<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 7, 2026 at 1:56 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Tue, 07 Apr 2026 13:29:44 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/]]></guid>
			<link><![CDATA[https://fxtechnology.org/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/]]></link>
			<title>Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 13:29:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nvidias-schedmd-acquisition-puts-open-source-ai-scheduling-under-scrutiny/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nvidias-schedmd-acquisition-puts-open-source-ai-scheduling-under-scrutiny/]]></link>
			<title>Nvidia’s SchedMD acquisition puts open-source AI scheduling under scrutiny</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:56:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nvidias-schedmd-acquisition-puts-open-source-ai-scheduling-under-scrutiny-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nvidias-schedmd-acquisition-puts-open-source-ai-scheduling-under-scrutiny-computerworld/]]></link>
			<title>Nvidia’s SchedMD acquisition puts open-source AI scheduling under scrutiny – Computerworld</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:38:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apples-mac-grabs-11-of-us-enterprise-market-share-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apples-mac-grabs-11-of-us-enterprise-market-share-computerworld/]]></link>
			<title>Apple&#8217;s Mac grabs 11% of US enterprise market share – Computerworld</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:09:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-hidden-cost-of-recurring-credential-incidents/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-hidden-cost-of-recurring-credential-incidents/]]></link>
			<title>The Hidden Cost of Recurring Credential Incidents</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:03:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/8-advanced-ways-vivaldi-boosts-your-productivity-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/8-advanced-ways-vivaldi-boosts-your-productivity-computerworld/]]></link>
			<title>8 advanced ways Vivaldi boosts your productivity – Computerworld</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 10:37:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/eu-csam-law-lapse-puts-child-safety-at-online-risks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/eu-csam-law-lapse-puts-child-safety-at-online-risks/]]></link>
			<title>EU CSAM Law Lapse Puts Child Safety At Online Risks</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 10:31:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-ai-simplifies-wireless-operations-but-also-taxes-legacy-wi-fi-networks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-ai-simplifies-wireless-operations-but-also-taxes-legacy-wi-fi-networks/]]></link>
			<title>Cisco: AI simplifies wireless operations but also taxes legacy Wi-Fi networks</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 10:06:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/]]></link>
			<title>New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware/]]></link>
			<title>China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 06:55:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cve-2026-35616-forticlient-ems-flaw-under-active-exploitation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cve-2026-35616-forticlient-ems-flaw-under-active-exploitation/]]></link>
			<title>CVE-2026-35616: FortiClient EMS Flaw Under Active Exploitation</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 06:27:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed/]]></guid>
			<link><![CDATA[https://fxtechnology.org/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed/]]></link>
			<title>Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 06:18:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/european-commission-cloud-breach-stolen-data-posted-online/]]></guid>
			<link><![CDATA[https://fxtechnology.org/european-commission-cloud-breach-stolen-data-posted-online/]]></link>
			<title>European Commission Cloud Breach: Stolen Data Posted Online</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 05:26:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/1-2-million-crunchyroll-users-confirmed-impacted-by-data-breach/]]></guid>
			<link><![CDATA[https://fxtechnology.org/1-2-million-crunchyroll-users-confirmed-impacted-by-data-breach/]]></link>
			<title>1.2 million Crunchyroll users confirmed impacted by data breach</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 02:23:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/2027-potus-budget-proposal-targets-cisa-with-funding-cuts/]]></guid>
			<link><![CDATA[https://fxtechnology.org/2027-potus-budget-proposal-targets-cisa-with-funding-cuts/]]></link>
			<title>2027 POTUS Budget Proposal Targets CISA With Funding Cuts</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 01:21:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/critical-flaw-in-forticlient-ems-under-exploitation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/critical-flaw-in-forticlient-ems-under-exploitation/]]></link>
			<title>Critical flaw in FortiClient EMS under exploitation</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 00:21:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/massachusetts-emergency-cyberattack-hits-patriot-regional/]]></guid>
			<link><![CDATA[https://fxtechnology.org/massachusetts-emergency-cyberattack-hits-patriot-regional/]]></link>
			<title>Massachusetts Emergency Cyberattack Hits Patriot Regional</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 23:20:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/detection-and-prevention-of-misdirected-emails-what-to-know/]]></guid>
			<link><![CDATA[https://fxtechnology.org/detection-and-prevention-of-misdirected-emails-what-to-know/]]></link>
			<title>Detection and Prevention of Misdirected Emails: What to Know</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 22:18:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations/]]></guid>
			<link><![CDATA[https://fxtechnology.org/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations/]]></link>
			<title>Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 20:11:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/chrome-color-picker-extension-with-400k-users-sneaked-browsing-tracker/]]></guid>
			<link><![CDATA[https://fxtechnology.org/chrome-color-picker-extension-with-400k-users-sneaked-browsing-tracker/]]></link>
			<title>Chrome color picker extension with 400k users sneaked browsing tracker</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 19:15:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hyperscaler-backlogs-show-growing-demand-for-ai-infrastructure/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hyperscaler-backlogs-show-growing-demand-for-ai-infrastructure/]]></link>
			<title>Hyperscaler backlogs show growing demand for AI infrastructure</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:34:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-state-of-ai-risk-management-in-2026-reveals-a-growing-confidence-gap/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-state-of-ai-risk-management-in-2026-reveals-a-growing-confidence-gap/]]></link>
			<title>The State of AI Risk Management in 2026 Reveals a Growing Confidence Gap</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:14:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/]]></guid>
			<link><![CDATA[https://fxtechnology.org/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/]]></link>
			<title>DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:09:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hims-hers-says-limited-data-stolen-in-social-engineering-attack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hims-hers-says-limited-data-stolen-in-social-engineering-attack/]]></link>
			<title>Hims &#038; Hers says limited data stolen in social engineering attack</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 17:13:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/two-new-england-states-say-no-to-new-data-centers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/two-new-england-states-say-no-to-new-data-centers/]]></link>
			<title>Two New England states say no to new data centers</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:32:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/us-tech-sector-lost-jobs-in-march-stalling-growth-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/us-tech-sector-lost-jobs-in-march-stalling-growth-computerworld/]]></link>
			<title>US tech sector lost jobs in March, stalling growth – Computerworld</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:17:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation/]]></link>
			<title>$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 19:46:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/north-korea-spent-6-months-to-drain-285m-from-drift-protocol-in-12-mins/]]></guid>
			<link><![CDATA[https://fxtechnology.org/north-korea-spent-6-months-to-drain-285m-from-drift-protocol-in-12-mins/]]></link>
			<title>North Korea Spent 6 Months To Drain $285M From Drift Protocol In 12 Mins</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:13:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-for-it-stalls-as-network-complexity-rises/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-for-it-stalls-as-network-complexity-rises/]]></link>
			<title>AI for IT stalls as network complexity rises</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 14:30:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants/]]></guid>
			<link><![CDATA[https://fxtechnology.org/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants/]]></link>
			<title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 05:28:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-gpubreach-attack-achieves-root-access-via-memory-corruption/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-gpubreach-attack-achieves-root-access-via-memory-corruption/]]></link>
			<title>New GPUBreach attack achieves root access via memory corruption</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 13:10:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-socs-close-a-critical-risk-in-3-steps/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-socs-close-a-critical-risk-in-3-steps/]]></link>
			<title>How SOCs Close a Critical Risk in 3 Steps</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 13:04:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/axios-hack-chrome-0-day-fortinet-exploits-paragon-spyware-and-more/]]></guid>
			<link><![CDATA[https://fxtechnology.org/axios-hack-chrome-0-day-fortinet-exploits-paragon-spyware-and-more/]]></link>
			<title>Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 12:56:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems/]]></link>
			<title>Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 05:23:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/phishing-emails-cyberattacks-drive-75-of-attacks-uae-warns/]]></guid>
			<link><![CDATA[https://fxtechnology.org/phishing-emails-cyberattacks-drive-75-of-attacks-uae-warns/]]></link>
			<title>Phishing Emails Cyberattacks Drive 75% Of Attacks, UAE Warns</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 12:09:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/armis-state-of-cyberwarfare-report-ai-powered-cyber-attacks-accelerate-worldwide/]]></guid>
			<link><![CDATA[https://fxtechnology.org/armis-state-of-cyberwarfare-report-ai-powered-cyber-attacks-accelerate-worldwide/]]></link>
			<title>Armis State of Cyberwarfare Report: AI-Powered Cyber Attacks Accelerate Worldwide</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 11:12:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/high-severity-vulnerabilities-supply-chain-breaches-and-ai-threats-redefine-cybersecurity-this-week/]]></guid>
			<link><![CDATA[https://fxtechnology.org/high-severity-vulnerabilities-supply-chain-breaches-and-ai-threats-redefine-cybersecurity-this-week/]]></link>
			<title>High-Severity Vulnerabilities, Supply Chain Breaches, and AI Threats Redefine Cybersecurity This Week</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 07:07:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/government-agencies-see-cyber-threats-as-major-barrier-to-tech-improvements/]]></guid>
			<link><![CDATA[https://fxtechnology.org/government-agencies-see-cyber-threats-as-major-barrier-to-tech-improvements/]]></link>
			<title>Government agencies see cyber threats as major barrier to tech improvements</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 06:05:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/your-knowbe4-fresh-content-updates-from-march-2026/]]></guid>
			<link><![CDATA[https://fxtechnology.org/your-knowbe4-fresh-content-updates-from-march-2026/]]></link>
			<title>Your KnowBe4 Fresh Content Updates from March 2026</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 05:04:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/eu-commission-says-teampcp-data-breach-impacted-29-union-entities/]]></guid>
			<link><![CDATA[https://fxtechnology.org/eu-commission-says-teampcp-data-breach-impacted-29-union-entities/]]></link>
			<title>EU Commission says TeamPCP data breach impacted 29 Union entities</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 02:01:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/rsac-2026-rethinking-trust-in-agentic-ai-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/rsac-2026-rethinking-trust-in-agentic-ai-security/]]></link>
			<title>RSAC 2026: Rethinking Trust in Agentic AI Security</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 00:58:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/8-ways-to-be-more-productive-in-windows-11-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/8-ways-to-be-more-productive-in-windows-11-computerworld/]]></link>
			<title>8 ways to be more productive in Windows 11 – Computerworld</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 11:12:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-imc-flaw-grants-unauthenticated-admin-access/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-imc-flaw-grants-unauthenticated-admin-access/]]></link>
			<title>Cisco IMC Flaw Grants Unauthenticated Admin Access</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 15:17:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-shutdown-controls-may-not-work-as-expected-new-study-suggests-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-shutdown-controls-may-not-work-as-expected-new-study-suggests-computerworld/]]></link>
			<title>AI shutdown controls may not work as expected, new study suggests – Computerworld</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 09:38:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/anthropic-cuts-openclaw-access-from-claude-subscriptions-offers-credits-to-ease-transition-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/anthropic-cuts-openclaw-access-from-claude-subscriptions-offers-credits-to-ease-transition-computerworld/]]></link>
			<title>Anthropic cuts OpenClaw access from Claude subscriptions, offers credits to ease transition – Computerworld</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 09:10:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/education-authority-cyberattack-hits-n-ireland-schools/]]></guid>
			<link><![CDATA[https://fxtechnology.org/education-authority-cyberattack-hits-n-ireland-schools/]]></link>
			<title>Education Authority Cyberattack Hits N. Ireland Schools</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 08:05:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks/]]></link>
			<title>BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 07:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab-krebs-on-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab-krebs-on-security/]]></link>
			<title>Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab – Krebs on Security</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 06:03:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/researchers-warn-of-critical-flaws-in-progress-sharefile/]]></guid>
			<link><![CDATA[https://fxtechnology.org/researchers-warn-of-critical-flaws-in-progress-sharefile/]]></link>
			<title>Researchers warn of critical flaws in Progress ShareFile</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 23:57:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/outbound-email-security-protecting-data-and-reputation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/outbound-email-security-protecting-data-and-reputation/]]></link>
			<title>Outbound Email Security: Protecting Data and Reputation</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 22:55:21 +0000]]></pubDate>
		</item>
				</channel>
</rss>
