<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 11, 2026 at 8:52 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Sat, 09 May 2026 04:32:45 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/world-password-day-2026-why-strong-passwords-alone-are-no-longer-enough/]]></guid>
			<link><![CDATA[https://fxtechnology.org/world-password-day-2026-why-strong-passwords-alone-are-no-longer-enough/]]></link>
			<title>World Password Day 2026: Why Strong Passwords Alone Are No Longer Enough</title>
			<pubDate><![CDATA[Sat, 09 May 2026 04:32:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hpe-memory-server-targets-compute-heavy-and-agentic-ai-workloads/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hpe-memory-server-targets-compute-heavy-and-agentic-ai-workloads/]]></link>
			<title>HPE memory server targets compute-heavy and agentic AI workloads</title>
			<pubDate><![CDATA[Mon, 11 May 2026 20:00:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/teampcp-compromises-checkmarx-jenkins-ast-plugin-weeks-after-kics-supply-chain-attack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/teampcp-compromises-checkmarx-jenkins-ast-plugin-weeks-after-kics-supply-chain-attack/]]></link>
			<title>TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack</title>
			<pubDate><![CDATA[Mon, 11 May 2026 19:41:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/anthropics-claude-used-in-attempted-compromise-of-mexican-water-utility/]]></guid>
			<link><![CDATA[https://fxtechnology.org/anthropics-claude-used-in-attempted-compromise-of-mexican-water-utility/]]></link>
			<title>Anthropic’s Claude used in attempted compromise of Mexican water utility</title>
			<pubDate><![CDATA[Sat, 09 May 2026 03:31:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/pci-group-begins-work-on-new-spec-to-support-bandwidth-hungry-apps-like-ai-hpc/]]></guid>
			<link><![CDATA[https://fxtechnology.org/pci-group-begins-work-on-new-spec-to-support-bandwidth-hungry-apps-like-ai-hpc/]]></link>
			<title>PCI group begins work on new spec to support bandwidth-hungry apps like AI, HPC</title>
			<pubDate><![CDATA[Mon, 11 May 2026 18:59:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cpanel-cve-2026-41940-under-active-exploitation-to-deploy-filemanager-backdoor/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cpanel-cve-2026-41940-under-active-exploitation-to-deploy-filemanager-backdoor/]]></link>
			<title>cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor</title>
			<pubDate><![CDATA[Mon, 11 May 2026 18:35:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/googles-new-recaptcha-system-restricts-access-to-the-open-web/]]></guid>
			<link><![CDATA[https://fxtechnology.org/googles-new-recaptcha-system-restricts-access-to-the-open-web/]]></link>
			<title>Google’s new reCAPTCHA system restricts access to the open web</title>
			<pubDate><![CDATA[Mon, 11 May 2026 17:42:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-act-malware-fbi-cyber-alerts/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-act-malware-fbi-cyber-alerts/]]></link>
			<title>AI Act, Malware &#038; FBI Cyber Alerts</title>
			<pubDate><![CDATA[Sat, 09 May 2026 02:30:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/second-canvas-data-breach-causes-major-disruptions-for-schools-colleges/]]></guid>
			<link><![CDATA[https://fxtechnology.org/second-canvas-data-breach-causes-major-disruptions-for-schools-colleges/]]></link>
			<title>Second Canvas data breach causes major disruptions for schools, colleges</title>
			<pubDate><![CDATA[Mon, 11 May 2026 16:40:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hackers-used-ai-to-develop-first-known-zero-day-2fa-bypass-for-mass-exploitation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hackers-used-ai-to-develop-first-known-zero-day-2fa-bypass-for-mass-exploitation/]]></link>
			<title>Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation</title>
			<pubDate><![CDATA[Mon, 11 May 2026 16:33:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-needs-to-fix-admin-authentication-in-abm-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-needs-to-fix-admin-authentication-in-abm-computerworld/]]></link>
			<title>Apple needs to fix admin authentication in ABM – Computerworld</title>
			<pubDate><![CDATA[Mon, 11 May 2026 15:41:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/lyrie-ai-joins-first-batch-of-anthropics-cyber-verification-program/]]></guid>
			<link><![CDATA[https://fxtechnology.org/lyrie-ai-joins-first-batch-of-anthropics-cyber-verification-program/]]></link>
			<title>Lyrie.ai Joins First Batch of Anthropic’s Cyber Verification Program</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:53:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fighting-fire-with-fire-future-proofing-the-cybersecurity-workforce-with-ai/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fighting-fire-with-fire-future-proofing-the-cybersecurity-workforce-with-ai/]]></link>
			<title>Fighting Fire With Fire: Future-Proofing The Cybersecurity Workforce With AI</title>
			<pubDate><![CDATA[Sun, 10 May 2026 19:14:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/linux-rootkit-macos-crypto-stealer-websocket-skimmers-and-more/]]></guid>
			<link><![CDATA[https://fxtechnology.org/linux-rootkit-macos-crypto-stealer-websocket-skimmers-and-more/]]></link>
			<title>Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:29:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/instructure-confirms-canvas-user-data-exposed-in-cyberattack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/instructure-confirms-canvas-user-data-exposed-in-cyberattack/]]></link>
			<title>Instructure confirms Canvas user data exposed in cyberattack</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:34:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/innovator-spotlight-lineaje-cyber-defense-magazine/]]></guid>
			<link><![CDATA[https://fxtechnology.org/innovator-spotlight-lineaje-cyber-defense-magazine/]]></link>
			<title>Innovator Spotlight: Lineaje &#8211; Cyber Defense Magazine</title>
			<pubDate><![CDATA[Sun, 10 May 2026 02:56:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/your-purple-team-isnt-purple-its-just-red-and-blue-in-the-same-room/]]></guid>
			<link><![CDATA[https://fxtechnology.org/your-purple-team-isnt-purple-its-just-red-and-blue-in-the-same-room/]]></link>
			<title>Your Purple Team Isn&#8217;t Purple — It&#8217;s Just Red and Blue in the Same Room</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:28:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/salesforce-sfmc-vulnerability-exposed-email-data-risks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/salesforce-sfmc-vulnerability-exposed-email-data-risks/]]></link>
			<title>Salesforce SFMC Vulnerability Exposed Email Data Risks</title>
			<pubDate><![CDATA[Sat, 09 May 2026 08:36:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cpanel-whm-release-fixes-for-three-new-vulnerabilities-patch-now/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cpanel-whm-release-fixes-for-three-new-vulnerabilities-patch-now/]]></link>
			<title>cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now</title>
			<pubDate><![CDATA[Sat, 09 May 2026 07:28:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/former-it-contractor-convicted-for-wiping-96-us-government-databases/]]></guid>
			<link><![CDATA[https://fxtechnology.org/former-it-contractor-convicted-for-wiping-96-us-government-databases/]]></link>
			<title>Former IT contractor convicted for wiping 96 US government databases</title>
			<pubDate><![CDATA[Sat, 09 May 2026 05:33:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/lyrie-ai-joins-first-batch-of-anthropics-cyber-verification-program-latest-hacking-news/]]></guid>
			<link><![CDATA[https://fxtechnology.org/lyrie-ai-joins-first-batch-of-anthropics-cyber-verification-program-latest-hacking-news/]]></link>
			<title>Lyrie.ai Joins First Batch of Anthropic’s Cyber Verification Program &#8211; Latest Hacking News</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:22:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/employers-get-picky-on-tech-skills-amid-ai-disruption-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/employers-get-picky-on-tech-skills-amid-ai-disruption-computerworld/]]></link>
			<title>Employers get picky on tech skills amid AI disruption – Computerworld</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:13:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ollama-out-of-bounds-read-vulnerability-allows-remote-process-memory-leak/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ollama-out-of-bounds-read-vulnerability-allows-remote-process-memory-leak/]]></link>
			<title>Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak</title>
			<pubDate><![CDATA[Sun, 10 May 2026 12:43:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/identity-is-the-new-perimeter-as-rapid-nhi-proliferation-threatens-visibility-and-control/]]></guid>
			<link><![CDATA[https://fxtechnology.org/identity-is-the-new-perimeter-as-rapid-nhi-proliferation-threatens-visibility-and-control/]]></link>
			<title>Identity is the new perimeter as rapid NHI proliferation threatens visibility and control</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:33:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-and-security-take-centre-stage/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-and-security-take-centre-stage/]]></link>
			<title>AI And Security Take Centre Stage</title>
			<pubDate><![CDATA[Mon, 11 May 2026 10:32:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/qa-quantum-physicist-sonia-fernandez-vidal-on-why-classical-computing-isnt-going-anywhere/]]></guid>
			<link><![CDATA[https://fxtechnology.org/qa-quantum-physicist-sonia-fernandez-vidal-on-why-classical-computing-isnt-going-anywhere/]]></link>
			<title>Q&#038;A: Quantum physicist Sonia Fernández-Vidal on why classical computing isn&#8217;t going anywhere</title>
			<pubDate><![CDATA[Mon, 11 May 2026 09:10:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fake-openai-privacy-filter-repo-hits-1-on-hugging-face-draws-244k-downloads/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fake-openai-privacy-filter-repo-hits-1-on-hugging-face-draws-244k-downloads/]]></link>
			<title>Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads</title>
			<pubDate><![CDATA[Mon, 11 May 2026 07:25:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/california-privacy-settlement-hits-gm-with-record-penalty/]]></guid>
			<link><![CDATA[https://fxtechnology.org/california-privacy-settlement-hits-gm-with-record-penalty/]]></link>
			<title>California Privacy Settlement Hits GM With Record Penalty</title>
			<pubDate><![CDATA[Mon, 11 May 2026 06:29:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-and-meta-warn-canadas-bill-c-22-forces-encryption-backdoors/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-and-meta-warn-canadas-bill-c-22-forces-encryption-backdoors/]]></link>
			<title>Apple and Meta warn Canada’s Bill C-22 forces encryption backdoors</title>
			<pubDate><![CDATA[Fri, 08 May 2026 23:27:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/critical-vulnerabilities-ai-risks-and-supply-chain-breaches-define-this-week-in-cybersecurity-may-2026/]]></guid>
			<link><![CDATA[https://fxtechnology.org/critical-vulnerabilities-ai-risks-and-supply-chain-breaches-define-this-week-in-cybersecurity-may-2026/]]></link>
			<title>Critical Vulnerabilities, AI Risks, and Supply Chain Breaches Define This Week in Cybersecurity May 2026</title>
			<pubDate><![CDATA[Fri, 08 May 2026 22:26:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/instructure-confirms-cybersecurity-incident-cybersecurity-dive/]]></guid>
			<link><![CDATA[https://fxtechnology.org/instructure-confirms-cybersecurity-incident-cybersecurity-dive/]]></link>
			<title>Instructure confirms cybersecurity incident | Cybersecurity Dive</title>
			<pubDate><![CDATA[Fri, 08 May 2026 21:25:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/dirty-frag-lpe-hits-linux-distributions-worldwide-hard/]]></guid>
			<link><![CDATA[https://fxtechnology.org/dirty-frag-lpe-hits-linux-distributions-worldwide-hard/]]></link>
			<title>Dirty Frag LPE Hits Linux Distributions Worldwide Hard</title>
			<pubDate><![CDATA[Fri, 08 May 2026 20:24:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/you-have-60-seconds-to-stop-the-breach-are-you-ready/]]></guid>
			<link><![CDATA[https://fxtechnology.org/you-have-60-seconds-to-stop-the-breach-are-you-ready/]]></link>
			<title>You Have 60 Seconds to Stop the Breach. Are You Ready?</title>
			<pubDate><![CDATA[Fri, 08 May 2026 19:23:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/tclbanker-banking-trojan-targets-financial-platforms-via-whatsapp-and-outlook-worms/]]></guid>
			<link><![CDATA[https://fxtechnology.org/tclbanker-banking-trojan-targets-financial-platforms-via-whatsapp-and-outlook-worms/]]></link>
			<title>TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms</title>
			<pubDate><![CDATA[Fri, 08 May 2026 19:21:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/why-vulnerability-scanning-is-not-penetration-testing-and-why-cisos-should-care/]]></guid>
			<link><![CDATA[https://fxtechnology.org/why-vulnerability-scanning-is-not-penetration-testing-and-why-cisos-should-care/]]></link>
			<title>Why Vulnerability Scanning Is Not Penetration Testing, And Why Cisos Should Care</title>
			<pubDate><![CDATA[Fri, 08 May 2026 17:22:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/eu-calls-vpns-a-loophole-that-needs-closing-in-age-verification-push/]]></guid>
			<link><![CDATA[https://fxtechnology.org/eu-calls-vpns-a-loophole-that-needs-closing-in-age-verification-push/]]></link>
			<title>EU calls VPNs “a loophole that needs closing” in age verification push</title>
			<pubDate><![CDATA[Fri, 08 May 2026 16:21:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-reveals-security-gaps-in-vision-language-models/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-reveals-security-gaps-in-vision-language-models/]]></link>
			<title>Cisco Reveals Security Gaps in Vision Language Models</title>
			<pubDate><![CDATA[Fri, 08 May 2026 15:19:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/openai-led-consortium-seeks-to-address-ai-processing-bottlenecks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/openai-led-consortium-seeks-to-address-ai-processing-bottlenecks/]]></link>
			<title>OpenAI-led consortium seeks to address AI processing bottlenecks</title>
			<pubDate><![CDATA[Fri, 08 May 2026 15:05:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/online-safety-act-exposes-age-verification-system-flaws/]]></guid>
			<link><![CDATA[https://fxtechnology.org/online-safety-act-exposes-age-verification-system-flaws/]]></link>
			<title>Online Safety Act Exposes Age Verification System Flaws</title>
			<pubDate><![CDATA[Fri, 08 May 2026 14:18:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/terminal-paste-trap-blocked-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/terminal-paste-trap-blocked-computerworld/]]></link>
			<title>Terminal paste trap blocked – Computerworld</title>
			<pubDate><![CDATA[Fri, 08 May 2026 14:05:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-geopolitical-impact-on-cybersecurity-in-africa/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-geopolitical-impact-on-cybersecurity-in-africa/]]></link>
			<title>The Geopolitical Impact on Cybersecurity in Africa</title>
			<pubDate><![CDATA[Fri, 08 May 2026 13:17:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/aws-hit-by-us-east-1-outage-after-data-center-thermal-event/]]></guid>
			<link><![CDATA[https://fxtechnology.org/aws-hit-by-us-east-1-outage-after-data-center-thermal-event/]]></link>
			<title>AWS hit by US-East-1 outage after data center thermal event</title>
			<pubDate><![CDATA[Fri, 08 May 2026 12:36:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/what-25m-alerts-reveal-about-low-severity-risk/]]></guid>
			<link><![CDATA[https://fxtechnology.org/what-25m-alerts-reveal-about-low-severity-risk/]]></link>
			<title>What 25M Alerts Reveal About Low-Severity Risk</title>
			<pubDate><![CDATA[Fri, 08 May 2026 11:12:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/canvas-outage-hits-thousands-of-universities-as-shinyhunters-threatens-leak/]]></guid>
			<link><![CDATA[https://fxtechnology.org/canvas-outage-hits-thousands-of-universities-as-shinyhunters-threatens-leak/]]></link>
			<title>Canvas outage hits thousands of universities as ShinyHunters threatens leak</title>
			<pubDate><![CDATA[Fri, 08 May 2026 10:14:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cloudz-rat-abuses-windows-phone-link-to-steal-otps/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cloudz-rat-abuses-windows-phone-link-to-steal-otps/]]></link>
			<title>CloudZ RAT Abuses Windows Phone Link to Steal OTPs</title>
			<pubDate><![CDATA[Fri, 08 May 2026 09:13:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-linux-pamdoora-backdoor-uses-pam-modules-to-steal-ssh-credentials/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-linux-pamdoora-backdoor-uses-pam-modules-to-steal-ssh-credentials/]]></link>
			<title>New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials</title>
			<pubDate><![CDATA[Fri, 08 May 2026 09:11:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-linux-pamdoora-backdoor-uses-pam-modules-to-steal-ssh-credentials-2/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-linux-pamdoora-backdoor-uses-pam-modules-to-steal-ssh-credentials-2/]]></link>
			<title>New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials</title>
			<pubDate><![CDATA[Fri, 08 May 2026 09:11:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cve-2025-68670-an-rce-vulnerability-in-the-xrdp-server/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cve-2025-68670-an-rce-vulnerability-in-the-xrdp-server/]]></link>
			<title>CVE-2025-68670: an RCE vulnerability in the xrdp server</title>
			<pubDate><![CDATA[Fri, 08 May 2026 08:20:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/eu-ai-act-deal-brings-nudifier-app-ban-and-rule-delays/]]></guid>
			<link><![CDATA[https://fxtechnology.org/eu-ai-act-deal-brings-nudifier-app-ban-and-rule-delays/]]></link>
			<title>EU AI Act Deal Brings Nudifier App Ban And Rule Delays</title>
			<pubDate><![CDATA[Fri, 08 May 2026 08:12:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fixing-trivial-passwords-is-as-easy-as-123456/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fixing-trivial-passwords-is-as-easy-as-123456/]]></link>
			<title>Fixing trivial passwords is as easy as 123456</title>
			<pubDate><![CDATA[Fri, 08 May 2026 08:03:41 +0000]]></pubDate>
		</item>
				</channel>
</rss>
