<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 8, 2026 at 6:27 am by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Wed, 08 Apr 2026 05:56:43 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/researchers-spot-zero-day-attack-targeting-adobe-reader/]]></guid>
			<link><![CDATA[https://fxtechnology.org/researchers-spot-zero-day-attack-targeting-adobe-reader/]]></link>
			<title>Researchers Spot Zero-Day Attack Targeting Adobe Reader</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 05:56:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cyberheistnews-vol-16-14-heads-up-clever-hackers-use-custom-fonts-to-bypass-ai-defenses/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cyberheistnews-vol-16-14-heads-up-clever-hackers-use-custom-fonts-to-bypass-ai-defenses/]]></link>
			<title>CyberheistNews Vol 16 #14 [Heads Up] Clever Hackers Use Custom Fonts to Bypass AI Defenses</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 04:54:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/iran-linked-hackers-disrupt-u-s-critical-infrastructure-by-targeting-internet-exposed-plcs/]]></guid>
			<link><![CDATA[https://fxtechnology.org/iran-linked-hackers-disrupt-u-s-critical-infrastructure-by-targeting-internet-exposed-plcs/]]></link>
			<title>Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 04:49:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/as-breakout-time-accelerates-prevention-first-cybersecurity-takes-center-stage/]]></guid>
			<link><![CDATA[https://fxtechnology.org/as-breakout-time-accelerates-prevention-first-cybersecurity-takes-center-stage/]]></link>
			<title>As breakout time accelerates, prevention-first cybersecurity takes center stage</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 02:45:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/intel-bets-on-terafab-to-help-it-reassert-itself-in-the-ai-chip-race/]]></guid>
			<link><![CDATA[https://fxtechnology.org/intel-bets-on-terafab-to-help-it-reassert-itself-in-the-ai-chip-race/]]></link>
			<title>Intel bets on Terafab to help it reassert itself in the AI chip race</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 02:25:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-often-doesnt-deliver-roi-for-it-departments-either/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-often-doesnt-deliver-roi-for-it-departments-either/]]></link>
			<title>AI often doesn’t deliver ROI for IT departments either</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 01:57:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/linkedin-faces-class-action-over-alleged-covert-scanning-of-users-browsers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/linkedin-faces-class-action-over-alleged-covert-scanning-of-users-browsers/]]></link>
			<title>LinkedIn faces class action over alleged covert scanning of users’ browsers</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 01:50:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-v2-ualink-specification-aims-to-catch-up-to-nvlink/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-v2-ualink-specification-aims-to-catch-up-to-nvlink/]]></link>
			<title>New v2 UALink specification aims to catch up to NVLink</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 01:23:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nomshub-vulnerability-chain-exposes-hidden-risks-in-ai-coding-tools/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nomshub-vulnerability-chain-exposes-hidden-risks-in-ai-coding-tools/]]></link>
			<title>NomShub Vulnerability Chain Exposes Hidden Risks in AI Coding Tools</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 00:49:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisas-vulnerability-scans-field-support-on-chopping-block-in-trump-budget/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisas-vulnerability-scans-field-support-on-chopping-block-in-trump-budget/]]></link>
			<title>CISA’s vulnerability scans, field support on chopping block in Trump budget</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 23:48:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/forticlientems-flaws-under-active-exploitation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/forticlientems-flaws-under-active-exploitation/]]></link>
			<title>FortiClientEMS Flaws Under Active Exploitation</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 22:47:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-joins-anthropics-multivendor-effort-to-secure-ai-software/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-joins-anthropics-multivendor-effort-to-secure-ai-software/]]></link>
			<title>Cisco joins Anthropic’s multivendor effort to secure AI software</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 22:20:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/minimus-taps-yael-nardi-to-lead-strategic-operations-as-chief-business-officer-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/minimus-taps-yael-nardi-to-lead-strategic-operations-as-chief-business-officer-computerworld/]]></link>
			<title>Minimus Taps Yael Nardi to Lead Strategic Operations as Chief Business Officer – Computerworld</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 21:50:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-powered-human-risk-management-shifts-the-focus-to-adaptive-behavior-based-training/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-powered-human-risk-management-shifts-the-focus-to-adaptive-behavior-based-training/]]></link>
			<title>AI-Powered Human Risk Management Shifts the Focus to Adaptive, Behavior-Based Training</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 21:46:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/russia-hacked-routers-to-steal-microsoft-office-tokens-krebs-on-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/russia-hacked-routers-to-steal-microsoft-office-tokens-krebs-on-security/]]></link>
			<title>Russia Hacked Routers to Steal Microsoft Office Tokens – Krebs on Security</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 19:44:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/whatsapp-private-inference-pre-launch-audit-uncovered-critical-flaws/]]></guid>
			<link><![CDATA[https://fxtechnology.org/whatsapp-private-inference-pre-launch-audit-uncovered-critical-flaws/]]></link>
			<title>WhatsApp ‘Private Inference’ pre-launch audit uncovered critical flaws</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 18:43:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cloud-first-vs-sovereign-first-navigating-the-trade-off/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cloud-first-vs-sovereign-first-navigating-the-trade-off/]]></link>
			<title>Cloud-first vs. sovereign-first: Navigating the trade-off</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 18:01:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/minimus-appoints-tech-dealmaker-yael-nardi-as-chief-business-officer-to-drive-hyper-growth/]]></guid>
			<link><![CDATA[https://fxtechnology.org/minimus-appoints-tech-dealmaker-yael-nardi-as-chief-business-officer-to-drive-hyper-growth/]]></link>
			<title>Minimus Appoints Tech Dealmaker Yael Nardi as Chief Business Officer to Drive Hyper-Growth</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 17:42:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/react2shell-vulnerability-helps-hackers-steal-credentials-ai-platform-keys-and-other-sensitive-data/]]></guid>
			<link><![CDATA[https://fxtechnology.org/react2shell-vulnerability-helps-hackers-steal-credentials-ai-platform-keys-and-other-sensitive-data/]]></link>
			<title>React2Shell vulnerability helps hackers steal credentials, AI platform keys and other sensitive data</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 16:41:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/openai-calls-for-a-four-day-workweek-and-a-robot-tax-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/openai-calls-for-a-four-day-workweek-and-a-robot-tax-computerworld/]]></link>
			<title>OpenAI calls for a four-day workweek — and a &#8216;robot tax&#8217; – Computerworld</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 16:14:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/revil-ransomware-gang-leader-identified-by-germany/]]></guid>
			<link><![CDATA[https://fxtechnology.org/revil-ransomware-gang-leader-identified-by-germany/]]></link>
			<title>REvil Ransomware Gang Leader Identified By Germany</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 15:38:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access/]]></guid>
			<link><![CDATA[https://fxtechnology.org/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access/]]></link>
			<title>Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 15:29:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/because-your-soc-team-has-a-life/]]></guid>
			<link><![CDATA[https://fxtechnology.org/because-your-soc-team-has-a-life/]]></link>
			<title>Because Your SOC Team Has a Life</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 14:37:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/]]></guid>
			<link><![CDATA[https://fxtechnology.org/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/]]></link>
			<title>Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 13:29:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nvidias-schedmd-acquisition-puts-open-source-ai-scheduling-under-scrutiny/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nvidias-schedmd-acquisition-puts-open-source-ai-scheduling-under-scrutiny/]]></link>
			<title>Nvidia’s SchedMD acquisition puts open-source AI scheduling under scrutiny</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:56:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nvidias-schedmd-acquisition-puts-open-source-ai-scheduling-under-scrutiny-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nvidias-schedmd-acquisition-puts-open-source-ai-scheduling-under-scrutiny-computerworld/]]></link>
			<title>Nvidia’s SchedMD acquisition puts open-source AI scheduling under scrutiny – Computerworld</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:38:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apples-mac-grabs-11-of-us-enterprise-market-share-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apples-mac-grabs-11-of-us-enterprise-market-share-computerworld/]]></link>
			<title>Apple&#8217;s Mac grabs 11% of US enterprise market share – Computerworld</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:09:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-hidden-cost-of-recurring-credential-incidents/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-hidden-cost-of-recurring-credential-incidents/]]></link>
			<title>The Hidden Cost of Recurring Credential Incidents</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:03:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/8-advanced-ways-vivaldi-boosts-your-productivity-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/8-advanced-ways-vivaldi-boosts-your-productivity-computerworld/]]></link>
			<title>8 advanced ways Vivaldi boosts your productivity – Computerworld</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 10:37:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/eu-csam-law-lapse-puts-child-safety-at-online-risks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/eu-csam-law-lapse-puts-child-safety-at-online-risks/]]></link>
			<title>EU CSAM Law Lapse Puts Child Safety At Online Risks</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 10:31:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-ai-simplifies-wireless-operations-but-also-taxes-legacy-wi-fi-networks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-ai-simplifies-wireless-operations-but-also-taxes-legacy-wi-fi-networks/]]></link>
			<title>Cisco: AI simplifies wireless operations but also taxes legacy Wi-Fi networks</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 10:06:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/]]></link>
			<title>New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware/]]></link>
			<title>China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 06:55:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cve-2026-35616-forticlient-ems-flaw-under-active-exploitation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cve-2026-35616-forticlient-ems-flaw-under-active-exploitation/]]></link>
			<title>CVE-2026-35616: FortiClient EMS Flaw Under Active Exploitation</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 06:27:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed/]]></guid>
			<link><![CDATA[https://fxtechnology.org/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed/]]></link>
			<title>Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 06:18:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/european-commission-cloud-breach-stolen-data-posted-online/]]></guid>
			<link><![CDATA[https://fxtechnology.org/european-commission-cloud-breach-stolen-data-posted-online/]]></link>
			<title>European Commission Cloud Breach: Stolen Data Posted Online</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 05:26:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/1-2-million-crunchyroll-users-confirmed-impacted-by-data-breach/]]></guid>
			<link><![CDATA[https://fxtechnology.org/1-2-million-crunchyroll-users-confirmed-impacted-by-data-breach/]]></link>
			<title>1.2 million Crunchyroll users confirmed impacted by data breach</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 02:23:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/2027-potus-budget-proposal-targets-cisa-with-funding-cuts/]]></guid>
			<link><![CDATA[https://fxtechnology.org/2027-potus-budget-proposal-targets-cisa-with-funding-cuts/]]></link>
			<title>2027 POTUS Budget Proposal Targets CISA With Funding Cuts</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 01:21:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/critical-flaw-in-forticlient-ems-under-exploitation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/critical-flaw-in-forticlient-ems-under-exploitation/]]></link>
			<title>Critical flaw in FortiClient EMS under exploitation</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 00:21:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/massachusetts-emergency-cyberattack-hits-patriot-regional/]]></guid>
			<link><![CDATA[https://fxtechnology.org/massachusetts-emergency-cyberattack-hits-patriot-regional/]]></link>
			<title>Massachusetts Emergency Cyberattack Hits Patriot Regional</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 23:20:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/detection-and-prevention-of-misdirected-emails-what-to-know/]]></guid>
			<link><![CDATA[https://fxtechnology.org/detection-and-prevention-of-misdirected-emails-what-to-know/]]></link>
			<title>Detection and Prevention of Misdirected Emails: What to Know</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 22:18:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations/]]></guid>
			<link><![CDATA[https://fxtechnology.org/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations/]]></link>
			<title>Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 20:11:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/chrome-color-picker-extension-with-400k-users-sneaked-browsing-tracker/]]></guid>
			<link><![CDATA[https://fxtechnology.org/chrome-color-picker-extension-with-400k-users-sneaked-browsing-tracker/]]></link>
			<title>Chrome color picker extension with 400k users sneaked browsing tracker</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 19:15:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hyperscaler-backlogs-show-growing-demand-for-ai-infrastructure/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hyperscaler-backlogs-show-growing-demand-for-ai-infrastructure/]]></link>
			<title>Hyperscaler backlogs show growing demand for AI infrastructure</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:34:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-state-of-ai-risk-management-in-2026-reveals-a-growing-confidence-gap/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-state-of-ai-risk-management-in-2026-reveals-a-growing-confidence-gap/]]></link>
			<title>The State of AI Risk Management in 2026 Reveals a Growing Confidence Gap</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:14:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/]]></guid>
			<link><![CDATA[https://fxtechnology.org/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/]]></link>
			<title>DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:09:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hims-hers-says-limited-data-stolen-in-social-engineering-attack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hims-hers-says-limited-data-stolen-in-social-engineering-attack/]]></link>
			<title>Hims &#038; Hers says limited data stolen in social engineering attack</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 17:13:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/two-new-england-states-say-no-to-new-data-centers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/two-new-england-states-say-no-to-new-data-centers/]]></link>
			<title>Two New England states say no to new data centers</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:32:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/us-tech-sector-lost-jobs-in-march-stalling-growth-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/us-tech-sector-lost-jobs-in-march-stalling-growth-computerworld/]]></link>
			<title>US tech sector lost jobs in March, stalling growth – Computerworld</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:17:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/north-korea-spent-6-months-to-drain-285m-from-drift-protocol-in-12-mins/]]></guid>
			<link><![CDATA[https://fxtechnology.org/north-korea-spent-6-months-to-drain-285m-from-drift-protocol-in-12-mins/]]></link>
			<title>North Korea Spent 6 Months To Drain $285M From Drift Protocol In 12 Mins</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:13:20 +0000]]></pubDate>
		</item>
				</channel>
</rss>
