<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 17, 2026 at 22:36 by All in One SEO v4.8.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cryptika.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cryptika Cybersecurity</title>
		<link><![CDATA[https://www.cryptika.com]]></link>
		<description><![CDATA[Cryptika Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Fri, 17 Apr 2026 17:53:50 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cryptika.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-target-tp-link-routers-with-mirai-malware-in-cve-2023-33538-exploitation-attempts/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-target-tp-link-routers-with-mirai-malware-in-cve-2023-33538-exploitation-attempts/]]></link>
			<title>Hackers Target TP-Link Routers With Mirai Malware in CVE-2023-33538 Exploitation Attempts</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 17:53:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/email-borne-worm-surge-drives-new-threat-wave-across-industrial-control-systems/]]></guid>
			<link><![CDATA[https://www.cryptika.com/email-borne-worm-surge-drives-new-threat-wave-across-industrial-control-systems/]]></link>
			<title>Email-Borne Worm Surge Drives New Threat Wave Across Industrial Control Systems</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 16:04:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fake-zoom-sdk-update-delivers-sapphire-sleet-malware-in-new-macos-intrusion-chain/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fake-zoom-sdk-update-delivers-sapphire-sleet-malware-in-new-macos-intrusion-chain/]]></link>
			<title>Fake Zoom SDK Update Delivers Sapphire Sleet Malware in New macOS Intrusion Chain</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 15:17:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/attackers-weaponize-cve-2026-39987-to-spread-blockchain-based-backdoor-via-hugging-face/]]></guid>
			<link><![CDATA[https://www.cryptika.com/attackers-weaponize-cve-2026-39987-to-spread-blockchain-based-backdoor-via-hugging-face/]]></link>
			<title>Attackers Weaponize CVE-2026-39987 to Spread Blockchain-Based Backdoor Via Hugging Face</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 14:14:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fake-ledger-hardware-wallets-on-chinese-marketplaces-steal-crypto-seeds-and-pins/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fake-ledger-hardware-wallets-on-chinese-marketplaces-steal-crypto-seeds-and-pins/]]></link>
			<title>Fake Ledger Hardware Wallets on Chinese Marketplaces Steal Crypto Seeds and PINs</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 14:07:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/anthropic-releases-claude-opus-4-7-with-automated-real-time-cybersecurity-safeguards/]]></guid>
			<link><![CDATA[https://www.cryptika.com/anthropic-releases-claude-opus-4-7-with-automated-real-time-cybersecurity-safeguards/]]></link>
			<title>Anthropic Releases Claude Opus 4.7 with Automated Real-Time Cybersecurity Safeguards</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 13:28:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/payouts-king-rises-as-new-ransomware-threat-linked-to-former-blackbasta-affiliates/]]></guid>
			<link><![CDATA[https://www.cryptika.com/payouts-king-rises-as-new-ransomware-threat-linked-to-former-blackbasta-affiliates/]]></link>
			<title>Payouts King Rises as New Ransomware Threat Linked to Former BlackBasta Affiliates</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 10:44:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-apache-activemq-input-validation-vulnerability-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-apache-activemq-input-validation-vulnerability-exploited-in-attacks/]]></link>
			<title>CISA Warns of Apache ActiveMQ Input Validation Vulnerability Exploited in Attacks</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 10:36:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/leaked-windows-defender-0-day-vulnerability-actively-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/leaked-windows-defender-0-day-vulnerability-actively-exploited-in-attacks/]]></link>
			<title>Leaked Windows Defender 0-Day Vulnerability Actively Exploited in Attacks</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 10:24:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-confirms-windows-servers-enter-reboot-loops-following-april-patches/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-confirms-windows-servers-enter-reboot-loops-following-april-patches/]]></link>
			<title>Microsoft Confirms Windows Servers Enter Reboot Loops Following April Patches</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 08:51:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/windows-snipping-tool-vulnerability-allows-attacker-to-perform-spoofing-over-a-network/]]></guid>
			<link><![CDATA[https://www.cryptika.com/windows-snipping-tool-vulnerability-allows-attacker-to-perform-spoofing-over-a-network/]]></link>
			<title>Windows Snipping Tool Vulnerability Allows Attacker to Perform Spoofing Over a Network</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 08:41:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/one-click-rce-in-azure-windows-admin-center-allow-attacker-to-execute-arbitrary-commands/]]></guid>
			<link><![CDATA[https://www.cryptika.com/one-click-rce-in-azure-windows-admin-center-allow-attacker-to-execute-arbitrary-commands/]]></link>
			<title>One-Click RCE in Azure Windows Admin Center Allow Attacker to Execute Arbitrary Commands</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 08:30:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/spankrat-exploits-windows-explorer-processes-for-stealth-and-delayed-detection/]]></guid>
			<link><![CDATA[https://www.cryptika.com/spankrat-exploits-windows-explorer-processes-for-stealth-and-delayed-detection/]]></link>
			<title>SpankRAT Exploits Windows Explorer Processes for Stealth and Delayed Detection</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 17:31:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/about/in-jordan/]]></guid>
			<link><![CDATA[https://www.cryptika.com/about/in-jordan/]]></link>
			<title>Jordan Cyber Security | Information Security</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 13:18:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/google-microsoft-meta-tracking-you-even-if-you-opt-out-new-research/]]></guid>
			<link><![CDATA[https://www.cryptika.com/google-microsoft-meta-tracking-you-even-if-you-opt-out-new-research/]]></link>
			<title>Google, Microsoft, Meta Tracking You Even if You Opt Out – New Research</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:16:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/windows-active-directory-vulnerability-allow-attackers-to-execute-malicious-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/windows-active-directory-vulnerability-allow-attackers-to-execute-malicious-code/]]></link>
			<title>Windows Active Directory Vulnerability Allow Attackers to Execute Malicious Code</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:11:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/]]></guid>
			<link><![CDATA[https://www.cryptika.com/]]></link>
			<title>Cryptika Cyber Security</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 15:16:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-365-web-services-hit-by-google-chrome-147-compatibility-issue/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-365-web-services-hit-by-google-chrome-147-compatibility-issue/]]></link>
			<title>Microsoft 365 Web Services Hit by Google Chrome 147 Compatibility Issue</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 12:54:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/two-u-s-nationals-sentenced-for-running-laptop-farm-for-dprk-remote-workers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/two-u-s-nationals-sentenced-for-running-laptop-farm-for-dprk-remote-workers/]]></link>
			<title>Two U.S. Nationals Sentenced for Running Laptop Farm for DPRK Remote Workers</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:49:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/about/about-cryptika-cybersecurity-kuwait/]]></guid>
			<link><![CDATA[https://www.cryptika.com/about/about-cryptika-cybersecurity-kuwait/]]></link>
			<title>About Cryptika Cybersecurity &#8211; Kuwait</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:42:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/about/about-cryptika-cyber-security-doha-qatar/]]></guid>
			<link><![CDATA[https://www.cryptika.com/about/about-cryptika-cyber-security-doha-qatar/]]></link>
			<title>About Cryptika Cybersecurity &#8211; Qatar</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:41:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/about/]]></guid>
			<link><![CDATA[https://www.cryptika.com/about/]]></link>
			<title>About Cryptika Cyber Security</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:36:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-cisco-ise-vulnerabilities-let-remote-attackers-execute-malicious-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-cisco-ise-vulnerabilities-let-remote-attackers-execute-malicious-code/]]></link>
			<title>Critical Cisco ISE Vulnerabilities Let Remote Attackers Execute Malicious Code</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:32:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/splunk-enterprise-and-cloud-platform-vulnerability-enables-remote-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/splunk-enterprise-and-cloud-platform-vulnerability-enables-remote-code-execution-attacks/]]></link>
			<title>Splunk Enterprise and Cloud Platform Vulnerability Enables Remote Code Execution Attacks</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 07:42:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/1250-c2-servers-mapped-across-russian-hosting-across-165-providers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/1250-c2-servers-mapped-across-russian-hosting-across-165-providers/]]></link>
			<title>1,250+ C2 Servers Mapped Across Russian Hosting Across 165 Providers</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 06:14:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-abuse-google-discover-with-ai-generated-content-to-push-malicious-notifications/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-abuse-google-discover-with-ai-generated-content-to-push-malicious-notifications/]]></link>
			<title>Hackers Abuse Google Discover With AI-Generated Content to Push Malicious Notifications</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 04:34:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-releases-cumulative-update-kb5083769-for-windows-11-version-25h2-and-24h2/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-releases-cumulative-update-kb5083769-for-windows-11-version-25h2-and-24h2/]]></link>
			<title>Microsoft Releases Cumulative Update KB5083769 for Windows 11, Version 25H2 and 24H2</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:14:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-php-composer-vulnerability-let-attackers-execute-arbitrary-commands/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-php-composer-vulnerability-let-attackers-execute-arbitrary-commands/]]></link>
			<title>New PHP Composer Vulnerability Let Attackers Execute Arbitrary Commands</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:08:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/muddywater-style-hackers-scan-12000-systems-before-hitting-middle-east-critical-sectors/]]></guid>
			<link><![CDATA[https://www.cryptika.com/muddywater-style-hackers-scan-12000-systems-before-hitting-middle-east-critical-sectors/]]></link>
			<title>MuddyWater-Style Hackers Scan 12,000+ Systems Before Hitting Middle East Critical Sectors</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 13:08:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-using-google-cloud-storage-to-bypass-email-filters-and-deliver-remcos-rat/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-using-google-cloud-storage-to-bypass-email-filters-and-deliver-remcos-rat/]]></link>
			<title>Hackers Using Google Cloud Storage to Bypass Email Filters and Deliver Remcos RAT</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 12:47:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-hide-backdoor-in-trusted-wordpress-plugins-for-8-months-before-activating-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-hide-backdoor-in-trusted-wordpress-plugins-for-8-months-before-activating-malware/]]></link>
			<title>Hackers Hide Backdoor in Trusted WordPress Plugins for 8 Months Before Activating Malware</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 12:14:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/about/cybersecurity-in-dubai/]]></guid>
			<link><![CDATA[https://www.cryptika.com/about/cybersecurity-in-dubai/]]></link>
			<title>About Cryptika Cybersecurity &#8211; Dubai</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:40:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-create-hidden-mailbox-rules-in-microsoft-365-to-intercept-sensitive-business-emails/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-create-hidden-mailbox-rules-in-microsoft-365-to-intercept-sensitive-business-emails/]]></link>
			<title>Hackers Create Hidden Mailbox Rules in Microsoft 365 to Intercept Sensitive Business Emails</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 11:34:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/agentic-llm-browsers-expose-new-attack-surface-for-prompt-injection-and-data-theft/]]></guid>
			<link><![CDATA[https://www.cryptika.com/agentic-llm-browsers-expose-new-attack-surface-for-prompt-injection-and-data-theft/]]></link>
			<title>Agentic LLM Browsers Expose New Attack Surface for Prompt Injection and Data Theft</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 10:45:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/funnull-linked-triad-nexus-resurfaces-with-175-rotating-cname-domains-and-global-scam-portals/]]></guid>
			<link><![CDATA[https://www.cryptika.com/funnull-linked-triad-nexus-resurfaces-with-175-rotating-cname-domains-and-global-scam-portals/]]></link>
			<title>FUNNULL-Linked Triad Nexus Resurfaces With 175+ Rotating CNAME Domains and Global Scam Portals</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:19:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/windows-bitlocker-vulnerability-allows-attacker-to-bypass-security-feature/]]></guid>
			<link><![CDATA[https://www.cryptika.com/windows-bitlocker-vulnerability-allows-attacker-to-bypass-security-feature/]]></link>
			<title>Windows BitLocker Vulnerability Allows Attacker to Bypass  Security Feature</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:06:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-janaware-ransomware-targets-turkish-users-through-customized-adwind-rat/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-janaware-ransomware-targets-turkish-users-through-customized-adwind-rat/]]></link>
			<title>New JanaWare Ransomware Targets Turkish Users Through Customized Adwind RAT</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 07:38:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-uac-0247-campaign-steals-browser-and-whatsapp-data-from-hospitals-and-governments/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-uac-0247-campaign-steals-browser-and-whatsapp-data-from-hospitals-and-governments/]]></link>
			<title>New UAC-0247 Campaign Steals Browser and WhatsApp Data From Hospitals and Governments</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:32:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-defender-0-day-vulnerability-enables-privilege-escalation-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-defender-0-day-vulnerability-enables-privilege-escalation-attack/]]></link>
			<title>Microsoft Defender 0-Day Vulnerability Enables Privilege Escalation Attack</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 07:33:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/25000-endpoints-exposed-by-dragon-boss-solutions-update-domain-supply-chain-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/25000-endpoints-exposed-by-dragon-boss-solutions-update-domain-supply-chain-attack/]]></link>
			<title>25,000+ Endpoints Exposed by Dragon Boss Solutions Update Domain Supply Chain Attack</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 05:24:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/openai-launches-gpt-5-4-with-reverse-engineering-vulnerability-and-malware-analysis-features/]]></guid>
			<link><![CDATA[https://www.cryptika.com/openai-launches-gpt-5-4-with-reverse-engineering-vulnerability-and-malware-analysis-features/]]></link>
			<title>OpenAI Launches GPT-5.4 with Reverse Engineering, Vulnerability and Malware Analysis Features</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 03:09:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-sharepoint-server-0-day-vulnerability-actively-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-sharepoint-server-0-day-vulnerability-actively-exploited-in-attacks/]]></link>
			<title>Microsoft SharePoint Server 0-Day Vulnerability Actively Exploited in Attacks</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 02:30:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/patch-tuesday-april-2026-edition/]]></guid>
			<link><![CDATA[https://www.cryptika.com/patch-tuesday-april-2026-edition/]]></link>
			<title>Patch Tuesday, April 2026 Edition</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 21:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/31-high-impact-vulnerabilities-exploited-in-march-as-interlock-hits-cisco-fmc-zero-day/]]></guid>
			<link><![CDATA[https://www.cryptika.com/31-high-impact-vulnerabilities-exploited-in-march-as-interlock-hits-cisco-fmc-zero-day/]]></link>
			<title>31 High-Impact Vulnerabilities Exploited in March as Interlock Hits Cisco FMC Zero-Day</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 08:51:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/security-risk-advisors-purple-team-participants-can-now-earn-cpe-credits/]]></guid>
			<link><![CDATA[https://www.cryptika.com/security-risk-advisors-purple-team-participants-can-now-earn-cpe-credits/]]></link>
			<title>Security Risk Advisors Purple Team Participants Can Now Earn CPE Credits</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 18:09:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fortinet-patches-11-vulnerabilities-across-fortisandbox-fortios-fortianalyzer-and-fortimanager/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fortinet-patches-11-vulnerabilities-across-fortisandbox-fortios-fortianalyzer-and-fortimanager/]]></link>
			<title>Fortinet Patches 11 Vulnerabilities Across FortiSandbox, FortiOS, FortiAnalyzer, and FortiManager</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 17:59:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-chrome-privacy-analysis-shows-how-fingerprinting-and-header-leaks-can-expose-users/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-chrome-privacy-analysis-shows-how-fingerprinting-and-header-leaks-can-expose-users/]]></link>
			<title>New Chrome Privacy Analysis Shows How Fingerprinting and Header Leaks Can Expose Users</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 08:36:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-etcd-auth-bypass-flaw-allows-unauthorized-access-to-sensitive-cluster-apis/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-etcd-auth-bypass-flaw-allows-unauthorized-access-to-sensitive-cluster-apis/]]></link>
			<title>Critical etcd Auth Bypass Flaw Allows Unauthorized Access to Sensitive Cluster APIs</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 16:59:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/ivanti-neurons-for-itsm-vulnerabilities-allow-remote-attacker-to-obtain-user-sessions/]]></guid>
			<link><![CDATA[https://www.cryptika.com/ivanti-neurons-for-itsm-vulnerabilities-allow-remote-attacker-to-obtain-user-sessions/]]></link>
			<title>Ivanti Neurons for ITSM Vulnerabilities Allow Remote Attacker to Obtain User Sessions</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 16:52:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/blog/]]></guid>
			<link><![CDATA[https://www.cryptika.com/blog/]]></link>
			<title>Cybersecurity Blog</title>
			<pubDate><![CDATA[Sun, 05 Jun 2022 13:24:57 +0000]]></pubDate>
		</item>
				</channel>
</rss>
