<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 14, 2026 at 22:56 by All in One SEO v4.8.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cryptika.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cryptika Cybersecurity</title>
		<link><![CDATA[https://www.cryptika.com]]></link>
		<description><![CDATA[Cryptika Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Thu, 14 May 2026 17:42:02 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cryptika.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cryptika.com/anthropics-mythos-ai-reportedly-found-macos-vulnerabilities-that-could-bypass-apple-security/]]></guid>
			<link><![CDATA[https://www.cryptika.com/anthropics-mythos-ai-reportedly-found-macos-vulnerabilities-that-could-bypass-apple-security/]]></link>
			<title>Anthropic’s Mythos AI Reportedly Found macOS Vulnerabilities that Could Bypass Apple Security</title>
			<pubDate><![CDATA[Thu, 14 May 2026 17:42:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-compromise-170-npm-packages-to-steal-github-npm-aws-and-kubernetes-secrets/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-compromise-170-npm-packages-to-steal-github-npm-aws-and-kubernetes-secrets/]]></link>
			<title>Hackers Compromise 170 npm Packages to Steal GitHub, npm, AWS, and Kubernetes Secrets</title>
			<pubDate><![CDATA[Thu, 14 May 2026 17:21:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/amazon-quick-bug-exposed-ai-chat-agents-to-users-blocked-by-custom-permissions/]]></guid>
			<link><![CDATA[https://www.cryptika.com/amazon-quick-bug-exposed-ai-chat-agents-to-users-blocked-by-custom-permissions/]]></link>
			<title>Amazon Quick Bug Exposed AI Chat Agents to Users Blocked by Custom Permissions</title>
			<pubDate><![CDATA[Thu, 14 May 2026 15:26:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-critical-exim-mailer-allows-remote-attacker-to-execute-arbitrary-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-critical-exim-mailer-allows-remote-attacker-to-execute-arbitrary-code/]]></link>
			<title>New Critical Exim Mailer Allows Remote Attacker to Execute Arbitrary Code</title>
			<pubDate><![CDATA[Thu, 14 May 2026 15:23:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/dell-support-assist-updates-forces-windows-systems-to-bsod-loop/]]></guid>
			<link><![CDATA[https://www.cryptika.com/dell-support-assist-updates-forces-windows-systems-to-bsod-loop/]]></link>
			<title>Dell Support assist Updates Forces Windows Systems to BSOD Loop</title>
			<pubDate><![CDATA[Thu, 14 May 2026 15:13:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-research-shows-ai-can-generate-realistic-command-lines-and-process-telemetry/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-research-shows-ai-can-generate-realistic-command-lines-and-process-telemetry/]]></link>
			<title>Microsoft Research Shows AI Can Generate Realistic Command Lines and Process Telemetry</title>
			<pubDate><![CDATA[Thu, 14 May 2026 13:47:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-gitlab-vulnerabilities-enables-xss-and-unauthenticated-dos-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-gitlab-vulnerabilities-enables-xss-and-unauthenticated-dos-attacks/]]></link>
			<title>Critical GitLab Vulnerabilities Enables XSS and Unauthenticated DoS Attacks</title>
			<pubDate><![CDATA[Thu, 14 May 2026 12:26:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/how-top-socs-and-mssps-prevent-phishing-incidents-missed-by-email-filters/]]></guid>
			<link><![CDATA[https://www.cryptika.com/how-top-socs-and-mssps-prevent-phishing-incidents-missed-by-email-filters/]]></link>
			<title>How Top SOCs and MSSPs Prevent Phishing Incidents Missed by Email Filters </title>
			<pubDate><![CDATA[Wed, 13 May 2026 14:32:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/lyrie-ai-launches-the-global-identity-standard-for-the-ai-agent-age-anthropics-cyber-verification-program/]]></guid>
			<link><![CDATA[https://www.cryptika.com/lyrie-ai-launches-the-global-identity-standard-for-the-ai-agent-age-anthropics-cyber-verification-program/]]></link>
			<title>Lyrie.ai Launches the Global Identity Standard for the AI Agent Age &amp; Anthropic’s Cyber Verification Program</title>
			<pubDate><![CDATA[Thu, 14 May 2026 09:36:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/openai-hit-with-class-action-privacy-lawsuit-for-sharing-chatgpt-data-with-google-and-meta/]]></guid>
			<link><![CDATA[https://www.cryptika.com/openai-hit-with-class-action-privacy-lawsuit-for-sharing-chatgpt-data-with-google-and-meta/]]></link>
			<title>OpenAI Hit with Class-Action Privacy Lawsuit for Sharing ChatGPT Data with Google and Meta</title>
			<pubDate><![CDATA[Thu, 14 May 2026 09:15:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/windows-dns-client-vulnerability-enables-remote-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/windows-dns-client-vulnerability-enables-remote-code-execution-attacks/]]></link>
			<title>Windows DNS Client Vulnerability Enables Remote Code Execution Attacks</title>
			<pubDate><![CDATA[Thu, 14 May 2026 07:53:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-mongodb-vulnerability-allow-attackers-to-execute-arbitrary-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-mongodb-vulnerability-allow-attackers-to-execute-arbitrary-code/]]></link>
			<title>Critical MongoDB Vulnerability Allow Attackers to Execute Arbitrary Code</title>
			<pubDate><![CDATA[Thu, 14 May 2026 05:54:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/the-gentlemen-raas-leverages-fortinet-and-cisco-edge-devices-for-initial-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/the-gentlemen-raas-leverages-fortinet-and-cisco-edge-devices-for-initial-access/]]></link>
			<title>The Gentlemen RaaS Leverages Fortinet and Cisco Edge Devices for Initial Access</title>
			<pubDate><![CDATA[Thu, 14 May 2026 05:44:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/windows-bitlocker-0-day-vulnerability-enables-access-to-encrypted-drives/]]></guid>
			<link><![CDATA[https://www.cryptika.com/windows-bitlocker-0-day-vulnerability-enables-access-to-encrypted-drives/]]></link>
			<title>Windows BitLocker 0-Day Vulnerability Enables Access to Encrypted Drives</title>
			<pubDate><![CDATA[Thu, 14 May 2026 03:01:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/foxconn-confirms-cyberattack-after-nitrogen-ransomware-gang-claim/]]></guid>
			<link><![CDATA[https://www.cryptika.com/foxconn-confirms-cyberattack-after-nitrogen-ransomware-gang-claim/]]></link>
			<title>Foxconn Confirms Cyberattack After Nitrogen Ransomware Gang Claim</title>
			<pubDate><![CDATA[Wed, 13 May 2026 14:18:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fragnesia-linux-vulnerability-let-attackers-gain-root-privileges-poc-released/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fragnesia-linux-vulnerability-let-attackers-gain-root-privileges-poc-released/]]></link>
			<title>Fragnesia Linux Vulnerability Let Attackers Gain Root Privileges – PoC Released</title>
			<pubDate><![CDATA[Wed, 13 May 2026 13:48:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/clickfix-evolves-with-10-year-old-open-source-python-socks5-proxy/]]></guid>
			<link><![CDATA[https://www.cryptika.com/clickfix-evolves-with-10-year-old-open-source-python-socks5-proxy/]]></link>
			<title>ClickFix Evolves with 10-Year-Old Open-Source Python SOCKS5 Proxy</title>
			<pubDate><![CDATA[Wed, 13 May 2026 11:06:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-sandboxjs-escape-vulnerability-enables-host-takeover/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-sandboxjs-escape-vulnerability-enables-host-takeover/]]></link>
			<title>Critical SandboxJS Escape Vulnerability Enables Host Takeover</title>
			<pubDate><![CDATA[Wed, 13 May 2026 10:30:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/ios-26-5-brings-end-to-end-encrypted-rcs-messaging-between-iphone-and-android/]]></guid>
			<link><![CDATA[https://www.cryptika.com/ios-26-5-brings-end-to-end-encrypted-rcs-messaging-between-iphone-and-android/]]></link>
			<title>iOS 26.5 Brings End-to-end Encrypted RCS Messaging Between iPhone and Android</title>
			<pubDate><![CDATA[Wed, 13 May 2026 09:11:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-18-year-old-nginx-vulnerability-enables-remote-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-18-year-old-nginx-vulnerability-enables-remote-code-execution-attacks/]]></link>
			<title>Critical 18-Year-Old NGINX Vulnerability Enables Remote Code Execution Attacks</title>
			<pubDate><![CDATA[Thu, 14 May 2026 06:27:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-exim-bdat-gnutls-vulnerability-enables-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-exim-bdat-gnutls-vulnerability-enables-code-execution-attacks/]]></link>
			<title>New Exim BDAT GnuTLS Vulnerability Enables Code Execution Attacks</title>
			<pubDate><![CDATA[Wed, 13 May 2026 08:27:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/google-enhances-android-mobile-security-with-new-ai-powered-protections/]]></guid>
			<link><![CDATA[https://www.cryptika.com/google-enhances-android-mobile-security-with-new-ai-powered-protections/]]></link>
			<title>Google Enhances Android Mobile Security with New AI-Powered Protections</title>
			<pubDate><![CDATA[Wed, 13 May 2026 07:59:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-releases-cumulative-update-for-windows-11-version-25h2-and-24h2/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-releases-cumulative-update-for-windows-11-version-25h2-and-24h2/]]></link>
			<title>Microsoft Releases Cumulative Update for Windows 11, Version 25H2 and 24H2</title>
			<pubDate><![CDATA[Wed, 13 May 2026 07:01:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/top-10-best-data-loss-prevention-software-in-2026/]]></guid>
			<link><![CDATA[https://www.cryptika.com/top-10-best-data-loss-prevention-software-in-2026/]]></link>
			<title>Top 10 Best Data Loss Prevention Software in 2026</title>
			<pubDate><![CDATA[Wed, 13 May 2026 05:52:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/blog/]]></guid>
			<link><![CDATA[https://www.cryptika.com/blog/]]></link>
			<title>Cybersecurity Blog</title>
			<pubDate><![CDATA[Sun, 05 Jun 2022 13:24:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-teams-vulnerability-allows-hackers-to-perform-spoofing-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-teams-vulnerability-allows-hackers-to-perform-spoofing-attacks/]]></link>
			<title>Microsoft Teams Vulnerability Allows Hackers to Perform Spoofing Attacks</title>
			<pubDate><![CDATA[Wed, 13 May 2026 02:51:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/patch-tuesday-may-2026-edition/]]></guid>
			<link><![CDATA[https://www.cryptika.com/patch-tuesday-may-2026-edition/]]></link>
			<title>Patch Tuesday, May 2026 Edition</title>
			<pubDate><![CDATA[Tue, 12 May 2026 21:46:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/microsoft-patch-tuesday-may-2026-120-vulnerabilities-fixed-including-29-critical-rce-flaws/]]></guid>
			<link><![CDATA[https://www.cryptika.com/microsoft-patch-tuesday-may-2026-120-vulnerabilities-fixed-including-29-critical-rce-flaws/]]></link>
			<title>Microsoft Patch Tuesday May 2026 – 120 Vulnerabilities Fixed, Including 29 Critical RCE Flaws</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:40:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/fortinet-patches-five-vulnerabilities-across-fortiap-fortios-and-enterprise-products/]]></guid>
			<link><![CDATA[https://www.cryptika.com/fortinet-patches-five-vulnerabilities-across-fortiap-fortios-and-enterprise-products/]]></link>
			<title>Fortinet Patches Five Vulnerabilities Across FortiAP, FortiOS, and Enterprise Products</title>
			<pubDate><![CDATA[Tue, 12 May 2026 17:58:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-fortinet-fortisandbox-vulnerability-enables-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-fortinet-fortisandbox-vulnerability-enables-code-execution-attacks/]]></link>
			<title>Critical Fortinet FortiSandbox Vulnerability Enables Code Execution Attacks</title>
			<pubDate><![CDATA[Tue, 12 May 2026 17:45:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/threat-actors-leverage-vercels-ai-tools-to-mass‑produce-realistic-phishing-sites/]]></guid>
			<link><![CDATA[https://www.cryptika.com/threat-actors-leverage-vercels-ai-tools-to-mass‑produce-realistic-phishing-sites/]]></link>
			<title>Threat Actors Leverage Vercel’s AI Tools to Mass‑Produce Realistic Phishing Sites</title>
			<pubDate><![CDATA[Tue, 12 May 2026 15:46:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/zoom-rooms-and-workplace-vulnerabilities-allow-attackers-to-escalate-privileges/]]></guid>
			<link><![CDATA[https://www.cryptika.com/zoom-rooms-and-workplace-vulnerabilities-allow-attackers-to-escalate-privileges/]]></link>
			<title>Zoom Rooms and Workplace Vulnerabilities Allow Attackers to Escalate Privileges</title>
			<pubDate><![CDATA[Tue, 12 May 2026 15:43:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/north-korean-hackers-weaponize-git-hooks-to-deploy-cross-platform-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/north-korean-hackers-weaponize-git-hooks-to-deploy-cross-platform-malware/]]></link>
			<title>North Korean Hackers Weaponize Git Hooks to Deploy Cross-Platform Malware</title>
			<pubDate><![CDATA[Tue, 12 May 2026 13:24:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/malicious-chrome-mv3-extension-impersonates-tronlink-to-steal-crypto-wallet-credentials/]]></guid>
			<link><![CDATA[https://www.cryptika.com/malicious-chrome-mv3-extension-impersonates-tronlink-to-steal-crypto-wallet-credentials/]]></link>
			<title>Malicious Chrome MV3 Extension Impersonates TronLink to Steal Crypto Wallet Credentials</title>
			<pubDate><![CDATA[Tue, 12 May 2026 11:42:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/mistralai-pypi-package-compromised-to-inject-malicious-code-microsoft-warns/]]></guid>
			<link><![CDATA[https://www.cryptika.com/mistralai-pypi-package-compromised-to-inject-malicious-code-microsoft-warns/]]></link>
			<title>MistralAI PyPI Package Compromised to Inject Malicious Code – Microsoft Warns</title>
			<pubDate><![CDATA[Tue, 12 May 2026 11:04:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/claudes-chrome-extension-vulnerability-allows-malicious-extensions-to-steal-gmail-and-drive-data/]]></guid>
			<link><![CDATA[https://www.cryptika.com/claudes-chrome-extension-vulnerability-allows-malicious-extensions-to-steal-gmail-and-drive-data/]]></link>
			<title>Claude’s Chrome Extension Vulnerability Allows Malicious Extensions to Steal Gmail and Drive Data</title>
			<pubDate><![CDATA[Tue, 12 May 2026 10:40:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-php-soap-extension-vulnerabilities-enables-remote-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-php-soap-extension-vulnerabilities-enables-remote-code-execution-attacks/]]></link>
			<title>Critical PHP SOAP Extension Vulnerabilities Enables Remote Code Execution Attacks</title>
			<pubDate><![CDATA[Tue, 12 May 2026 08:34:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/magecart-hackers-abuse-google-tag-manager-to-inject-credit-card-skimmers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/magecart-hackers-abuse-google-tag-manager-to-inject-credit-card-skimmers/]]></link>
			<title>Magecart Hackers Abuse Google Tag Manager to Inject Credit Card Skimmers</title>
			<pubDate><![CDATA[Tue, 12 May 2026 08:30:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/teampcp-compromised-checkmarx-jenkins-ast-plugin-following-kics-supply-chain-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/teampcp-compromised-checkmarx-jenkins-ast-plugin-following-kics-supply-chain-attack/]]></link>
			<title>TeamPCP Compromised Checkmarx Jenkins AST Plugin Following KICS Supply Chain Attack</title>
			<pubDate><![CDATA[Tue, 12 May 2026 07:49:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/poc-exploit-released-for-android-zero-click-vulnerability-that-enables-remote-shell-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/poc-exploit-released-for-android-zero-click-vulnerability-that-enables-remote-shell-access/]]></link>
			<title>PoC Exploit Released for Android Zero-Click Vulnerability that Enables Remote Shell Access</title>
			<pubDate><![CDATA[Tue, 12 May 2026 07:29:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-bitunlocker-downgrade-attack-on-windows-11-allows-access-to-encrypted-disks-in-5-minutes/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-bitunlocker-downgrade-attack-on-windows-11-allows-access-to-encrypted-disks-in-5-minutes/]]></link>
			<title>New BitUnlocker Downgrade Attack on Windows 11 Allows Access to Encrypted Disks in 5 Minutes</title>
			<pubDate><![CDATA[Tue, 12 May 2026 04:12:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-abuse-cve-2026-41940-to-take-over-cpanel-and-whm-servers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-abuse-cve-2026-41940-to-take-over-cpanel-and-whm-servers/]]></link>
			<title>Hackers Abuse CVE-2026-41940 to Take Over cPanel and WHM Servers</title>
			<pubDate><![CDATA[Tue, 12 May 2026 03:37:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/84-tanstack-npm-packages-hacked-in-ongoing-supply-chain-attack-targeting-ci-credentials/]]></guid>
			<link><![CDATA[https://www.cryptika.com/84-tanstack-npm-packages-hacked-in-ongoing-supply-chain-attack-targeting-ci-credentials/]]></link>
			<title>84 TanStack npm Packages Hacked in Ongoing Supply-Chain Attack Targeting CI Credentials</title>
			<pubDate><![CDATA[Tue, 12 May 2026 02:44:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/]]></guid>
			<link><![CDATA[https://www.cryptika.com/]]></link>
			<title>Cryptika Cyber Security</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 15:16:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/popular-go-library-fsnotify-raises-supply-chain-alarms-after-maintainer-access-changes/]]></guid>
			<link><![CDATA[https://www.cryptika.com/popular-go-library-fsnotify-raises-supply-chain-alarms-after-maintainer-access-changes/]]></link>
			<title>Popular Go Library fsnotify Raises Supply Chain Alarms After Maintainer Access Changes</title>
			<pubDate><![CDATA[Mon, 11 May 2026 16:14:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/google-warns-of-hackers-using-ai-to-create-working-zero-day-exploit/]]></guid>
			<link><![CDATA[https://www.cryptika.com/google-warns-of-hackers-using-ai-to-create-working-zero-day-exploit/]]></link>
			<title>Google Warns of Hackers Using AI to Create Working Zero-Day Exploit</title>
			<pubDate><![CDATA[Mon, 11 May 2026 16:04:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-plugx-like-dll-sideloading-chain-in-fake-claude-malware-campaign/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-plugx-like-dll-sideloading-chain-in-fake-claude-malware-campaign/]]></link>
			<title>Hackers Use PlugX-Like DLL Sideloading Chain in Fake Claude Malware Campaign</title>
			<pubDate><![CDATA[Mon, 11 May 2026 15:55:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-fake-deepseek-tui-github-repositories-to-deliver-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-fake-deepseek-tui-github-repositories-to-deliver-malware/]]></link>
			<title>Hackers Use Fake DeepSeek TUI GitHub Repositories to Deliver Malware</title>
			<pubDate><![CDATA[Mon, 11 May 2026 15:11:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/shinyhunters-breaches-instructure-canvas-lms-through-free-for-teacher-account-program/]]></guid>
			<link><![CDATA[https://www.cryptika.com/shinyhunters-breaches-instructure-canvas-lms-through-free-for-teacher-account-program/]]></link>
			<title>ShinyHunters Breaches Instructure Canvas LMS Through Free-For-Teacher Account Program</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:21:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/crimenetwork-takedown-exposes-22000-users-and-over-100-illegal-sellers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/crimenetwork-takedown-exposes-22000-users-and-over-100-illegal-sellers/]]></link>
			<title>Crimenetwork Takedown Exposes 22,000 Users and Over 100 Illegal Sellers</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:17:00 +0000]]></pubDate>
		</item>
				</channel>
</rss>
