<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 21, 2026 at 11:15 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Tue, 21 Apr 2026 22:55:51 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/this-sophisticated-scam-should-be-a-warning-to-all-companies/]]></guid>
			<link><![CDATA[https://fxtechnology.org/this-sophisticated-scam-should-be-a-warning-to-all-companies/]]></link>
			<title>This Sophisticated Scam Should Be a Warning To All Companies</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 22:55:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-zero-networks-is-closing-the-network-enforcement-gap-for-ai-agents/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-zero-networks-is-closing-the-network-enforcement-gap-for-ai-agents/]]></link>
			<title>How Zero Networks is closing the network enforcement gap for AI agents</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 21:08:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/scattered-spider-member-tylerb-pleads-guilty-krebs-on-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/scattered-spider-member-tylerb-pleads-guilty-krebs-on-security/]]></link>
			<title>‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty – Krebs on Security</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 20:53:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/67-of-android-apps-log-data-not-mentioned-in-their-privacy-policies/]]></guid>
			<link><![CDATA[https://fxtechnology.org/67-of-android-apps-log-data-not-mentioned-in-their-privacy-policies/]]></link>
			<title>67% of Android apps log data not mentioned in their privacy policies</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 19:51:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/you-can-now-test-and-compare-ai-models-on-linkedin-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/you-can-now-test-and-compare-ai-models-on-linkedin-computerworld/]]></link>
			<title>You can now test and compare AI models on LinkedIn – Computerworld</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 19:23:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/systembc-c2-server-reveals-1570-victims-in-the-gentlemen-ransomware-operation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/systembc-c2-server-reveals-1570-victims-in-the-gentlemen-ransomware-operation/]]></link>
			<title>SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 19:15:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/130k-users-compromised-by-stealtok-campaign-that-uses-fake-tiktok-downloaders/]]></guid>
			<link><![CDATA[https://fxtechnology.org/130k-users-compromised-by-stealtok-campaign-that-uses-fake-tiktok-downloaders/]]></link>
			<title>130K Users Compromised by StealTok Campaign That Uses Fake TikTok Downloaders </title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 18:50:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisa-urges-security-teams-to-view-environments-following-axios-compromise/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisa-urges-security-teams-to-view-environments-following-axios-compromise/]]></link>
			<title>CISA urges security teams to view environments following axios compromise</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 17:49:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ants-data-breach-impacts-user-personal-details-in-france/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ants-data-breach-impacts-user-personal-details-in-france/]]></link>
			<title>ANTS Data Breach Impacts User Personal Details In France</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 16:47:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/22-bridgebreak-flaws-expose-thousands-of-lantronix-and-silex-serial-to-ip-converters/]]></guid>
			<link><![CDATA[https://fxtechnology.org/22-bridgebreak-flaws-expose-thousands-of-lantronix-and-silex-serial-to-ip-converters/]]></link>
			<title>22 BRIDGE:BREAK Flaws Expose Thousands of Lantronix and Silex Serial-to-IP Converters</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 16:34:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/whatsapp-phishing-campaign-delivers-malware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/whatsapp-phishing-campaign-delivers-malware/]]></link>
			<title>WhatsApp Phishing Campaign Delivers Malware</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 15:46:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ransomware-negotiator-pleads-guilty-to-aiding-blackcat-attacks-in-2023/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ransomware-negotiator-pleads-guilty-to-aiding-blackcat-attacks-in-2023/]]></link>
			<title>Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 15:11:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/azure-sre-agent-flaw-lets-outsiders-silently-eavesdrop-on-enterprise-cloud-operations/]]></guid>
			<link><![CDATA[https://fxtechnology.org/azure-sre-agent-flaw-lets-outsiders-silently-eavesdrop-on-enterprise-cloud-operations/]]></link>
			<title>Azure SRE Agent flaw lets outsiders silently eavesdrop on enterprise cloud operations</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 12:58:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/uk-probes-telegram-and-other-chat-apps-over-child-safety-failures/]]></guid>
			<link><![CDATA[https://fxtechnology.org/uk-probes-telegram-and-other-chat-apps-over-child-safety-failures/]]></link>
			<title>UK probes Telegram and other chat apps over child safety failures</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 12:43:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/with-john-ternus-as-ceo-expect-apples-platforms-to-proliferate-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/with-john-ternus-as-ceo-expect-apples-platforms-to-proliferate-computerworld/]]></link>
			<title>With John Ternus as CEO, expect Apple’s platforms to proliferate – Computerworld</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 12:13:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/amazons-5b-anthropic-bet-is-really-about-compute-not-just-cash/]]></guid>
			<link><![CDATA[https://fxtechnology.org/amazons-5b-anthropic-bet-is-really-about-compute-not-just-cash/]]></link>
			<title>Amazon’s $5B Anthropic bet is really about compute, not just cash</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 11:57:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisa-adds-8-flaws-to-kev-catalog-cisco-catalyst-included/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisa-adds-8-flaws-to-kev-catalog-cisco-catalyst-included/]]></link>
			<title>CISA Adds 8 Flaws To KEV Catalog, Cisco Catalyst Included</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 11:42:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/google-patches-antigravity-ide-flaw-enabling-prompt-injection-code-execution/]]></guid>
			<link><![CDATA[https://fxtechnology.org/google-patches-antigravity-ide-flaw-enabling-prompt-injection-code-execution/]]></link>
			<title>Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 10:28:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/vercel-systems-targeted-after-third-party-tool-compromised/]]></guid>
			<link><![CDATA[https://fxtechnology.org/vercel-systems-targeted-after-third-party-tool-compromised/]]></link>
			<title>Vercel systems targeted after third-party tool compromised</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 07:38:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/bluesky-cyberattack-triggers-ddos-outage-no-data-breach/]]></guid>
			<link><![CDATA[https://fxtechnology.org/bluesky-cyberattack-triggers-ddos-outage-no-data-breach/]]></link>
			<title>Bluesky Cyberattack Triggers DDoS Outage, No Data Breach</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 06:36:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/what-the-ransom-note-wont-say/]]></guid>
			<link><![CDATA[https://fxtechnology.org/what-the-ransom-note-wont-say/]]></link>
			<title>What the ransom note won’t say</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 05:33:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apples-app-store-found-hosting-fakewallet-crypto-stealing-apps/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apples-app-store-found-hosting-fakewallet-crypto-stealing-apps/]]></link>
			<title>Apple’s App Store found hosting ‘FakeWallet’ crypto-stealing apps</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 03:31:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/vulnerability-exploitation-surges-often-precede-disclosure-offering-possible-early-warnings/]]></guid>
			<link><![CDATA[https://fxtechnology.org/vulnerability-exploitation-surges-often-precede-disclosure-offering-possible-early-warnings/]]></link>
			<title>Vulnerability exploitation surges often precede disclosure, offering possible early warnings</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 02:30:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-ise-vulnerabilities-enable-remote-code-execution/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-ise-vulnerabilities-enable-remote-code-execution/]]></link>
			<title>Cisco ISE Vulnerabilities Enable Remote Code Execution</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 01:28:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nist-scales-back-vulnerability-scoring-in-2026-as-cve-volume-surges/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nist-scales-back-vulnerability-scoring-in-2026-as-cve-volume-surges/]]></link>
			<title>NIST Scales Back Vulnerability Scoring in 2026 as CVE Volume Surges</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 21:23:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/stellantis-teams-with-microsoft-to-strengthen-digital-capabilities/]]></guid>
			<link><![CDATA[https://fxtechnology.org/stellantis-teams-with-microsoft-to-strengthen-digital-capabilities/]]></link>
			<title>Stellantis teams with Microsoft to strengthen digital capabilities</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 20:22:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cyber-security-council-alerts-on-public-file-data-risks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cyber-security-council-alerts-on-public-file-data-risks/]]></link>
			<title>Cyber Security Council Alerts On Public File Data Risks</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 19:20:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/global-ram-shortage-appears-set-to-continue-through-2027-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/global-ram-shortage-appears-set-to-continue-through-2027-computerworld/]]></link>
			<title>Global RAM shortage appears set to continue through 2027 – Computerworld</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 18:46:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/security-leaders-emphasize-need-for-workforce-education/]]></guid>
			<link><![CDATA[https://fxtechnology.org/security-leaders-emphasize-need-for-workforce-education/]]></link>
			<title>Security Leaders Emphasize Need for Workforce Education</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 18:17:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/is-this-where-apple-silicon-will-be-in-5-years-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/is-this-where-apple-silicon-will-be-in-5-years-computerworld/]]></link>
			<title>Is this where Apple Silicon will be in 5 years? – Computerworld</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 16:43:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/notion-pages-have-leaked-user-data-via-an-unauthenticated-api-since-2022/]]></guid>
			<link><![CDATA[https://fxtechnology.org/notion-pages-have-leaked-user-data-via-an-unauthenticated-api-since-2022/]]></link>
			<title>Notion pages have leaked user data via an unauthenticated API since 2022</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 15:13:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/vercel-confirms-security-incident-as-threat-actor-claims-stolen-data-for-sale/]]></guid>
			<link><![CDATA[https://fxtechnology.org/vercel-confirms-security-incident-as-threat-actor-claims-stolen-data-for-sale/]]></link>
			<title>Vercel Confirms Security Incident as Threat Actor Claims Stolen Data for Sale</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 14:10:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/vercel-hack-push-fraud-qemu-abused-new-android-rats-emerge-more/]]></guid>
			<link><![CDATA[https://fxtechnology.org/vercel-hack-push-fraud-qemu-abused-new-android-rats-emerge-more/]]></link>
			<title>Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge &#038; More</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 14:02:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cloudflare-wants-to-rebuild-the-network-for-the-age-of-ai-agents/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cloudflare-wants-to-rebuild-the-network-for-the-age-of-ai-agents/]]></link>
			<title>Cloudflare wants to rebuild the network for the age of AI agents</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 13:21:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cbi-arrests-key-sim-card-supplier-of-a-cyber-fraud-network/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cbi-arrests-key-sim-card-supplier-of-a-cyber-fraud-network/]]></link>
			<title>CBI Arrests Key SIM Card Supplier Of A Cyber Fraud Network</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 13:10:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-fuels-wireless-talent-shortage/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-fuels-wireless-talent-shortage/]]></link>
			<title>AI fuels wireless talent shortage</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 11:18:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-ready-skills-are-not-what-you-think/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-ready-skills-are-not-what-you-think/]]></link>
			<title>AI-ready skills are not what you think</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 11:05:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/anthropic-mcp-design-vulnerability-enables-rce-threatening-ai-supply-chain/]]></guid>
			<link><![CDATA[https://fxtechnology.org/anthropic-mcp-design-vulnerability-enables-rce-threatening-ai-supply-chain/]]></link>
			<title>Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:57:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fakewallet-crypto-stealer-spreading-in-the-app-store/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fakewallet-crypto-stealer-spreading-in-the-app-store/]]></link>
			<title>FakeWallet crypto stealer spreading in the App Store</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 09:11:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/beyond-it-cybersecurity-is-a-strategic-business-risk/]]></guid>
			<link><![CDATA[https://fxtechnology.org/beyond-it-cybersecurity-is-a-strategic-business-risk/]]></link>
			<title>Beyond IT: Cybersecurity is a strategic business risk</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 09:02:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/vercel-security-incident-traced-to-third-party-ai-tool/]]></guid>
			<link><![CDATA[https://fxtechnology.org/vercel-security-incident-traced-to-third-party-ai-tool/]]></link>
			<title>Vercel Security Incident Traced To Third-Party AI Tool</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 08:00:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/researchers-detect-zionsiphon-malware-targeting-israeli-water-desalination-ot-systems/]]></guid>
			<link><![CDATA[https://fxtechnology.org/researchers-detect-zionsiphon-malware-targeting-israeli-water-desalination-ot-systems/]]></link>
			<title>Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:57:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/vercel-breach-tied-to-context-ai-hack-exposes-limited-customer-credentials/]]></guid>
			<link><![CDATA[https://fxtechnology.org/vercel-breach-tied-to-context-ai-hack-exposes-limited-customer-credentials/]]></link>
			<title>Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 04:17:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/vercel-confirms-security-incident-as-hackers-claim-to-sell-internal-access/]]></guid>
			<link><![CDATA[https://fxtechnology.org/vercel-confirms-security-incident-as-hackers-claim-to-sell-internal-access/]]></link>
			<title>Vercel confirms security incident as hackers claim to sell internal access</title>
			<pubDate><![CDATA[Sun, 19 Apr 2026 20:48:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/carnival-corporation-probes-data-breach-after-claims-of-8-7m-records-theft/]]></guid>
			<link><![CDATA[https://fxtechnology.org/carnival-corporation-probes-data-breach-after-claims-of-8-7m-records-theft/]]></link>
			<title>Carnival Corporation probes data breach after claims of 8.7M records theft</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 00:52:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/russian-gru-cyber-campaign-targets-western-logistics-firms/]]></guid>
			<link><![CDATA[https://fxtechnology.org/russian-gru-cyber-campaign-targets-western-logistics-firms/]]></link>
			<title>Russian GRU Cyber Campaign Targets Western Logistics Firms</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 15:03:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/italy-fines-national-postal-service-14-7m-over-invasive-data-collection/]]></guid>
			<link><![CDATA[https://fxtechnology.org/italy-fines-national-postal-service-14-7m-over-invasive-data-collection/]]></link>
			<title>Italy fines national postal service $14.7M over invasive data collection</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 22:24:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/amtrak-data-breach-exposed-information-of-2-1-million-accounts/]]></guid>
			<link><![CDATA[https://fxtechnology.org/amtrak-data-breach-exposed-information-of-2-1-million-accounts/]]></link>
			<title>Amtrak data breach exposed information of 2.1 million accounts</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 12:00:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/grinex-cyberattack-triggers-15m-crypto-wallet-breach/]]></guid>
			<link><![CDATA[https://fxtechnology.org/grinex-cyberattack-triggers-15m-crypto-wallet-breach/]]></link>
			<title>Grinex Cyberattack Triggers $15M Crypto Wallet Breach</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 10:59:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-ceo-tim-cook-stepping-down-to-be-replaced-by-john-ternus-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-ceo-tim-cook-stepping-down-to-be-replaced-by-john-ternus-computerworld/]]></link>
			<title>Apple CEO Tim Cook stepping down, to be replaced by John Ternus – Computerworld</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 21:25:03 +0000]]></pubDate>
		</item>
				</channel>
</rss>
