed-by-email-filters/]]></link>
			<title>How Top SOCs and MSSPs Prevent Phishing Incidents Missed by Email Filters </title>
			<pubDate><![CDATA[Wed, 13 May 2026 14:32:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/]]></guid>
			<link><![CDATA[https://www.cryptika.com/]]></link>
			<title>Cryptika Cyber Security</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 15:16:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/foxconn-confirms-cyberattack-after-nitrogen-ransomware-gang-claim/]]></guid>
			<link><![CDATA[https://www.cryptika.com/foxconn-confirms-cyberattack-after-nitrogen-ransomware-gang-claim/]]></link>
			<title>Foxconn Confirms Cyberattack After Nitrogen Ransomware Gang Claim</title>
			<pubDate><![CDATA[Wed, 13 May 2026 14:18:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fragnesia-linux-vulnerability-let-attackers-gain-root-privileges-poc-released/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fragnesia-linux-vulnerability-let-attackers-gain-root-privileges-poc-released/]]></link>
			<title>Fragnesia Linux Vulnerability Let Attackers Gain Root Privileges – PoC Released</title>
			<pubDate><![CDATA[Wed, 13 May 2026 13:48:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/amazon-quick-bug-exposed-ai-chat-agents-to-users-blocked-by-custom-permissions/]]></guid>
			<link><![CDATA[https://www.cryptika.com/amazon-quick-bug-exposed-ai-chat-agents-to-users-blocked-by-custom-permissions/]]></link>
			<title>Amazon Quick Bug Exposed AI Chat Agents to Users Blocked by Custom Permissions</title>
			<pubDate><![CDATA[Thu, 14 May 2026 15:26:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/dell-support-assist-updates-forces-windows-systems-to-bsod-loop/]]></guid>
			<link><![CDATA[https://www.cryptika.com/dell-support-assist-updates-forces-windows-systems-to-bsod-loop/]]></link>
			<title>Dell Support assist Updates Forces Windows Systems to BSOD Loop</title>
			<pubDate><![CDATA[Thu, 14 May 2026 15:13:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-gitlab-vulnerabilities-enables-xss-and-unauthenticated-dos-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-gitlab-vulnerabilities-enables-xss-and-unauthenticated-dos-attacks/]]></link>
			<title>Critical GitLab Vulnerabilities Enables XSS and Unauthenticated DoS Attacks</title>
			<pubDate><![CDATA[Thu, 14 May 2026 12:26:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/windows-dns-client-vulnerability-enables-remote-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/windows-dns-client-vulnerability-enables-remote-code-execution-attacks/]]></link>
			<title>Windows DNS Client Vulnerability Enables Remote Code Execution Attacks</title>
			<pubDate><![CDATA[Thu, 14 May 2026 07:53:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-18-year-old-nginx-vulnerability-enables-remote-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-18-year-old-nginx-vulnerability-enables-remote-code-execution-attacks/]]></link>
			<title>Critical 18-Year-Old NGINX Vulnerability Enables Remote Code Execution Attacks</title>
			<pubDate><![CDATA[Thu, 14 May 2026 06:27:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-mongodb-vulnerability-allow-attackers-to-execute-arbitrary-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-mongodb-vulnerability-allow-attackers-to-execute-arbitrary-code/]]></link>
			<title>Critical MongoDB Vulnerability Allow Attackers to Execute Arbitrary Code</title>
			<pubDate><![CDATA[Thu, 14 May 2026 05:54:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/the-gentlemen-raas-leverages-fortinet-and-cisco-edge-devices-for-initial-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/the-gentlemen-raas-leverages-fortinet-and-cisco-edge-devices-for-initial-access/]]></link>
			<title>The Gentlemen RaaS Leverages Fortinet and Cisco Edge Devices for Initial Access</title>
			<pubDate><![CDATA[Thu, 14 May 2026 05:44:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/clickfix-evolves-with-10-year-old-open-source-python-socks5-proxy/]]></guid>
			<link><![CDATA[https://www.cryptika.com/clickfix-evolves-with-10-year-old-open-source-python-socks5-proxy/]]></link>
			<title>ClickFix Evolves with 10-Year-Old Open-Source Python SOCKS5 Proxy</title>
			<pubDate><![CDATA[Wed, 13 May 2026 11:06:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/windows-bitlocker-0-day-vulnerability-enables-access-to-encrypted-drives/]]></guid>
			<link><![CDATA[https://www.cryptika.com/windows-bitlocker-0-day-vulnerability-enables-access-to-encrypted-drives/]]></link>
			<title>Windows BitLocker 0-Day Vulnerability Enables Access to Encrypted Drives</title>
			<pubDate><![CDATA[Thu, 14 May 2026 03:01:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-sandboxjs-escape-vulnerability-enables-host-takeover/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-sandboxjs-escape-vulnerability-enables-host-takeover/]]></link>
			<title>Critical SandboxJS Escape Vulnerability Enables Host Takeover</title>
			<pubDate><![CDATA[Wed, 13 May 2026 10:30:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-critical-exim-mailer-allows-remote-attacker-to-execute-arbitrary-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-critical-exim-mailer-allows-remote-attacker-to-execute-arbitrary-code/]]></link>
			<title>New Critical Exim Mailer Allows Remote Attacker to Execute Arbitrary Code</title>
			<pubDate><![CDATA[Thu, 14 May 2026 15:23:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/ios-26-5-brings-end-to-end-encrypted-rcs-messaging-between-iphone-and-android/]]></guid>
			<link><![CDATA[https://www.cryptika.com/ios-26-5-brings-end-to-end-encrypted-rcs-messaging-between-iphone-and-android/]]></link>
			<title>iOS 26.5 Brings End-to-end Encrypted RCS Messaging Between iPhone and Android</title>
			<pubDate><![CDATA[Wed, 13 May 2026 09:11:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-exim-bdat-gnutls-vulnerability-enables-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-exim-bdat-gnutls-vulnerability-enables-code-execution-attacks/]]></link>
			<title>New Exim BDAT GnuTLS Vulnerability Enables Code Execution Attacks</title>
			<pubDate><![CDATA[Wed, 13 May 2026 08:27:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/google-enhances-android-mobile-security-with-new-ai-powered-protections/]]></guid>
			<link><![CDATA[https://www.cryptika.com/google-enhances-android-mobile-security-with-new-ai-powered-protections/]]></link>
			<title>Google Enhances Android Mobile Security with New AI-Powered Protections</title>
			<pubDate><![CDATA[Wed, 13 May 2026 07:59:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-releases-cumulative-update-for-windows-11-version-25h2-and-24h2/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-releases-cumulative-update-for-windows-11-version-25h2-and-24h2/]]></link>
			<title>Microsoft Releases Cumulative Update for Windows 11, Version 25H2 and 24H2</title>
			<pubDate><![CDATA[Wed, 13 May 2026 07:01:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/top-10-best-data-loss-prevention-software-in-2026/]]></guid>
			<link><![CDATA[https://www.cryptika.com/top-10-best-data-loss-prevention-software-in-2026/]]></link>
			<title>Top 10 Best Data Loss Prevention Software in 2026</title>
			<pubDate><![CDATA[Wed, 13 May 2026 05:52:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-research-shows-ai-can-generate-realistic-command-lines-and-process-telemetry/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-research-shows-ai-can-generate-realistic-command-lines-and-process-telemetry/]]></link>
			<title>Microsoft Research Shows AI Can Generate Realistic Command Lines and Process Telemetry</title>
			<pubDate><![CDATA[Thu, 14 May 2026 13:47:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-teams-vulnerability-allows-hackers-to-perform-spoofing-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-teams-vulnerability-allows-hackers-to-perform-spoofing-attacks/]]></link>
			<title>Microsoft Teams Vulnerability Allows Hackers to Perform Spoofing Attacks</title>
			<pubDate><![CDATA[Wed, 13 May 2026 02:51:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/patch-tuesday-may-2026-edition/]]></guid>
			<link><![CDATA[https://www.cryptika.com/patch-tuesday-may-2026-edition/]]></link>
			<title>Patch Tuesday, May 2026 Edition</title>
			<pubDate><![CDATA[Tue, 12 May 2026 21:46:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-patch-tuesday-may-2026-120-vulnerabilities-fixed-including-29-critical-rce-flaws/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-patch-tuesday-may-2026-120-vulnerabilities-fixed-including-29-critical-rce-flaws/]]></link>
			<title>Microsoft Patch Tuesday May 2026 – 120 Vulnerabilities Fixed, Including 29 Critical RCE Flaws</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:40:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fortinet-patches-five-vulnerabilities-across-fortiap-fortios-and-enterprise-products/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fortinet-patches-five-vulnerabilities-across-fortiap-fortios-and-enterprise-products/]]></link>
			<title>Fortinet Patches Five Vulnerabilities Across FortiAP, FortiOS, and Enterprise Products</title>
			<pubDate><![CDATA[Tue, 12 May 2026 17:58:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-fortinet-fortisandbox-vulnerability-enables-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-fortinet-fortisandbox-vulnerability-enables-code-execution-attacks/]]></link>
			<title>Critical Fortinet FortiSandbox Vulnerability Enables Code Execution Attacks</title>
			<pubDate><![CDATA[Tue, 12 May 2026 17:45:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/lyrie-ai-launches-the-global-identity-standard-for-the-ai-agent-age-anthropics-cyber-verification-program/]]></guid>
			<link><![CDATA[https://www.cryptika.com/lyrie-ai-launches-the-global-identity-standard-for-the-ai-agent-age-anthropics-cyber-verification-program/]]></link>
			<title>Lyrie.ai Launches the Global Identity Standard for the AI Agent Age &amp; Anthropic’s Cyber Verification Program</title>
			<pubDate><![CDATA[Thu, 14 May 2026 09:36:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/threat-actors-leverage-vercels-ai-tools-to-mass‑produce-realistic-phishing-sites/]]></guid>
			<link><![CDATA[https://www.cryptika.com/threat-actors-leverage-vercels-ai-tools-to-mass‑produce-realistic-phishing-sites/]]></link>
			<title>Threat Actors Leverage Vercel’s AI Tools to Mass‑Produce Realistic Phishing Sites</title>
			<pubDate><![CDATA[Tue, 12 May 2026 15:46:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/zoom-rooms-and-workplace-vulnerabilities-allow-attackers-to-escalate-privileges/]]></guid>
			<link><![CDATA[https://www.cryptika.com/zoom-rooms-and-workplace-vulnerabilities-allow-attackers-to-escalate-privileges/]]></link>
			<title>Zoom Rooms and Workplace Vulnerabilities Allow Attackers to Escalate Privileges</title>
			<pubDate><![CDATA[Tue, 12 May 2026 15:43:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/openai-hit-with-class-action-privacy-lawsuit-for-sharing-chatgpt-data-with-google-and-meta/]]></guid>
			<link><![CDATA[https://www.cryptika.com/openai-hit-with-class-action-privacy-lawsuit-for-sharing-chatgpt-data-with-google-and-meta/]]></link>
			<title>OpenAI Hit with Class-Action Privacy Lawsuit for Sharing ChatGPT Data with Google and Meta</title>
			<pubDate><![CDATA[Thu, 14 May 2026 09:15:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/north-korean-hackers-weaponize-git-hooks-to-deploy-cross-platform-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/north-korean-hackers-weaponize-git-hooks-to-deploy-cross-platform-malware/]]></link>
			<title>North Korean Hackers Weaponize Git Hooks to Deploy Cross-Platform Malware</title>
			<pubDate><![CDATA[Tue, 12 May 2026 13:24:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/malicious-chrome-mv3-extension-impersonates-tronlink-to-steal-crypto-wallet-credentials/]]></guid>
			<link><![CDATA[https://www.cryptika.com/malicious-chrome-mv3-extension-impersonates-tronlink-to-steal-crypto-wallet-credentials/]]></link>
			<title>Malicious Chrome MV3 Extension Impersonates TronLink to Steal Crypto Wallet Credentials</title>
			<pubDate><![CDATA[Tue, 12 May 2026 11:42:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/blog/]]></guid>
			<link><![CDATA[https://www.cryptika.com/blog/]]></link>
			<title>Cybersecurity Blog</title>
			<pubDate><![CDATA[Sun, 05 Jun 2022 13:24:57 +0000]]></pubDate>
		</item>
				</channel>
</rss>
