<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 7, 2026 at 1:45 am by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Wed, 06 May 2026 21:33:37 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/mozilla-mullvad-proton-sign-letter-opposing-uk-age-verification/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mozilla-mullvad-proton-sign-letter-opposing-uk-age-verification/]]></link>
			<title>Mozilla, Mullvad, Proton, sign letter opposing UK age verification</title>
			<pubDate><![CDATA[Wed, 06 May 2026 21:33:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/lumen-advances-cloud-networking-vision-with-475m-alkira-buy/]]></guid>
			<link><![CDATA[https://fxtechnology.org/lumen-advances-cloud-networking-vision-with-475m-alkira-buy/]]></link>
			<title>Lumen advances cloud networking vision with $475M Alkira buy</title>
			<pubDate><![CDATA[Wed, 06 May 2026 21:21:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/palo-alto-networks-firewall-zero-day-exploited-in-active-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/palo-alto-networks-firewall-zero-day-exploited-in-active-attacks/]]></link>
			<title>Palo Alto Networks Firewall Zero-Day Exploited in Active Attacks </title>
			<pubDate><![CDATA[Wed, 06 May 2026 20:32:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/mirai-based-xlabs_v1-botnet-exploits-adb-to-hijack-iot-devices-for-ddos-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mirai-based-xlabs_v1-botnet-exploits-adb-to-hijack-iot-devices-for-ddos-attacks/]]></link>
			<title>Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks</title>
			<pubDate><![CDATA[Wed, 06 May 2026 20:27:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/chromes-ai-features-can-take-up-to-4gb-of-space-on-your-computer-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/chromes-ai-features-can-take-up-to-4gb-of-space-on-your-computer-computerworld/]]></link>
			<title>Chrome&#8217;s AI features can take up to 4GB of space on your computer – Computerworld</title>
			<pubDate><![CDATA[Wed, 06 May 2026 19:36:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/businesses-eager-but-unprepared-for-ai-to-transform-their-security-strategies/]]></guid>
			<link><![CDATA[https://fxtechnology.org/businesses-eager-but-unprepared-for-ai-to-transform-their-security-strategies/]]></link>
			<title>Businesses eager but unprepared for AI to transform their security strategies</title>
			<pubDate><![CDATA[Wed, 06 May 2026 19:31:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hpe-bolsters-autonomous-network-operations-for-mist-aruba-central/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hpe-bolsters-autonomous-network-operations-for-mist-aruba-central/]]></link>
			<title>HPE bolsters autonomous network operations for Mist, Aruba Central</title>
			<pubDate><![CDATA[Wed, 06 May 2026 19:19:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cyber-incident-review-board-announced-by-australia/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cyber-incident-review-board-announced-by-australia/]]></link>
			<title>Cyber Incident Review Board Announced By Australia</title>
			<pubDate><![CDATA[Wed, 06 May 2026 18:30:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/intel-behind-in-ai-chips-bets-on-quantum-and-neuromorphic-processors/]]></guid>
			<link><![CDATA[https://fxtechnology.org/intel-behind-in-ai-chips-bets-on-quantum-and-neuromorphic-processors/]]></link>
			<title>Intel, behind in AI chips, bets on quantum and neuromorphic processors</title>
			<pubDate><![CDATA[Wed, 06 May 2026 17:51:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/netskope-launches-ai-agents-for-soc-and-noc-automation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/netskope-launches-ai-agents-for-soc-and-noc-automation/]]></link>
			<title>Netskope launches AI agents for SOC and NOC automation</title>
			<pubDate><![CDATA[Wed, 06 May 2026 17:49:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/servicenow-continues-its-ai-transformation-with-an-integrated-experience-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/servicenow-continues-its-ai-transformation-with-an-integrated-experience-computerworld/]]></link>
			<title>ServiceNow continues its AI transformation with an integrated experience – Computerworld</title>
			<pubDate><![CDATA[Wed, 06 May 2026 17:34:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/attackers-continue-to-pose-as-help-desks-in-social-engineering-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/attackers-continue-to-pose-as-help-desks-in-social-engineering-attacks/]]></link>
			<title>Attackers Continue to Pose as Help Desks in Social Engineering Attacks</title>
			<pubDate><![CDATA[Wed, 06 May 2026 17:29:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/redefining-security-operations-through-seceons-open-threat-management-platform/]]></guid>
			<link><![CDATA[https://fxtechnology.org/redefining-security-operations-through-seceons-open-threat-management-platform/]]></link>
			<title>Redefining Security Operations Through Seceon’s Open Threat Management Platform</title>
			<pubDate><![CDATA[Wed, 06 May 2026 15:25:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/grapheneos-fixes-android-vpn-leak-google-refused-to-patch/]]></guid>
			<link><![CDATA[https://fxtechnology.org/grapheneos-fixes-android-vpn-leak-google-refused-to-patch/]]></link>
			<title>GrapheneOS fixes Android VPN leak Google refused to patch</title>
			<pubDate><![CDATA[Wed, 06 May 2026 14:24:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-intelligence-hype-cost-the-company-250m-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-intelligence-hype-cost-the-company-250m-computerworld/]]></link>
			<title>Apple Intelligence hype cost the company $250M – Computerworld</title>
			<pubDate><![CDATA[Wed, 06 May 2026 14:10:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/oceanlotus-suspected-of-distributing-zichatbot-malware-via-wheel-packages-in-pypi/]]></guid>
			<link><![CDATA[https://fxtechnology.org/oceanlotus-suspected-of-distributing-zichatbot-malware-via-wheel-packages-in-pypi/]]></link>
			<title>OceanLotus suspected of distributing ZiChatBot malware via wheel packages in PyPI</title>
			<pubDate><![CDATA[Wed, 06 May 2026 13:38:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cve-2026-0300-buffer-overflow-vulnerability-in-pan-os/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cve-2026-0300-buffer-overflow-vulnerability-in-pan-os/]]></link>
			<title>CVE-2026-0300 Buffer Overflow Vulnerability In PAN-OS</title>
			<pubDate><![CDATA[Wed, 06 May 2026 13:23:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/muddywater-uses-microsoft-teams-to-steal-credentials-in-false-flag-ransomware-attack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/muddywater-uses-microsoft-teams-to-steal-credentials-in-false-flag-ransomware-attack/]]></link>
			<title>MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack</title>
			<pubDate><![CDATA[Wed, 06 May 2026 13:21:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/windows-phone-link-exploited-by-cloudz-rat-to-steal-credentials-and-otps/]]></guid>
			<link><![CDATA[https://fxtechnology.org/windows-phone-link-exploited-by-cloudz-rat-to-steal-credentials-and-otps/]]></link>
			<title>Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs</title>
			<pubDate><![CDATA[Wed, 06 May 2026 11:18:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/switch-storm-coming-gartner-forecasts-price-hikes-long-lead-times-for-enterprise-data-center-switches/]]></guid>
			<link><![CDATA[https://fxtechnology.org/switch-storm-coming-gartner-forecasts-price-hikes-long-lead-times-for-enterprise-data-center-switches/]]></link>
			<title>Switch storm coming: Gartner forecasts price hikes, long lead times for enterprise data center switches</title>
			<pubDate><![CDATA[Wed, 06 May 2026 11:06:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-didnt-break-cybersecurity-it-revealed-it/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-didnt-break-cybersecurity-it-revealed-it/]]></link>
			<title>Ai Didn’t Break Cybersecurity, It Revealed It</title>
			<pubDate><![CDATA[Wed, 06 May 2026 10:20:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/give-yourself-an-on-demand-android-taskbar-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/give-yourself-an-on-demand-android-taskbar-computerworld/]]></link>
			<title>Give yourself an on-demand Android taskbar – Computerworld</title>
			<pubDate><![CDATA[Wed, 06 May 2026 10:04:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-to-spot-a-suspicious-website/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-to-spot-a-suspicious-website/]]></link>
			<title>How to spot a suspicious website</title>
			<pubDate><![CDATA[Wed, 06 May 2026 09:34:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/poc-tool-extracts-cleartext-passwords-from-microsoft-edge-memory/]]></guid>
			<link><![CDATA[https://fxtechnology.org/poc-tool-extracts-cleartext-passwords-from-microsoft-edge-memory/]]></link>
			<title>PoC tool extracts cleartext passwords from Microsoft Edge memory</title>
			<pubDate><![CDATA[Wed, 06 May 2026 09:19:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/android-apps-get-public-verification-system-to-stop-supply-chain-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/android-apps-get-public-verification-system-to-stop-supply-chain-attacks/]]></link>
			<title>Android Apps Get Public Verification System to Stop Supply Chain Attacks</title>
			<pubDate><![CDATA[Wed, 06 May 2026 09:15:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/uidai-and-nfsu-boost-cybersecurity-forensics-in-india/]]></guid>
			<link><![CDATA[https://fxtechnology.org/uidai-and-nfsu-boost-cybersecurity-forensics-in-india/]]></link>
			<title>UIDAI And NFSU Boost Cybersecurity, Forensics In India</title>
			<pubDate><![CDATA[Wed, 06 May 2026 08:18:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/palo-alto-pan-os-flaw-under-active-exploitation-enables-remote-code-execution/]]></guid>
			<link><![CDATA[https://fxtechnology.org/palo-alto-pan-os-flaw-under-active-exploitation-enables-remote-code-execution/]]></link>
			<title>Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution</title>
			<pubDate><![CDATA[Wed, 06 May 2026 07:11:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/scarcruft-compromises-gaming-platform-in-a-supply-chain-attack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/scarcruft-compromises-gaming-platform-in-a-supply-chain-attack/]]></link>
			<title>ScarCruft compromises gaming platform in a supply-chain attack</title>
			<pubDate><![CDATA[Wed, 06 May 2026 05:48:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/securing-the-ai-enabled-workforce-the-next-evolution-of-human-risk-management/]]></guid>
			<link><![CDATA[https://fxtechnology.org/securing-the-ai-enabled-workforce-the-next-evolution-of-human-risk-management/]]></link>
			<title>Securing The AI-Enabled Workforce: The Next Evolution Of Human Risk Management</title>
			<pubDate><![CDATA[Wed, 06 May 2026 05:15:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/brave-sees-100-linux-growth-as-browser-reaches-115m-monthly-users/]]></guid>
			<link><![CDATA[https://fxtechnology.org/brave-sees-100-linux-growth-as-browser-reaches-115m-monthly-users/]]></link>
			<title>Brave sees 100% Linux growth as browser reaches 115M monthly users</title>
			<pubDate><![CDATA[Wed, 06 May 2026 04:15:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-infostealer-dubbed-pheno-stealing-your-mfa-otps/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-infostealer-dubbed-pheno-stealing-your-mfa-otps/]]></link>
			<title>New Infostealer Dubbed &#8216;Pheno&#8217; Stealing Your MFA OTPs</title>
			<pubDate><![CDATA[Wed, 06 May 2026 03:13:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-insurance-industry-is-rewriting-cybersecurity-strategy/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-insurance-industry-is-rewriting-cybersecurity-strategy/]]></link>
			<title>The Insurance Industry Is Rewriting Cybersecurity Strategy</title>
			<pubDate><![CDATA[Wed, 06 May 2026 00:10:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/proton-mail-rolls-out-quantum-resistant-encryption-for-all-users/]]></guid>
			<link><![CDATA[https://fxtechnology.org/proton-mail-rolls-out-quantum-resistant-encryption-for-all-users/]]></link>
			<title>Proton Mail rolls out quantum-resistant encryption for all users</title>
			<pubDate><![CDATA[Tue, 05 May 2026 23:10:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/trellix-investigating-breach-of-source-code-repository/]]></guid>
			<link><![CDATA[https://fxtechnology.org/trellix-investigating-breach-of-source-code-repository/]]></link>
			<title>Trellix investigating breach of source code repository</title>
			<pubDate><![CDATA[Tue, 05 May 2026 22:09:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/extreme-moves-toward-autonomous-networking-with-advanced-ai-agent-management-tools/]]></guid>
			<link><![CDATA[https://fxtechnology.org/extreme-moves-toward-autonomous-networking-with-advanced-ai-agent-management-tools/]]></link>
			<title>Extreme moves toward autonomous networking with advanced AI agent, management tools</title>
			<pubDate><![CDATA[Tue, 05 May 2026 21:26:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/u-s-will-examine-national-security-implications-of-new-ai-models/]]></guid>
			<link><![CDATA[https://fxtechnology.org/u-s-will-examine-national-security-implications-of-new-ai-models/]]></link>
			<title>U.S. Will Examine National Security Implications Of New AI Models</title>
			<pubDate><![CDATA[Tue, 05 May 2026 21:08:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/edge-browser-leaves-passwords-exposed-in-plain-text-says-researcher/]]></guid>
			<link><![CDATA[https://fxtechnology.org/edge-browser-leaves-passwords-exposed-in-plain-text-says-researcher/]]></link>
			<title>Edge browser leaves passwords exposed in plain text, says researcher</title>
			<pubDate><![CDATA[Tue, 05 May 2026 20:10:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/introducing-the-new-ai-native-knowbe4-sat/]]></guid>
			<link><![CDATA[https://fxtechnology.org/introducing-the-new-ai-native-knowbe4-sat/]]></link>
			<title>Introducing the New AI-Native KnowBe4 SAT</title>
			<pubDate><![CDATA[Tue, 05 May 2026 20:06:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ask-jeeves-bites-the-dust-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ask-jeeves-bites-the-dust-computerworld/]]></link>
			<title>Ask Jeeves bites the dust – Computerworld</title>
			<pubDate><![CDATA[Tue, 05 May 2026 18:06:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/platform-engineering-the-rise-of-a-disciplinary-rethink/]]></guid>
			<link><![CDATA[https://fxtechnology.org/platform-engineering-the-rise-of-a-disciplinary-rethink/]]></link>
			<title>Platform Engineering: The Rise of a Disciplinary Rethink</title>
			<pubDate><![CDATA[Tue, 05 May 2026 18:04:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-brings-end-to-end-encryption-to-rcs-messaging-in-ios-26-5/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-brings-end-to-end-encryption-to-rcs-messaging-in-ios-26-5/]]></link>
			<title>Apple brings end-to-end encryption to RCS messaging in iOS 26.5</title>
			<pubDate><![CDATA[Tue, 05 May 2026 17:01:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/critical-apache-http-2-flaw-cve-2026-23918-enables-dos-and-potential-rce/]]></guid>
			<link><![CDATA[https://fxtechnology.org/critical-apache-http-2-flaw-cve-2026-23918-enables-dos-and-potential-rce/]]></link>
			<title>Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE</title>
			<pubDate><![CDATA[Tue, 05 May 2026 16:53:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/daemon-tools-supply-chain-attack-compromises-official-installers-with-malware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/daemon-tools-supply-chain-attack-compromises-official-installers-with-malware/]]></link>
			<title>DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware</title>
			<pubDate><![CDATA[Tue, 05 May 2026 16:36:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-cant-make-chips-fast-enough-but-thats-only-part-of-the-story-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-cant-make-chips-fast-enough-but-thats-only-part-of-the-story-computerworld/]]></link>
			<title>Apple can&#8217;t make chips fast enough, but that&#8217;s only part of the story – Computerworld</title>
			<pubDate><![CDATA[Tue, 05 May 2026 16:01:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/supply-constraints-optical-advances-dominate-aristas-q1/]]></guid>
			<link><![CDATA[https://fxtechnology.org/supply-constraints-optical-advances-dominate-aristas-q1/]]></link>
			<title>Supply constraints, optical advances dominate Arista&#8217;s Q1</title>
			<pubDate><![CDATA[Thu, 07 May 2026 00:58:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/android-zero-click-rce-vulnerability-enables-remote-shell-access/]]></guid>
			<link><![CDATA[https://fxtechnology.org/android-zero-click-rce-vulnerability-enables-remote-shell-access/]]></link>
			<title>Android Zero-Click RCE Vulnerability Enables Remote Shell Access  </title>
			<pubDate><![CDATA[Tue, 05 May 2026 16:00:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisa-urges-critical-infrastructure-firms-to-fortify-now-before-its-too-late/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisa-urges-critical-infrastructure-firms-to-fortify-now-before-its-too-late/]]></link>
			<title>CISA urges critical infrastructure firms to ‘fortify’ now before it’s too late</title>
			<pubDate><![CDATA[Tue, 05 May 2026 14:59:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/china-linked-uat-8302-targets-governments-using-shared-apt-malware-across-regions/]]></guid>
			<link><![CDATA[https://fxtechnology.org/china-linked-uat-8302-targets-governments-using-shared-apt-malware-across-regions/]]></link>
			<title>China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions</title>
			<pubDate><![CDATA[Tue, 05 May 2026 14:34:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ransomware-organization-sentencing-key-operative-jailed/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ransomware-organization-sentencing-key-operative-jailed/]]></link>
			<title>Ransomware Organization Sentencing: Key Operative Jailed</title>
			<pubDate><![CDATA[Tue, 05 May 2026 13:59:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/iran-sponsored-threat-group-behind-false-flag-social-engineering-campaign/]]></guid>
			<link><![CDATA[https://fxtechnology.org/iran-sponsored-threat-group-behind-false-flag-social-engineering-campaign/]]></link>
			<title>Iran-sponsored threat group behind false flag social engineering campaign</title>
			<pubDate><![CDATA[Thu, 07 May 2026 01:39:15 +0000]]></pubDate>
		</item>
				</channel>
</rss>
