<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 12, 2026 at 5:50 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Tue, 12 May 2026 17:24:04 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/hpe-revamps-private-cloud-stack-for-enterprises-rethinking-vmware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hpe-revamps-private-cloud-stack-for-enterprises-rethinking-vmware/]]></link>
			<title>HPE revamps private cloud stack for enterprises rethinking VMware</title>
			<pubDate><![CDATA[Tue, 12 May 2026 17:24:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/over-1-million-baby-monitors-and-security-cameras-exposed-through-meari-flaws/]]></guid>
			<link><![CDATA[https://fxtechnology.org/over-1-million-baby-monitors-and-security-cameras-exposed-through-meari-flaws/]]></link>
			<title>Over 1 Million Baby Monitors and Security Cameras Exposed Through Meari Flaws</title>
			<pubDate><![CDATA[Tue, 12 May 2026 17:10:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-exim-bdat-vulnerability-exposes-gnutls-builds-to-potential-code-execution/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-exim-bdat-vulnerability-exposes-gnutls-builds-to-potential-code-execution/]]></link>
			<title>New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution</title>
			<pubDate><![CDATA[Tue, 12 May 2026 17:01:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/from-nextstep-for-apple-to-apples-next-step-for-ai-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/from-nextstep-for-apple-to-apples-next-step-for-ai-computerworld/]]></link>
			<title>From NeXTStep for Apple to Apple’s next step for AI – Computerworld</title>
			<pubDate><![CDATA[Tue, 12 May 2026 16:41:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/versa-takes-aim-at-fragmented-enterprise-security-with-cspm-orchestration-update-and-ai-agent-controls/]]></guid>
			<link><![CDATA[https://fxtechnology.org/versa-takes-aim-at-fragmented-enterprise-security-with-cspm-orchestration-update-and-ai-agent-controls/]]></link>
			<title>Versa takes aim at fragmented enterprise security with CSPM, orchestration update, and AI agent controls</title>
			<pubDate><![CDATA[Tue, 12 May 2026 16:22:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/identity-takes-center-stage-as-a-leading-factor-in-enterprise-cyberattacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/identity-takes-center-stage-as-a-leading-factor-in-enterprise-cyberattacks/]]></link>
			<title>Identity takes center stage as a leading factor in enterprise cyberattacks</title>
			<pubDate><![CDATA[Tue, 12 May 2026 16:08:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-skills-development-could-define-europes-future/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-skills-development-could-define-europes-future/]]></link>
			<title>AI Skills Development Could Define Europe’s Future</title>
			<pubDate><![CDATA[Tue, 12 May 2026 15:07:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/red-hat-opens-ansible-to-ai-agents-within-limits/]]></guid>
			<link><![CDATA[https://fxtechnology.org/red-hat-opens-ansible-to-ai-agents-within-limits/]]></link>
			<title>Red Hat opens Ansible to AI agents, within limits</title>
			<pubDate><![CDATA[Tue, 12 May 2026 14:24:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cyberheistnews-vol-16-19-crafty-criminals-continue-to-pose-as-help-desks-in-social-engineering-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cyberheistnews-vol-16-19-crafty-criminals-continue-to-pose-as-help-desks-in-social-engineering-attacks/]]></link>
			<title>CyberheistNews Vol 16 #19 Crafty Criminals Continue to Pose as Help Desks in Social Engineering Attacks</title>
			<pubDate><![CDATA[Tue, 12 May 2026 14:06:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-trickmo-variant-uses-ton-c2-and-socks5-to-create-android-network-pivots/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-trickmo-variant-uses-ton-c2-and-socks5-to-create-android-network-pivots/]]></link>
			<title>New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots</title>
			<pubDate><![CDATA[Tue, 12 May 2026 14:00:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/openai-introduces-daybreak-cyber-platform-takes-on-anthropic-mythos-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/openai-introduces-daybreak-cyber-platform-takes-on-anthropic-mythos-computerworld/]]></link>
			<title>OpenAI introduces Daybreak cyber platform, takes on Anthropic Mythos – Computerworld</title>
			<pubDate><![CDATA[Tue, 12 May 2026 13:39:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/red-hat-sovereignty-is-more-than-just-compliance/]]></guid>
			<link><![CDATA[https://fxtechnology.org/red-hat-sovereignty-is-more-than-just-compliance/]]></link>
			<title>Red Hat: Sovereignty is more than just compliance</title>
			<pubDate><![CDATA[Tue, 12 May 2026 12:23:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/red-hat-offers-endless-linux-support-for-a-fee/]]></guid>
			<link><![CDATA[https://fxtechnology.org/red-hat-offers-endless-linux-support-for-a-fee/]]></link>
			<title>Red Hat offers endless Linux support — for a fee</title>
			<pubDate><![CDATA[Tue, 12 May 2026 12:19:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-shai-hulud-attack-breached-hundreds-of-npm-and-pypi-packages/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-shai-hulud-attack-breached-hundreds-of-npm-and-pypi-packages/]]></link>
			<title>New ‘Shai-Hulud’ attack breached hundreds of npm and PyPI packages</title>
			<pubDate><![CDATA[Tue, 12 May 2026 11:00:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-can-smbs-keep-up-with-ai-governance/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-can-smbs-keep-up-with-ai-governance/]]></link>
			<title>How Can SMBs Keep Up With AI Governance? </title>
			<pubDate><![CDATA[Tue, 12 May 2026 09:59:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/mini-shai-hulud-worm-compromises-tanstack-mistral-ai-guardrails-ai-more-packages/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mini-shai-hulud-worm-compromises-tanstack-mistral-ai-guardrails-ai-more-packages/]]></link>
			<title>Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI &#038; More Packages</title>
			<pubDate><![CDATA[Tue, 12 May 2026 09:56:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/openai-daybreak-introduces-gpt-5-5-for-security-operations/]]></guid>
			<link><![CDATA[https://fxtechnology.org/openai-daybreak-introduces-gpt-5-5-for-security-operations/]]></link>
			<title>OpenAI Daybreak Introduces GPT-5.5 For Security Operations</title>
			<pubDate><![CDATA[Tue, 12 May 2026 08:58:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/openai-launches-daybreak-for-ai-powered-vulnerability-detection-and-patch-validation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/openai-launches-daybreak-for-ai-powered-vulnerability-detection-and-patch-validation/]]></link>
			<title>OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation</title>
			<pubDate><![CDATA[Tue, 12 May 2026 08:51:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/instructure-reaches-ransom-agreement-with-shinyhunters-to-stop-3-65tb-canvas-leak/]]></guid>
			<link><![CDATA[https://fxtechnology.org/instructure-reaches-ransom-agreement-with-shinyhunters-to-stop-3-65tb-canvas-leak/]]></link>
			<title>Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak</title>
			<pubDate><![CDATA[Tue, 12 May 2026 07:50:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/arms-software-chief-sees-human-language-as-the-new-way-to-program/]]></guid>
			<link><![CDATA[https://fxtechnology.org/arms-software-chief-sees-human-language-as-the-new-way-to-program/]]></link>
			<title>Arm’s software chief sees human language as the new way to program</title>
			<pubDate><![CDATA[Tue, 12 May 2026 07:31:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/reviewing-the-trends-in-ransomware-attacks-in-2026/]]></guid>
			<link><![CDATA[https://fxtechnology.org/reviewing-the-trends-in-ransomware-attacks-in-2026/]]></link>
			<title>Reviewing the trends in ransomware attacks in 2026</title>
			<pubDate><![CDATA[Tue, 12 May 2026 07:04:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fcc-moves-to-impose-know-your-customer-rules-for-voip-providers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fcc-moves-to-impose-know-your-customer-rules-for-voip-providers/]]></link>
			<title>FCC moves to impose “Know Your Customer” rules for VoIP providers</title>
			<pubDate><![CDATA[Tue, 12 May 2026 05:55:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-is-reshaping-software-supply-chain-risk/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-is-reshaping-software-supply-chain-risk/]]></link>
			<title>AI Is Reshaping Software Supply Chain Risk</title>
			<pubDate><![CDATA[Tue, 12 May 2026 04:54:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-to-mitigate-the-security-and-privacy-risks-of-smart-glasses/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-to-mitigate-the-security-and-privacy-risks-of-smart-glasses/]]></link>
			<title>How to mitigate the security and privacy risks of smart glasses</title>
			<pubDate><![CDATA[Tue, 12 May 2026 04:38:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-cybersecurity-industry-coalition-aims-to-lead-us-critical-infrastructure-protection/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-cybersecurity-industry-coalition-aims-to-lead-us-critical-infrastructure-protection/]]></link>
			<title>New cybersecurity industry coalition aims to lead US critical infrastructure protection</title>
			<pubDate><![CDATA[Tue, 12 May 2026 03:53:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/linux-kernel-maintainers-suggest-a-kill-switch-to-protect-systems-until-a-zero-day-vulnerability-is-patched/]]></guid>
			<link><![CDATA[https://fxtechnology.org/linux-kernel-maintainers-suggest-a-kill-switch-to-protect-systems-until-a-zero-day-vulnerability-is-patched/]]></link>
			<title>Linux kernel maintainers suggest a ‘kill switch’ to protect systems until a zero-day vulnerability is patched</title>
			<pubDate><![CDATA[Tue, 12 May 2026 01:06:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/california-hits-gm-with-record-12-75m-fine-for-selling-driver-location-data/]]></guid>
			<link><![CDATA[https://fxtechnology.org/california-hits-gm-with-record-12-75m-fine-for-selling-driver-location-data/]]></link>
			<title>California hits GM with record $12.75M fine for selling driver location data</title>
			<pubDate><![CDATA[Mon, 11 May 2026 23:49:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/claude-code-mcp-attack-enables-persistent-token-theft/]]></guid>
			<link><![CDATA[https://fxtechnology.org/claude-code-mcp-attack-enables-persistent-token-theft/]]></link>
			<title>Claude Code MCP Attack Enables Persistent Token Theft</title>
			<pubDate><![CDATA[Mon, 11 May 2026 22:48:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/tech-job-postings-hit-three-year-high-as-ai-demand-fuels-hiring-rebound/]]></guid>
			<link><![CDATA[https://fxtechnology.org/tech-job-postings-hit-three-year-high-as-ai-demand-fuels-hiring-rebound/]]></link>
			<title>Tech job postings hit three-year high as AI demand fuels hiring rebound</title>
			<pubDate><![CDATA[Mon, 11 May 2026 22:03:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-european-commission-eyes-rules-to-restrict-us-cloud-services-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-european-commission-eyes-rules-to-restrict-us-cloud-services-computerworld/]]></link>
			<title>The European Commission eyes rules to restrict US cloud services – Computerworld</title>
			<pubDate><![CDATA[Mon, 11 May 2026 21:48:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-used-to-develop-working-zero-day-exploit-researchers-warn/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-used-to-develop-working-zero-day-exploit-researchers-warn/]]></link>
			<title>AI used to develop working zero-day exploit, researchers warn</title>
			<pubDate><![CDATA[Mon, 11 May 2026 21:46:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/imf-warns-of-the-potential-for-ai-attacks-on-global-financial-systems-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/imf-warns-of-the-potential-for-ai-attacks-on-global-financial-systems-computerworld/]]></link>
			<title>IMF warns of the potential for AI attacks on global financial systems – Computerworld</title>
			<pubDate><![CDATA[Mon, 11 May 2026 21:22:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hpe-memory-server-targets-compute-heavy-and-agentic-ai-workloads/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hpe-memory-server-targets-compute-heavy-and-agentic-ai-workloads/]]></link>
			<title>HPE memory server targets compute-heavy and agentic AI workloads</title>
			<pubDate><![CDATA[Mon, 11 May 2026 20:00:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/teampcp-compromises-checkmarx-jenkins-ast-plugin-weeks-after-kics-supply-chain-attack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/teampcp-compromises-checkmarx-jenkins-ast-plugin-weeks-after-kics-supply-chain-attack/]]></link>
			<title>TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack</title>
			<pubDate><![CDATA[Mon, 11 May 2026 19:41:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/pci-group-begins-work-on-new-spec-to-support-bandwidth-hungry-apps-like-ai-hpc/]]></guid>
			<link><![CDATA[https://fxtechnology.org/pci-group-begins-work-on-new-spec-to-support-bandwidth-hungry-apps-like-ai-hpc/]]></link>
			<title>PCI group begins work on new spec to support bandwidth-hungry apps like AI, HPC</title>
			<pubDate><![CDATA[Mon, 11 May 2026 18:59:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cpanel-cve-2026-41940-under-active-exploitation-to-deploy-filemanager-backdoor/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cpanel-cve-2026-41940-under-active-exploitation-to-deploy-filemanager-backdoor/]]></link>
			<title>cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor</title>
			<pubDate><![CDATA[Mon, 11 May 2026 18:35:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/googles-new-recaptcha-system-restricts-access-to-the-open-web/]]></guid>
			<link><![CDATA[https://fxtechnology.org/googles-new-recaptcha-system-restricts-access-to-the-open-web/]]></link>
			<title>Google’s new reCAPTCHA system restricts access to the open web</title>
			<pubDate><![CDATA[Mon, 11 May 2026 17:42:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/second-canvas-data-breach-causes-major-disruptions-for-schools-colleges/]]></guid>
			<link><![CDATA[https://fxtechnology.org/second-canvas-data-breach-causes-major-disruptions-for-schools-colleges/]]></link>
			<title>Second Canvas data breach causes major disruptions for schools, colleges</title>
			<pubDate><![CDATA[Mon, 11 May 2026 16:40:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hackers-used-ai-to-develop-first-known-zero-day-2fa-bypass-for-mass-exploitation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hackers-used-ai-to-develop-first-known-zero-day-2fa-bypass-for-mass-exploitation/]]></link>
			<title>Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation</title>
			<pubDate><![CDATA[Mon, 11 May 2026 16:33:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-needs-to-fix-admin-authentication-in-abm-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-needs-to-fix-admin-authentication-in-abm-computerworld/]]></link>
			<title>Apple needs to fix admin authentication in ABM – Computerworld</title>
			<pubDate><![CDATA[Mon, 11 May 2026 15:41:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/lyrie-ai-joins-first-batch-of-anthropics-cyber-verification-program/]]></guid>
			<link><![CDATA[https://fxtechnology.org/lyrie-ai-joins-first-batch-of-anthropics-cyber-verification-program/]]></link>
			<title>Lyrie.ai Joins First Batch of Anthropic’s Cyber Verification Program</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:53:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/linux-rootkit-macos-crypto-stealer-websocket-skimmers-and-more/]]></guid>
			<link><![CDATA[https://fxtechnology.org/linux-rootkit-macos-crypto-stealer-websocket-skimmers-and-more/]]></link>
			<title>Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:29:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/lyrie-ai-joins-first-batch-of-anthropics-cyber-verification-program-latest-hacking-news/]]></guid>
			<link><![CDATA[https://fxtechnology.org/lyrie-ai-joins-first-batch-of-anthropics-cyber-verification-program-latest-hacking-news/]]></link>
			<title>Lyrie.ai Joins First Batch of Anthropic’s Cyber Verification Program &#8211; Latest Hacking News</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:22:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/instructure-confirms-canvas-user-data-exposed-in-cyberattack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/instructure-confirms-canvas-user-data-exposed-in-cyberattack/]]></link>
			<title>Instructure confirms Canvas user data exposed in cyberattack</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:34:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/your-purple-team-isnt-purple-its-just-red-and-blue-in-the-same-room/]]></guid>
			<link><![CDATA[https://fxtechnology.org/your-purple-team-isnt-purple-its-just-red-and-blue-in-the-same-room/]]></link>
			<title>Your Purple Team Isn&#8217;t Purple — It&#8217;s Just Red and Blue in the Same Room</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:28:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/employers-get-picky-on-tech-skills-amid-ai-disruption-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/employers-get-picky-on-tech-skills-amid-ai-disruption-computerworld/]]></link>
			<title>Employers get picky on tech skills amid AI disruption – Computerworld</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:13:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/identity-is-the-new-perimeter-as-rapid-nhi-proliferation-threatens-visibility-and-control/]]></guid>
			<link><![CDATA[https://fxtechnology.org/identity-is-the-new-perimeter-as-rapid-nhi-proliferation-threatens-visibility-and-control/]]></link>
			<title>Identity is the new perimeter as rapid NHI proliferation threatens visibility and control</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:33:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-and-security-take-centre-stage/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-and-security-take-centre-stage/]]></link>
			<title>AI And Security Take Centre Stage</title>
			<pubDate><![CDATA[Mon, 11 May 2026 10:32:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/qa-quantum-physicist-sonia-fernandez-vidal-on-why-classical-computing-isnt-going-anywhere/]]></guid>
			<link><![CDATA[https://fxtechnology.org/qa-quantum-physicist-sonia-fernandez-vidal-on-why-classical-computing-isnt-going-anywhere/]]></link>
			<title>Q&#038;A: Quantum physicist Sonia Fernández-Vidal on why classical computing isn&#8217;t going anywhere</title>
			<pubDate><![CDATA[Mon, 11 May 2026 09:10:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fake-openai-privacy-filter-repo-hits-1-on-hugging-face-draws-244k-downloads/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fake-openai-privacy-filter-repo-hits-1-on-hugging-face-draws-244k-downloads/]]></link>
			<title>Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads</title>
			<pubDate><![CDATA[Mon, 11 May 2026 07:25:53 +0000]]></pubDate>
		</item>
				</channel>
</rss>
