<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 9, 2026 at 22:41 by All in One SEO v4.8.5 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cryptika.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cryptika Cybersecurity</title>
		<link><![CDATA[https://www.cryptika.com]]></link>
		<description><![CDATA[Cryptika Cybersecurity]]></description>
		<lastBuildDate><![CDATA[Sat, 09 May 2026 06:00:28 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cryptika.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cryptika.com/tclbanker-malware-targets-users-through-self-propagating-whatsapp-and-outlook-worm-modules/]]></guid>
			<link><![CDATA[https://www.cryptika.com/tclbanker-malware-targets-users-through-self-propagating-whatsapp-and-outlook-worm-modules/]]></link>
			<title>TCLBANKER Malware Targets Users Through Self-Propagating WhatsApp and Outlook Worm Modules</title>
			<pubDate><![CDATA[Sat, 09 May 2026 06:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/nvidia-data-breach-reportedly-exposes-personal-information-of-geforce-users/]]></guid>
			<link><![CDATA[https://www.cryptika.com/nvidia-data-breach-reportedly-exposes-personal-information-of-geforce-users/]]></link>
			<title>NVIDIA Data Breach Reportedly Exposes Personal Information of GeForce Users</title>
			<pubDate><![CDATA[Sat, 09 May 2026 03:33:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/lets-encrypt-halts-certificate-issuance-after-cross-signed-root-certificate-incident/]]></guid>
			<link><![CDATA[https://www.cryptika.com/lets-encrypt-halts-certificate-issuance-after-cross-signed-root-certificate-incident/]]></link>
			<title>Let’s Encrypt Halts Certificate Issuance After Cross-Signed Root Certificate Incident</title>
			<pubDate><![CDATA[Sat, 09 May 2026 03:00:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-microsoft-365-copilot-vulnerabilities-expose-sensitive-information/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-microsoft-365-copilot-vulnerabilities-expose-sensitive-information/]]></link>
			<title>Critical Microsoft 365 Copilot Vulnerabilities Expose sensitive Information</title>
			<pubDate><![CDATA[Sat, 09 May 2026 02:34:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-pamdoora-backdoor-attacking-linux-systems-to-steal-ssh-credentials/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-pamdoora-backdoor-attacking-linux-systems-to-steal-ssh-credentials/]]></link>
			<title>New PamDOORa Backdoor Attacking Linux Systems to Steal SSH Credentials</title>
			<pubDate><![CDATA[Fri, 08 May 2026 19:12:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-deploy-modular-rat-with-credential-theft-and-screenshot-capture-capabilities/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-deploy-modular-rat-with-credential-theft-and-screenshot-capture-capabilities/]]></link>
			<title>Hackers Deploy Modular RAT With Credential Theft and Screenshot Capture Capabilities</title>
			<pubDate><![CDATA[Fri, 08 May 2026 19:01:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/skoda-security-incident-exposes-customers-data-from-online-shop/]]></guid>
			<link><![CDATA[https://www.cryptika.com/skoda-security-incident-exposes-customers-data-from-online-shop/]]></link>
			<title>Škoda Security Incident Exposes Customers Data From Online Shop</title>
			<pubDate><![CDATA[Fri, 08 May 2026 17:53:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-use-fake-openclaw-installer-to-steal-crypto-wallet-and-password-manager-credentials/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-use-fake-openclaw-installer-to-steal-crypto-wallet-and-password-manager-credentials/]]></link>
			<title>Hackers Use Fake OpenClaw Installer to Steal Crypto Wallet and Password Manager Credentials</title>
			<pubDate><![CDATA[Fri, 08 May 2026 17:15:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-zichatbot-malware-uses-zulip-rest-apis-as-command-and-control-server/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-zichatbot-malware-uses-zulip-rest-apis-as-command-and-control-server/]]></link>
			<title>New ZiChatBot Malware Uses Zulip REST APIs as Command and Control Server</title>
			<pubDate><![CDATA[Fri, 08 May 2026 14:06:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/trellix-breach-ransomhouse-claims-access-to-parts-of-source-code/]]></guid>
			<link><![CDATA[https://www.cryptika.com/trellix-breach-ransomhouse-claims-access-to-parts-of-source-code/]]></link>
			<title>Trellix Breach – RansomHouse Claims Access to Parts of Source Code</title>
			<pubDate><![CDATA[Fri, 08 May 2026 11:18:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/mozilla-patches-423-firefox-0-day-vulnerabilities-with-claude-mythos-and-other-ai-models/]]></guid>
			<link><![CDATA[https://www.cryptika.com/mozilla-patches-423-firefox-0-day-vulnerabilities-with-claude-mythos-and-other-ai-models/]]></link>
			<title>Mozilla Patches 423 Firefox 0-Day Vulnerabilities with Claude Mythos and Other AI Models</title>
			<pubDate><![CDATA[Fri, 08 May 2026 08:08:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-spring-vulnerabilities-expose-arbitrary-files-and-gcp-secrets/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-spring-vulnerabilities-expose-arbitrary-files-and-gcp-secrets/]]></link>
			<title>Critical Spring Vulnerabilities Expose Arbitrary Files and GCP Secrets</title>
			<pubDate><![CDATA[Fri, 08 May 2026 07:35:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/dirty-frag-linux-vulnerability-let-attackers-gain-root-privileges-poc-released/]]></guid>
			<link><![CDATA[https://www.cryptika.com/dirty-frag-linux-vulnerability-let-attackers-gain-root-privileges-poc-released/]]></link>
			<title>Dirty Frag Linux Vulnerability Let Attackers Gain Root Privileges – PoC Released</title>
			<pubDate><![CDATA[Fri, 08 May 2026 04:06:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/dirty-frag-linux-vulnerability-let-attackers-gain-root-privileges-poc-released-2/]]></guid>
			<link><![CDATA[https://www.cryptika.com/dirty-frag-linux-vulnerability-let-attackers-gain-root-privileges-poc-released-2/]]></link>
			<title>Dirty Frag Linux Vulnerability Let Attackers Gain Root Privileges – PoC Released</title>
			<pubDate><![CDATA[Fri, 08 May 2026 04:06:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-ivanti-epmm-0-day-vulnerability-actively-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-ivanti-epmm-0-day-vulnerability-actively-exploited-in-attacks/]]></link>
			<title>New Ivanti EPMM 0-Day Vulnerability Actively Exploited in Attacks</title>
			<pubDate><![CDATA[Thu, 07 May 2026 16:29:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/darkhub-hacking-for-hire-portal-advertises-crypto-fraud-message-interception-and-monitoring/]]></guid>
			<link><![CDATA[https://www.cryptika.com/darkhub-hacking-for-hire-portal-advertises-crypto-fraud-message-interception-and-monitoring/]]></link>
			<title>Darkhub Hacking-for-Hire Portal Advertises Crypto Fraud, Message Interception, and Monitoring</title>
			<pubDate><![CDATA[Wed, 06 May 2026 23:54:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/]]></guid>
			<link><![CDATA[https://www.cryptika.com/]]></link>
			<title>Cryptika Cyber Security</title>
			<pubDate><![CDATA[Mon, 21 Jul 2025 15:16:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cloudz-rat-abuses-microsoft-phone-link-to-steal-sms-otps-and-mobile-notifications/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cloudz-rat-abuses-microsoft-phone-link-to-steal-sms-otps-and-mobile-notifications/]]></link>
			<title>CloudZ RAT Abuses Microsoft Phone Link to Steal SMS OTPs and Mobile Notifications</title>
			<pubDate><![CDATA[Wed, 06 May 2026 18:22:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/qlnx-targets-developers-with-credential-theft-designed-for-supply-chain-compromise/]]></guid>
			<link><![CDATA[https://www.cryptika.com/qlnx-targets-developers-with-credential-theft-designed-for-supply-chain-compromise/]]></link>
			<title>QLNX Targets Developers With Credential Theft Designed for Supply Chain Compromise</title>
			<pubDate><![CDATA[Wed, 06 May 2026 17:55:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisa-warns-of-palo-alto-pan-os-vulnerability-exploited-to-gain-root-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisa-warns-of-palo-alto-pan-os-vulnerability-exploited-to-gain-root-access/]]></link>
			<title>CISA Warns of Palo Alto PAN-OS Vulnerability Exploited to Gain Root Access</title>
			<pubDate><![CDATA[Thu, 07 May 2026 15:59:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-using-fake-claude-ai-installer-pages-to-trick-users-into-running-malware-on-their-systems/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-using-fake-claude-ai-installer-pages-to-trick-users-into-running-malware-on-their-systems/]]></link>
			<title>Hackers Using Fake Claude AI Installer Pages to Trick Users Into Running Malware on Their Systems</title>
			<pubDate><![CDATA[Thu, 07 May 2026 13:00:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/uat-8302-uses-custom-malware-and-open-source-tools-to-steal-data-from-government-agencies/]]></guid>
			<link><![CDATA[https://www.cryptika.com/uat-8302-uses-custom-malware-and-open-source-tools-to-steal-data-from-government-agencies/]]></link>
			<title>UAT-8302 Uses Custom Malware and Open-Source Tools to Steal Data From Government Agencies</title>
			<pubDate><![CDATA[Thu, 07 May 2026 12:46:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-vm2-node-js-library-vulnerabilities-enables-arbitrary-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-vm2-node-js-library-vulnerabilities-enables-arbitrary-code-execution-attacks/]]></link>
			<title>Critical vm2 Node.js Library Vulnerabilities Enables Arbitrary Code Execution Attacks</title>
			<pubDate><![CDATA[Thu, 07 May 2026 08:49:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/hackers-used-claude-ai-to-attack-on-water-and-drainage-utility-systems/]]></guid>
			<link><![CDATA[https://www.cryptika.com/hackers-used-claude-ai-to-attack-on-water-and-drainage-utility-systems/]]></link>
			<title>Hackers Used Claude AI to Attack on Water and Drainage Utility Systems</title>
			<pubDate><![CDATA[Thu, 07 May 2026 08:29:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-phishing-attack-weaponizing-event-invitations-to-steal-login-credentials/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-phishing-attack-weaponizing-event-invitations-to-steal-login-credentials/]]></link>
			<title>New Phishing Attack Weaponizing Event Invitations to Steal Login Credentials</title>
			<pubDate><![CDATA[Thu, 07 May 2026 00:58:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-salat-malware-uses-quic-and-websocket-channels-for-stealthy-remote-control/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-salat-malware-uses-quic-and-websocket-channels-for-stealthy-remote-control/]]></link>
			<title>New Salat Malware Uses QUIC and WebSocket Channels for Stealthy Remote Control</title>
			<pubDate><![CDATA[Thu, 07 May 2026 00:35:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/member-of-prolific-russian-ransomware-group-sentenced-to-102-months-in-prison/]]></guid>
			<link><![CDATA[https://www.cryptika.com/member-of-prolific-russian-ransomware-group-sentenced-to-102-months-in-prison/]]></link>
			<title>Member of Prolific Russian Ransomware Group Sentenced to 102 Months in Prison</title>
			<pubDate><![CDATA[Wed, 06 May 2026 17:19:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/multiple-critical-vulnerabilities-patched-in-next-js-and-react-server-components/]]></guid>
			<link><![CDATA[https://www.cryptika.com/multiple-critical-vulnerabilities-patched-in-next-js-and-react-server-components/]]></link>
			<title>Multiple Critical Vulnerabilities Patched in Next.js and React Server Components</title>
			<pubDate><![CDATA[Fri, 08 May 2026 03:01:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/canvas-breach-disrupts-schools-colleges-nationwide/]]></guid>
			<link><![CDATA[https://www.cryptika.com/canvas-breach-disrupts-schools-colleges-nationwide/]]></link>
			<title>Canvas Breach Disrupts Schools &amp; Colleges Nationwide</title>
			<pubDate><![CDATA[Fri, 08 May 2026 02:58:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-femitbot-network-uses-telegram-mini-apps-to-push-crypto-fraud-and-android-malware/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-femitbot-network-uses-telegram-mini-apps-to-push-crypto-fraud-and-android-malware/]]></link>
			<title>New FEMITBOT Network Uses Telegram Mini Apps to Push Crypto Fraud and Android Malware</title>
			<pubDate><![CDATA[Thu, 07 May 2026 00:11:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/argo-cds-serversidediff-vulnerability-enables-kubernetes-secret-extraction/]]></guid>
			<link><![CDATA[https://www.cryptika.com/argo-cds-serversidediff-vulnerability-enables-kubernetes-secret-extraction/]]></link>
			<title>Argo CD’s ServerSideDiff Vulnerability Enables Kubernetes Secret Extraction</title>
			<pubDate><![CDATA[Wed, 06 May 2026 17:17:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-cisco-network-vulnerability-let-remote-attacker-cause-dos-attack/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-cisco-network-vulnerability-let-remote-attacker-cause-dos-attack/]]></link>
			<title>New Cisco Network Vulnerability Let Remote Attacker Cause DoS Attack</title>
			<pubDate><![CDATA[Thu, 07 May 2026 15:44:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/salesforce-marketing-cloud-vulnerability-opened-door-to-email-data-exposure/]]></guid>
			<link><![CDATA[https://www.cryptika.com/salesforce-marketing-cloud-vulnerability-opened-door-to-email-data-exposure/]]></link>
			<title>Salesforce Marketing Cloud Vulnerability Opened Door to Email Data Exposure</title>
			<pubDate><![CDATA[Wed, 06 May 2026 14:57:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/malicious-openclaw-deepseek-skill-exploits-agentic-ai-workflows-to-deliver-rat-and-stealer/]]></guid>
			<link><![CDATA[https://www.cryptika.com/malicious-openclaw-deepseek-skill-exploits-agentic-ai-workflows-to-deliver-rat-and-stealer/]]></link>
			<title>Malicious OpenClaw DeepSeek Skill Exploits Agentic AI Workflows to Deliver RAT and Stealer</title>
			<pubDate><![CDATA[Wed, 06 May 2026 14:04:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/iranian-nexus-operation-targets-oman-ministries-with-webshells-sql-escalation-and-data-theft/]]></guid>
			<link><![CDATA[https://www.cryptika.com/iranian-nexus-operation-targets-oman-ministries-with-webshells-sql-escalation-and-data-theft/]]></link>
			<title>Iranian-Nexus Operation Targets Oman Ministries With Webshells, SQL Escalation, and Data Theft</title>
			<pubDate><![CDATA[Wed, 06 May 2026 13:40:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/zero-auth-flaw-exposes-dod-contractor-to-cross-tenant-data-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/zero-auth-flaw-exposes-dod-contractor-to-cross-tenant-data-access/]]></link>
			<title>Zero-Auth Flaw Exposes DoD Contractor to Cross-Tenant Data Access</title>
			<pubDate><![CDATA[Wed, 06 May 2026 11:49:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/vimeo-data-breach-exposes-119000-users-unique-email-addresses/]]></guid>
			<link><![CDATA[https://www.cryptika.com/vimeo-data-breach-exposes-119000-users-unique-email-addresses/]]></link>
			<title>Vimeo Data Breach Exposes 119,000 Users Unique Email Addresses</title>
			<pubDate><![CDATA[Wed, 06 May 2026 10:13:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/scammers-use-short-lived-voip-numbers-and-reuse-windows-to-defeat-reputation-based-blocking/]]></guid>
			<link><![CDATA[https://www.cryptika.com/scammers-use-short-lived-voip-numbers-and-reuse-windows-to-defeat-reputation-based-blocking/]]></link>
			<title>Scammers Use Short-Lived VoIP Numbers and Reuse Windows to Defeat Reputation-Based Blocking</title>
			<pubDate><![CDATA[Thu, 07 May 2026 12:53:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/azure-ad-conditional-access-bypassed-via-phantom-device-registration-and-prt-abuse/]]></guid>
			<link><![CDATA[https://www.cryptika.com/azure-ad-conditional-access-bypassed-via-phantom-device-registration-and-prt-abuse/]]></link>
			<title>Azure AD Conditional Access Bypassed Via Phantom Device Registration and PRT Abuse</title>
			<pubDate><![CDATA[Wed, 06 May 2026 08:31:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-palo-alto-firewalls-vulnerability-exploited-in-the-wild-to-gain-root-access/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-palo-alto-firewalls-vulnerability-exploited-in-the-wild-to-gain-root-access/]]></link>
			<title>Critical Palo Alto Firewalls Vulnerability Exploited in the Wild to Gain Root Access</title>
			<pubDate><![CDATA[Wed, 06 May 2026 02:55:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/low-noise-high-confidence-optimizing-soc-costs-with-better-threat-intelligence/]]></guid>
			<link><![CDATA[https://www.cryptika.com/low-noise-high-confidence-optimizing-soc-costs-with-better-threat-intelligence/]]></link>
			<title>Low Noise, High Confidence: Optimizing SOC Costs with Better Threat Intelligence </title>
			<pubDate><![CDATA[Tue, 05 May 2026 17:01:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/gnutls-3-8-13-released-with-fix-for-12-vulnerabilities-affecting-network-communications/]]></guid>
			<link><![CDATA[https://www.cryptika.com/gnutls-3-8-13-released-with-fix-for-12-vulnerabilities-affecting-network-communications/]]></link>
			<title>GnuTLS 3.8.13 Released with Fix for 12 Vulnerabilities Affecting Network Communications</title>
			<pubDate><![CDATA[Tue, 05 May 2026 16:36:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cisco-to-acquire-astrix-security-to-strengthen-ai-agent-and-non-human-identity-security/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cisco-to-acquire-astrix-security-to-strengthen-ai-agent-and-non-human-identity-security/]]></link>
			<title>Cisco to Acquire Astrix Security to Strengthen AI Agent and Non-Human Identity Security</title>
			<pubDate><![CDATA[Tue, 05 May 2026 16:30:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/watchguard-agent-vulnerabilities-let-attackers-grant-full-system-privileges-on-windows/]]></guid>
			<link><![CDATA[https://www.cryptika.com/watchguard-agent-vulnerabilities-let-attackers-grant-full-system-privileges-on-windows/]]></link>
			<title>WatchGuard Agent Vulnerabilities Let Attackers Grant Full SYSTEM Privileges on Windows</title>
			<pubDate><![CDATA[Thu, 07 May 2026 11:49:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/luxsci-launches-enterprise-grade-hipaa-compliant-email-security-for-mid-sized-healthcare-organizations/]]></guid>
			<link><![CDATA[https://www.cryptika.com/luxsci-launches-enterprise-grade-hipaa-compliant-email-security-for-mid-sized-healthcare-organizations/]]></link>
			<title>LuxSci Launches Enterprise-Grade HIPAA-Compliant Email Security for Mid-Sized Healthcare Organizations</title>
			<pubDate><![CDATA[Tue, 05 May 2026 14:44:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/cerberus-stalkerware-on-google-play-leverages-accessibility-abuse-and-firebase-for-remote-control/]]></guid>
			<link><![CDATA[https://www.cryptika.com/cerberus-stalkerware-on-google-play-leverages-accessibility-abuse-and-firebase-for-remote-control/]]></link>
			<title>Cerberus Stalkerware on Google Play Leverages Accessibility Abuse and Firebase for Remote Control</title>
			<pubDate><![CDATA[Tue, 05 May 2026 14:18:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/critical-redis-vulnerabilities-enables-remote-code-execution-attacks/]]></guid>
			<link><![CDATA[https://www.cryptika.com/critical-redis-vulnerabilities-enables-remote-code-execution-attacks/]]></link>
			<title>Critical Redis Vulnerabilities Enables Remote Code Execution Attacks</title>
			<pubDate><![CDATA[Thu, 07 May 2026 11:45:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/attackers-abuse-amazon-ses-to-send-authenticated-phishing-emails-that-bypass-security/]]></guid>
			<link><![CDATA[https://www.cryptika.com/attackers-abuse-amazon-ses-to-send-authenticated-phishing-emails-that-bypass-security/]]></link>
			<title>Attackers Abuse Amazon SES to Send Authenticated Phishing Emails That Bypass Security</title>
			<pubDate><![CDATA[Tue, 05 May 2026 11:12:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/new-attribution-framework-connects-apt-campaigns-through-strategic-operational-and-technical-layers/]]></guid>
			<link><![CDATA[https://www.cryptika.com/new-attribution-framework-connects-apt-campaigns-through-strategic-operational-and-technical-layers/]]></link>
			<title>New Attribution Framework Connects APT Campaigns Through Strategic, Operational, and Technical Layers</title>
			<pubDate><![CDATA[Tue, 05 May 2026 10:08:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cryptika.com/blog/]]></guid>
			<link><![CDATA[https://www.cryptika.com/blog/]]></link>
			<title>Cybersecurity Blog</title>
			<pubDate><![CDATA[Sun, 05 Jun 2022 13:24:57 +0000]]></pubDate>
		</item>
				</channel>
</rss>
