<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 27, 2026 at 7:26 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Sun, 26 Apr 2026 08:02:39 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/xchat-launches-standalone-ios-app-as-security-concerns-remain/]]></guid>
			<link><![CDATA[https://fxtechnology.org/xchat-launches-standalone-ios-app-as-security-concerns-remain/]]></link>
			<title>XChat launches standalone iOS app as security concerns remain</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 08:02:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-5-best-vpns-for-small-businesses-on-a-budget/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-5-best-vpns-for-small-businesses-on-a-budget/]]></link>
			<title>The 5 Best VPNs for Small Businesses on a Budget</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 18:39:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/major-critical-infrastructure-supplier-reports-cyberattack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/major-critical-infrastructure-supplier-reports-cyberattack/]]></link>
			<title>Major critical infrastructure supplier reports cyberattack</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 17:39:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-fixes-ios-flaw-that-let-fbi-recover-deleted-signal-messages/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-fixes-ios-flaw-that-let-fbi-recover-deleted-signal-messages/]]></link>
			<title>Apple Fixes iOS Flaw That Let FBI Recover Deleted Signal Messages</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 05:43:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/canada-sms-blaster-cybercrime-case-triggers-major-arrests/]]></guid>
			<link><![CDATA[https://fxtechnology.org/canada-sms-blaster-cybercrime-case-triggers-major-arrests/]]></link>
			<title>Canada SMS Blaster Cybercrime Case Triggers Major Arrests</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 16:38:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/openai-plans-its-own-iphone-killer-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/openai-plans-its-own-iphone-killer-computerworld/]]></link>
			<title>OpenAI plans its own ‘iPhone killer’ – Computerworld</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 15:04:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/checkmarx-confirms-github-repository-data-posted-on-dark-web-after-march-23-attack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/checkmarx-confirms-github-repository-data-posted-on-dark-web-after-march-23-attack/]]></link>
			<title>Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 15:01:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/researchers-uncover-pre-stuxnet-fast16-malware-targeting-engineering-software/]]></guid>
			<link><![CDATA[https://fxtechnology.org/researchers-uncover-pre-stuxnet-fast16-malware-targeting-engineering-software/]]></link>
			<title>Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 10:20:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nvidias-ai-insurance-policy-balances-immediate-and-future-ai-approaches/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nvidias-ai-insurance-policy-balances-immediate-and-future-ai-approaches/]]></link>
			<title>Nvidia’s ‘AI insurance policy’ balances immediate and future AI approaches</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 14:56:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/data-breaches-ai-expansion-and-cloud-security-define-this-weeks-cyber-landscape-in-april-2026/]]></guid>
			<link><![CDATA[https://fxtechnology.org/data-breaches-ai-expansion-and-cloud-security-define-this-weeks-cyber-landscape-in-april-2026/]]></link>
			<title>Data Breaches, AI Expansion, and Cloud Security Define This Week’s Cyber Landscape in April 2026</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 10:40:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/firefox-is-quietly-experimenting-with-braves-ad-blocking-engine/]]></guid>
			<link><![CDATA[https://fxtechnology.org/firefox-is-quietly-experimenting-with-braves-ad-blocking-engine/]]></link>
			<title>Firefox is quietly experimenting with Brave’s ad-blocking engine</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 06:34:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/what-you-see-is-not-all-there-is/]]></guid>
			<link><![CDATA[https://fxtechnology.org/what-you-see-is-not-all-there-is/]]></link>
			<title>What you see is not all there is</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 05:49:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/5-enterprise-vpn-solutions-every-business-should-know/]]></guid>
			<link><![CDATA[https://fxtechnology.org/5-enterprise-vpn-solutions-every-business-should-know/]]></link>
			<title>5 Enterprise VPN Solutions Every Business Should Know</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 05:33:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/us-lawmakers-introduce-bill-to-require-warrants-for-government-data-searches/]]></guid>
			<link><![CDATA[https://fxtechnology.org/us-lawmakers-introduce-bill-to-require-warrants-for-government-data-searches/]]></link>
			<title>US lawmakers introduce bill to require warrants for government data searches</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 01:27:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/5-cloud-security-providers-you-might-be-overlooking/]]></guid>
			<link><![CDATA[https://fxtechnology.org/5-cloud-security-providers-you-might-be-overlooking/]]></link>
			<title>5 Cloud Security Providers You Might Be Overlooking</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 00:27:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fast16-malware-xchat-launch-federal-backdoor-ai-employee-tracking-more/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fast16-malware-xchat-launch-federal-backdoor-ai-employee-tracking-more/]]></link>
			<title>Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking &#038; More</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 14:16:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/researchers-uncover-73-fake-vs-code-extensions-delivering-glassworm-v2-malware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/researchers-uncover-73-fake-vs-code-extensions-delivering-glassworm-v2-malware/]]></link>
			<title>Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 13:23:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/when-security-becomes-the-attack-surface-why-endpoint-protection-must-evolve/]]></guid>
			<link><![CDATA[https://fxtechnology.org/when-security-becomes-the-attack-surface-why-endpoint-protection-must-evolve/]]></link>
			<title>When security becomes the attack surface: Why endpoint protection must evolve</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 12:33:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/phantomcore-exploits-trueconf-vulnerabilities-to-breach-russian-networks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/phantomcore-exploits-trueconf-vulnerabilities-to-breach-russian-networks/]]></link>
			<title>PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 11:56:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/a-large-scale-deceptive-domain-campaign/]]></guid>
			<link><![CDATA[https://fxtechnology.org/a-large-scale-deceptive-domain-campaign/]]></link>
			<title>A Large-Scale Deceptive Domain Campaign</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 11:32:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/your-ai-strategy-is-all-wrong/]]></guid>
			<link><![CDATA[https://fxtechnology.org/your-ai-strategy-is-all-wrong/]]></link>
			<title>Your AI strategy is all wrong</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 07:33:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/metas-compute-grab-continues-with-agreement-to-deploy-tens-of-millions-of-aws-graviton-cores-2/]]></guid>
			<link><![CDATA[https://fxtechnology.org/metas-compute-grab-continues-with-agreement-to-deploy-tens-of-millions-of-aws-graviton-cores-2/]]></link>
			<title>Meta’s compute grab continues with agreement to deploy tens of millions of AWS Graviton cores</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 23:28:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ofcom-investigation-targets-telegram-teen-chat-platforms/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ofcom-investigation-targets-telegram-teen-chat-platforms/]]></link>
			<title>Ofcom Investigation Targets Telegram, Teen Chat Platforms</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 23:24:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/metas-compute-grab-continues-with-agreement-to-deploy-tens-of-millions-of-aws-graviton-cores/]]></guid>
			<link><![CDATA[https://fxtechnology.org/metas-compute-grab-continues-with-agreement-to-deploy-tens-of-millions-of-aws-graviton-cores/]]></link>
			<title>Meta&#8217;s compute grab continues with agreement to deploy tens of millions of AWS Graviton cores</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 22:40:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/adt-confirms-data-breach-after-hacker-claims-10-million-records-stolen/]]></guid>
			<link><![CDATA[https://fxtechnology.org/adt-confirms-data-breach-after-hacker-claims-10-million-records-stolen/]]></link>
			<title>ADT confirms data breach after hacker claims 10 million records stolen</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 20:20:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisa-last-in-line-for-access-to-anthropic-mythos-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisa-last-in-line-for-access-to-anthropic-mythos-computerworld/]]></link>
			<title>CISA last in line for access to Anthropic Mythos – Computerworld</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 19:23:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/shinyhunters-claims-udemy-data-breach-of-1-4m-users/]]></guid>
			<link><![CDATA[https://fxtechnology.org/shinyhunters-claims-udemy-data-breach-of-1-4m-users/]]></link>
			<title>ShinyHunters Claims Udemy Data Breach of 1.4M Users </title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 19:19:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/germanys-sovereign-ai-hope-changes-hands-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/germanys-sovereign-ai-hope-changes-hands-computerworld/]]></link>
			<title>Germany&#8217;s sovereign AI hope changes hands – Computerworld</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 18:46:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/agent-mode-is-now-available-in-microsoft-word-excel-and-powerpoint-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/agent-mode-is-now-available-in-microsoft-word-excel-and-powerpoint-computerworld/]]></link>
			<title>Agent Mode is now available in Microsoft Word, Excel, and PowerPoint – Computerworld</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 18:22:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hasbro-expects-march-cyberattack-to-impact-second-quarter-revenue/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hasbro-expects-march-cyberattack-to-impact-second-quarter-revenue/]]></link>
			<title>Hasbro expects March cyberattack to impact second-quarter revenue</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 18:17:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/former-openai-research-scientist-launches-new-ai-model-for-tencent-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/former-openai-research-scientist-launches-new-ai-model-for-tencent-computerworld/]]></link>
			<title>Former OpenAI research scientist launches new AI model for Tencent – Computerworld</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 17:45:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/adobe-bets-on-ai-agents-to-stay-at-the-center-of-marketing-workflows-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/adobe-bets-on-ai-agents-to-stay-at-the-center-of-marketing-workflows-computerworld/]]></link>
			<title>Adobe bets on AI agents to stay at the center of marketing workflows – Computerworld</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 17:21:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/china-nexus-hackers-use-massive-covert-botnets-globally/]]></guid>
			<link><![CDATA[https://fxtechnology.org/china-nexus-hackers-use-massive-covert-botnets-globally/]]></link>
			<title>China-Nexus Hackers Use Massive Covert Botnets Globally</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 17:16:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/firestarter-backdoor-hit-federal-cisco-firepower-device-survives-security-patches/]]></guid>
			<link><![CDATA[https://fxtechnology.org/firestarter-backdoor-hit-federal-cisco-firepower-device-survives-security-patches/]]></link>
			<title>FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 17:08:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cirrascale-to-offer-on-prem-google-gemini-models/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cirrascale-to-offer-on-prem-google-gemini-models/]]></link>
			<title>Cirrascale to offer on-prem Google Gemini models</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 16:44:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/space-data-center-news-roundup-of-extraterrestrial-ai-endeavors/]]></guid>
			<link><![CDATA[https://fxtechnology.org/space-data-center-news-roundup-of-extraterrestrial-ai-endeavors/]]></link>
			<title>Space data-center news: Roundup of extraterrestrial AI endeavors</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 14:25:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/covert-telecom-spying-campaign-ghost-operators-tracks-users-worldwide/]]></guid>
			<link><![CDATA[https://fxtechnology.org/covert-telecom-spying-campaign-ghost-operators-tracks-users-worldwide/]]></link>
			<title>Covert telecom spying campaign “Ghost Operators” tracks users worldwide</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 14:11:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/data-breaches-malware-fraud-updates/]]></guid>
			<link><![CDATA[https://fxtechnology.org/data-breaches-malware-fraud-updates/]]></link>
			<title>Data Breaches, Malware &#038; Fraud Updates</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 13:10:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-to-offer-voluntary-retirement-buyouts-to-about-7-of-the-us-workforce-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-to-offer-voluntary-retirement-buyouts-to-about-7-of-the-us-workforce-computerworld/]]></link>
			<title>Microsoft to offer voluntary retirement buyouts to about 7% of the US workforce – Computerworld</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 12:35:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases/]]></guid>
			<link><![CDATA[https://fxtechnology.org/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases/]]></link>
			<title>26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 12:04:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/firefox-flaw-enables-cross-site-tracking-undermines-tor-browser-defenses/]]></guid>
			<link><![CDATA[https://fxtechnology.org/firefox-flaw-enables-cross-site-tracking-undermines-tor-browser-defenses/]]></link>
			<title>Firefox flaw enables cross-site tracking, undermines Tor Browser defenses</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 10:07:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/tropic-trooper-uses-trojanized-sumatrapdf-and-github-to-deploy-adaptixc2/]]></guid>
			<link><![CDATA[https://fxtechnology.org/tropic-trooper-uses-trojanized-sumatrapdf-and-github-to-deploy-adaptixc2/]]></link>
			<title>Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 10:01:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/uk-biobank-data-breach-raises-health-data-privacy-concerns/]]></guid>
			<link><![CDATA[https://fxtechnology.org/uk-biobank-data-breach-raises-health-data-privacy-concerns/]]></link>
			<title>UK Biobank Data Breach Raises Health Data Privacy Concerns</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 09:06:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/290m-defi-hack-macos-lotl-abuse-proxysmart-sim-farms-25-new-stories/]]></guid>
			<link><![CDATA[https://fxtechnology.org/290m-defi-hack-macos-lotl-abuse-proxysmart-sim-farms-25-new-stories/]]></link>
			<title>$290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 08:47:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/disclosing-phantomrpc-a-privilege-escalation-vulnerability-in-rpc/]]></guid>
			<link><![CDATA[https://fxtechnology.org/disclosing-phantomrpc-a-privilege-escalation-vulnerability-in-rpc/]]></link>
			<title>Disclosing PhantomRPC – a privilege escalation vulnerability in RPC</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 08:13:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure/]]></guid>
			<link><![CDATA[https://fxtechnology.org/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure/]]></link>
			<title>LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 07:46:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-fixes-ios-privacy-flaw-that-allowed-signal-message-retrieval/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-fixes-ios-privacy-flaw-that-allowed-signal-message-retrieval/]]></link>
			<title>Apple fixes iOS privacy flaw that allowed Signal message retrieval</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 06:03:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/a-burrow-full-of-malware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/a-burrow-full-of-malware/]]></link>
			<title>A burrow full of malware</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 05:45:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/iran-nexus-threat-groups-refine-attacks-against-critical-infrastructure/]]></guid>
			<link><![CDATA[https://fxtechnology.org/iran-nexus-threat-groups-refine-attacks-against-critical-infrastructure/]]></link>
			<title>Iran-nexus threat groups refine attacks against critical infrastructure</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 05:02:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/enhance-eu-cybersecurity-with-ncaf-2-0-framework/]]></guid>
			<link><![CDATA[https://fxtechnology.org/enhance-eu-cybersecurity-with-ncaf-2-0-framework/]]></link>
			<title>Enhance EU Cybersecurity With NCAF 2.0 Framework</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 04:01:35 +0000]]></pubDate>
		</item>
				</channel>
</rss>
