<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 5, 2026 at 11:32 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Tue, 05 May 2026 23:10:09 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/proton-mail-rolls-out-quantum-resistant-encryption-for-all-users/]]></guid>
			<link><![CDATA[https://fxtechnology.org/proton-mail-rolls-out-quantum-resistant-encryption-for-all-users/]]></link>
			<title>Proton Mail rolls out quantum-resistant encryption for all users</title>
			<pubDate><![CDATA[Tue, 05 May 2026 23:10:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/trellix-investigating-breach-of-source-code-repository/]]></guid>
			<link><![CDATA[https://fxtechnology.org/trellix-investigating-breach-of-source-code-repository/]]></link>
			<title>Trellix investigating breach of source code repository</title>
			<pubDate><![CDATA[Tue, 05 May 2026 22:09:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/extreme-moves-toward-autonomous-networking-with-advanced-ai-agent-management-tools/]]></guid>
			<link><![CDATA[https://fxtechnology.org/extreme-moves-toward-autonomous-networking-with-advanced-ai-agent-management-tools/]]></link>
			<title>Extreme moves toward autonomous networking with advanced AI agent, management tools</title>
			<pubDate><![CDATA[Tue, 05 May 2026 21:26:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/u-s-will-examine-national-security-implications-of-new-ai-models/]]></guid>
			<link><![CDATA[https://fxtechnology.org/u-s-will-examine-national-security-implications-of-new-ai-models/]]></link>
			<title>U.S. Will Examine National Security Implications Of New AI Models</title>
			<pubDate><![CDATA[Tue, 05 May 2026 21:08:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/edge-browser-leaves-passwords-exposed-in-plain-text-says-researcher/]]></guid>
			<link><![CDATA[https://fxtechnology.org/edge-browser-leaves-passwords-exposed-in-plain-text-says-researcher/]]></link>
			<title>Edge browser leaves passwords exposed in plain text, says researcher</title>
			<pubDate><![CDATA[Tue, 05 May 2026 20:10:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/introducing-the-new-ai-native-knowbe4-sat/]]></guid>
			<link><![CDATA[https://fxtechnology.org/introducing-the-new-ai-native-knowbe4-sat/]]></link>
			<title>Introducing the New AI-Native KnowBe4 SAT</title>
			<pubDate><![CDATA[Tue, 05 May 2026 20:06:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ask-jeeves-bites-the-dust-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ask-jeeves-bites-the-dust-computerworld/]]></link>
			<title>Ask Jeeves bites the dust – Computerworld</title>
			<pubDate><![CDATA[Tue, 05 May 2026 18:06:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/platform-engineering-the-rise-of-a-disciplinary-rethink/]]></guid>
			<link><![CDATA[https://fxtechnology.org/platform-engineering-the-rise-of-a-disciplinary-rethink/]]></link>
			<title>Platform Engineering: The Rise of a Disciplinary Rethink</title>
			<pubDate><![CDATA[Tue, 05 May 2026 18:04:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-brings-end-to-end-encryption-to-rcs-messaging-in-ios-26-5/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-brings-end-to-end-encryption-to-rcs-messaging-in-ios-26-5/]]></link>
			<title>Apple brings end-to-end encryption to RCS messaging in iOS 26.5</title>
			<pubDate><![CDATA[Tue, 05 May 2026 17:01:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/critical-apache-http-2-flaw-cve-2026-23918-enables-dos-and-potential-rce/]]></guid>
			<link><![CDATA[https://fxtechnology.org/critical-apache-http-2-flaw-cve-2026-23918-enables-dos-and-potential-rce/]]></link>
			<title>Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE</title>
			<pubDate><![CDATA[Tue, 05 May 2026 16:53:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/daemon-tools-supply-chain-attack-compromises-official-installers-with-malware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/daemon-tools-supply-chain-attack-compromises-official-installers-with-malware/]]></link>
			<title>DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware</title>
			<pubDate><![CDATA[Tue, 05 May 2026 16:36:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-cant-make-chips-fast-enough-but-thats-only-part-of-the-story-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-cant-make-chips-fast-enough-but-thats-only-part-of-the-story-computerworld/]]></link>
			<title>Apple can&#8217;t make chips fast enough, but that&#8217;s only part of the story – Computerworld</title>
			<pubDate><![CDATA[Tue, 05 May 2026 16:01:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/android-zero-click-rce-vulnerability-enables-remote-shell-access/]]></guid>
			<link><![CDATA[https://fxtechnology.org/android-zero-click-rce-vulnerability-enables-remote-shell-access/]]></link>
			<title>Android Zero-Click RCE Vulnerability Enables Remote Shell Access  </title>
			<pubDate><![CDATA[Tue, 05 May 2026 16:00:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisa-urges-critical-infrastructure-firms-to-fortify-now-before-its-too-late/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisa-urges-critical-infrastructure-firms-to-fortify-now-before-its-too-late/]]></link>
			<title>CISA urges critical infrastructure firms to ‘fortify’ now before it’s too late</title>
			<pubDate><![CDATA[Tue, 05 May 2026 14:59:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/china-linked-uat-8302-targets-governments-using-shared-apt-malware-across-regions/]]></guid>
			<link><![CDATA[https://fxtechnology.org/china-linked-uat-8302-targets-governments-using-shared-apt-malware-across-regions/]]></link>
			<title>China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions</title>
			<pubDate><![CDATA[Tue, 05 May 2026 14:34:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ransomware-organization-sentencing-key-operative-jailed/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ransomware-organization-sentencing-key-operative-jailed/]]></link>
			<title>Ransomware Organization Sentencing: Key Operative Jailed</title>
			<pubDate><![CDATA[Tue, 05 May 2026 13:59:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/broadcom-bets-big-on-vmware-cloud-foundation-9-1/]]></guid>
			<link><![CDATA[https://fxtechnology.org/broadcom-bets-big-on-vmware-cloud-foundation-9-1/]]></link>
			<title>Broadcom bets big on VMware Cloud Foundation 9.1</title>
			<pubDate><![CDATA[Tue, 05 May 2026 13:17:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/metinfo-cms-cve-2026-29014-exploited-for-remote-code-execution-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/metinfo-cms-cve-2026-29014-exploited-for-remote-code-execution-attacks/]]></link>
			<title>MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks</title>
			<pubDate><![CDATA[Tue, 05 May 2026 12:48:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-led-job-cuts-dont-always-mean-stronger-roi-gartner-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-led-job-cuts-dont-always-mean-stronger-roi-gartner-computerworld/]]></link>
			<title>AI-led job cuts don’t always mean stronger ROI — Gartner – Computerworld</title>
			<pubDate><![CDATA[Tue, 05 May 2026 12:39:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-back-door-attackers-know-about-and-most-security-teams-still-havent-closed/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-back-door-attackers-know-about-and-most-security-teams-still-havent-closed/]]></link>
			<title>The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed</title>
			<pubDate><![CDATA[Tue, 05 May 2026 12:32:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/stealthy-malware-abuses-microsoft-phone-link-to-siphon-sms-otps-from-enterprise-pcs/]]></guid>
			<link><![CDATA[https://fxtechnology.org/stealthy-malware-abuses-microsoft-phone-link-to-siphon-sms-otps-from-enterprise-pcs/]]></link>
			<title>Stealthy malware abuses Microsoft Phone Link to siphon SMS OTPs from enterprise PCs</title>
			<pubDate><![CDATA[Tue, 05 May 2026 11:38:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/innovator-spotlight-tokencore-cyber-defense-magazine/]]></guid>
			<link><![CDATA[https://fxtechnology.org/innovator-spotlight-tokencore-cyber-defense-magazine/]]></link>
			<title>Innovator Spotlight: TokenCore &#8211; Cyber Defense Magazine</title>
			<pubDate><![CDATA[Tue, 05 May 2026 10:55:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/scarcruft-hacks-gaming-platform-to-deploy-birdcall-malware-on-android-and-windows/]]></guid>
			<link><![CDATA[https://fxtechnology.org/scarcruft-hacks-gaming-platform-to-deploy-birdcall-malware-on-android-and-windows/]]></link>
			<title>ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows</title>
			<pubDate><![CDATA[Tue, 05 May 2026 10:50:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/we-scanned-1-million-exposed-ai-services-heres-how-bad-the-security-actually-is/]]></guid>
			<link><![CDATA[https://fxtechnology.org/we-scanned-1-million-exposed-ai-services-heres-how-bad-the-security-actually-is/]]></link>
			<title>We Scanned 1 Million Exposed AI Services. Here&#8217;s How Bad the Security Actually Is</title>
			<pubDate><![CDATA[Tue, 05 May 2026 10:30:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apt37-hacks-gaming-platform-to-spread-new-birdcall-android-spyware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apt37-hacks-gaming-platform-to-spread-new-birdcall-android-spyware/]]></link>
			<title>APT37 hacks gaming platform to spread new BirdCall Android spyware</title>
			<pubDate><![CDATA[Tue, 05 May 2026 09:54:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-google-push-ai-agent-governance-into-enterprise-it-mainstream-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-google-push-ai-agent-governance-into-enterprise-it-mainstream-computerworld/]]></link>
			<title>Microsoft, Google push AI agent governance into enterprise IT mainstream – Computerworld</title>
			<pubDate><![CDATA[Tue, 05 May 2026 09:36:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/canvas-cybersecurity-incident-exposes-user-data/]]></guid>
			<link><![CDATA[https://fxtechnology.org/canvas-cybersecurity-incident-exposes-user-data/]]></link>
			<title>Canvas Cybersecurity Incident Exposes User Data</title>
			<pubDate><![CDATA[Tue, 05 May 2026 08:53:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/weaver-e-cology-rce-flaw-cve-2026-22679-actively-exploited-via-debug-api/]]></guid>
			<link><![CDATA[https://fxtechnology.org/weaver-e-cology-rce-flaw-cve-2026-22679-actively-exploited-via-debug-api/]]></link>
			<title>Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API</title>
			<pubDate><![CDATA[Tue, 05 May 2026 07:43:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-details-phishing-campaign-targeting-35000-users-across-26-countries/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-details-phishing-campaign-targeting-35000-users-across-26-countries/]]></link>
			<title>Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries</title>
			<pubDate><![CDATA[Tue, 05 May 2026 07:27:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/retro-coding-and-the-roots-of-logic-why-the-byte-brothers-program-a-problem-still-matters/]]></guid>
			<link><![CDATA[https://fxtechnology.org/retro-coding-and-the-roots-of-logic-why-the-byte-brothers-program-a-problem-still-matters/]]></link>
			<title>Retro-Coding and the Roots of Logic: Why The Byte Brothers: Program a Problem Still Matters</title>
			<pubDate><![CDATA[Tue, 05 May 2026 05:50:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/digicert-suffers-breach-stolen-certificates-used-to-sign-malware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/digicert-suffers-breach-stolen-certificates-used-to-sign-malware/]]></link>
			<title>DigiCert suffers breach, stolen certificates used to sign malware</title>
			<pubDate><![CDATA[Tue, 05 May 2026 04:49:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ibm-unveils-its-blueprint-to-help-enterprises-run-ai-at-the-core-of-their-business/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ibm-unveils-its-blueprint-to-help-enterprises-run-ai-at-the-core-of-their-business/]]></link>
			<title>IBM unveils its blueprint to help enterprises run AI at the core of their business</title>
			<pubDate><![CDATA[Tue, 05 May 2026 04:07:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-defender-flags-digicert-certificates-as-malware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-defender-flags-digicert-certificates-as-malware/]]></link>
			<title>Microsoft Defender Flags DigiCert Certificates as Malware </title>
			<pubDate><![CDATA[Tue, 05 May 2026 03:48:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-moveit-vulnerabilities-prompt-urgent-patch-warning/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-moveit-vulnerabilities-prompt-urgent-patch-warning/]]></link>
			<title>New MOVEit vulnerabilities prompt urgent patch warning</title>
			<pubDate><![CDATA[Tue, 05 May 2026 02:46:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ruckus-networks-on-the-move-again-this-time-acquired-by-belden-for-1-85-billion/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ruckus-networks-on-the-move-again-this-time-acquired-by-belden-for-1-85-billion/]]></link>
			<title>Ruckus Networks on the move again, this time acquired by Belden for $1.85 billion</title>
			<pubDate><![CDATA[Tue, 05 May 2026 02:28:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/trellix-confirms-source-code-repository-breach/]]></guid>
			<link><![CDATA[https://fxtechnology.org/trellix-confirms-source-code-repository-breach/]]></link>
			<title>Trellix Confirms Source Code Repository Breach</title>
			<pubDate><![CDATA[Tue, 05 May 2026 01:45:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cybersecurity-risks-in-2026-cyber-defense-magazine/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cybersecurity-risks-in-2026-cyber-defense-magazine/]]></link>
			<title>Cybersecurity Risks in 2026 &#8211; Cyber Defense Magazine</title>
			<pubDate><![CDATA[Mon, 04 May 2026 22:41:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/meta-enhances-security-of-whatsapp-and-messenger-encrypted-backups/]]></guid>
			<link><![CDATA[https://fxtechnology.org/meta-enhances-security-of-whatsapp-and-messenger-encrypted-backups/]]></link>
			<title>Meta enhances security of WhatsApp and Messenger encrypted backups</title>
			<pubDate><![CDATA[Mon, 04 May 2026 21:40:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/amd-and-intel-partner-to-deliver-ai-performance-advancement/]]></guid>
			<link><![CDATA[https://fxtechnology.org/amd-and-intel-partner-to-deliver-ai-performance-advancement/]]></link>
			<title>AMD and Intel partner to deliver AI performance advancement</title>
			<pubDate><![CDATA[Mon, 04 May 2026 21:23:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/agentic-ai-and-the-evolution-of-code-security-in-modern-development/]]></guid>
			<link><![CDATA[https://fxtechnology.org/agentic-ai-and-the-evolution-of-code-security-in-modern-development/]]></link>
			<title>Agentic AI and the Evolution of Code Security in Modern Development</title>
			<pubDate><![CDATA[Mon, 04 May 2026 20:39:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-grabs-astrix-to-secure-ai-agents/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-grabs-astrix-to-secure-ai-agents/]]></link>
			<title>Cisco grabs Astrix to secure AI agents</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:58:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/critical-vulnerability-in-cpanel-leads-to-widespread-exploitation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/critical-vulnerability-in-cpanel-leads-to-widespread-exploitation/]]></link>
			<title>Critical vulnerability in cPanel leads to widespread exploitation</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:38:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/uks-online-age-checks-are-failing-kids-are-beating-them-with-ai-fake-beards/]]></guid>
			<link><![CDATA[https://fxtechnology.org/uks-online-age-checks-are-failing-kids-are-beating-them-with-ai-fake-beards/]]></link>
			<title>UK&#8217;s Online Age Checks Are Failing—Kids Are Beating Them With AI, Fake Beards</title>
			<pubDate><![CDATA[Mon, 04 May 2026 18:37:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-is-more-accurate-than-doctors-in-emergency-diagnoses-study-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-is-more-accurate-than-doctors-in-emergency-diagnoses-study-computerworld/]]></link>
			<title>AI is more accurate than doctors in emergency diagnoses — study – Computerworld</title>
			<pubDate><![CDATA[Mon, 04 May 2026 18:20:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/phishing-campaign-hits-80-orgs-using-simplehelp-and-screenconnect-rmm-tools/]]></guid>
			<link><![CDATA[https://fxtechnology.org/phishing-campaign-hits-80-orgs-using-simplehelp-and-screenconnect-rmm-tools/]]></link>
			<title>Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools</title>
			<pubDate><![CDATA[Mon, 04 May 2026 18:13:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/beyond-the-pitch-a-look-at-atletico-madrids-connected-stadium/]]></guid>
			<link><![CDATA[https://fxtechnology.org/beyond-the-pitch-a-look-at-atletico-madrids-connected-stadium/]]></link>
			<title>Beyond the pitch: A look at Atlético Madrid&#8217;s connected stadium</title>
			<pubDate><![CDATA[Mon, 04 May 2026 17:56:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-now-has-more-than-20m-paying-copilot-users-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-now-has-more-than-20m-paying-copilot-users-computerworld/]]></link>
			<title>Microsoft now has more than 20M paying Copilot users – Computerworld</title>
			<pubDate><![CDATA[Mon, 04 May 2026 17:40:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/deepfake-fraud-causes-billions-in-losses/]]></guid>
			<link><![CDATA[https://fxtechnology.org/deepfake-fraud-causes-billions-in-losses/]]></link>
			<title>Deepfake Fraud Causes Billions in Losses</title>
			<pubDate><![CDATA[Mon, 04 May 2026 17:36:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/progress-patches-critical-moveit-automation-bug-enabling-authentication-bypass/]]></guid>
			<link><![CDATA[https://fxtechnology.org/progress-patches-critical-moveit-automation-bug-enabling-authentication-bypass/]]></link>
			<title>Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass</title>
			<pubDate><![CDATA[Mon, 04 May 2026 17:28:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-to-bring-ai-into-your-small-business-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-to-bring-ai-into-your-small-business-computerworld/]]></link>
			<title>How to bring AI into your small business – Computerworld</title>
			<pubDate><![CDATA[Mon, 04 May 2026 17:20:00 +0000]]></pubDate>
		</item>
				</channel>
</rss>
