<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 4, 2026 at 4:31 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Sat, 02 May 2026 05:32:37 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/mozilla-warns-chromes-prompt-api-threatens-web-neutrality/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mozilla-warns-chromes-prompt-api-threatens-web-neutrality/]]></link>
			<title>Mozilla warns Chrome’s Prompt API threatens web neutrality</title>
			<pubDate><![CDATA[Sat, 02 May 2026 05:32:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-is-preparing-to-spend-but-not-necessarily-on-ai-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-is-preparing-to-spend-but-not-necessarily-on-ai-computerworld/]]></link>
			<title>Apple is preparing to spend, but not necessarily on AI – Computerworld</title>
			<pubDate><![CDATA[Mon, 04 May 2026 15:38:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/innovator-spotlight-puneet-bhatnagar-cyber-defense-magazine/]]></guid>
			<link><![CDATA[https://fxtechnology.org/innovator-spotlight-puneet-bhatnagar-cyber-defense-magazine/]]></link>
			<title>Innovator Spotlight: Puneet Bhatnagar &#8211; Cyber Defense Magazine</title>
			<pubDate><![CDATA[Mon, 04 May 2026 15:34:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/payroll-hijacking-attacks-are-targeting-canadian-employees/]]></guid>
			<link><![CDATA[https://fxtechnology.org/payroll-hijacking-attacks-are-targeting-canadian-employees/]]></link>
			<title>Payroll-Hijacking Attacks Are Targeting Canadian Employees</title>
			<pubDate><![CDATA[Sat, 02 May 2026 03:30:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/starlingx-12-0-is-right-on-time-for-mixed-hardware-edge-deployments/]]></guid>
			<link><![CDATA[https://fxtechnology.org/starlingx-12-0-is-right-on-time-for-mixed-hardware-edge-deployments/]]></link>
			<title>StarlingX 12.0 is right on time for mixed-hardware edge deployments</title>
			<pubDate><![CDATA[Mon, 04 May 2026 14:53:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisa-warns-copy-fail-linux-flaw-is-already-actively-exploited/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisa-warns-copy-fail-linux-flaw-is-already-actively-exploited/]]></link>
			<title>CISA warns “Copy Fail” Linux flaw is already actively exploited</title>
			<pubDate><![CDATA[Mon, 04 May 2026 14:33:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-powered-phishing-android-spying-tool-linux-exploit-github-rce-more/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-powered-phishing-android-spying-tool-linux-exploit-github-rce-more/]]></link>
			<title>AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE &#038; More</title>
			<pubDate><![CDATA[Mon, 04 May 2026 14:26:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/breaking-encryption-with-quantum-computing-interview-with-chris-peikert/]]></guid>
			<link><![CDATA[https://fxtechnology.org/breaking-encryption-with-quantum-computing-interview-with-chris-peikert/]]></link>
			<title>Breaking encryption with quantum computing — Interview with Chris Peikert</title>
			<pubDate><![CDATA[Sat, 02 May 2026 00:26:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-openclaws-agent-skills-become-an-attack-surface/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-openclaws-agent-skills-become-an-attack-surface/]]></link>
			<title>How OpenClaw’s agent skills become an attack surface</title>
			<pubDate><![CDATA[Mon, 04 May 2026 13:32:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-nerds-out-may-the-fourth-be-with-your-ai-assistant/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-nerds-out-may-the-fourth-be-with-your-ai-assistant/]]></link>
			<title>Cisco nerds out: May the Fourth be with your AI assistant</title>
			<pubDate><![CDATA[Mon, 04 May 2026 13:14:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/10-quick-productivity-tips-for-microsoft-365-mobile-apps-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/10-quick-productivity-tips-for-microsoft-365-mobile-apps-computerworld/]]></link>
			<title>10 quick productivity tips for Microsoft 365 mobile apps – Computerworld</title>
			<pubDate><![CDATA[Mon, 04 May 2026 12:35:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/rightscon-2026-cancelled-in-zambia-ahead-of-start/]]></guid>
			<link><![CDATA[https://fxtechnology.org/rightscon-2026-cancelled-in-zambia-ahead-of-start/]]></link>
			<title>RightsCon 2026 Cancelled In Zambia Ahead Of Start</title>
			<pubDate><![CDATA[Mon, 04 May 2026 12:31:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/silver-fox-deploys-abcdoor-malware-via-tax-themed-phishing-in-india-and-russia/]]></guid>
			<link><![CDATA[https://fxtechnology.org/silver-fox-deploys-abcdoor-malware-via-tax-themed-phishing-in-india-and-russia/]]></link>
			<title>Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia</title>
			<pubDate><![CDATA[Mon, 04 May 2026 12:28:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/massive-cpanel-campaign-compromised-44000-servers-worldwide/]]></guid>
			<link><![CDATA[https://fxtechnology.org/massive-cpanel-campaign-compromised-44000-servers-worldwide/]]></link>
			<title>Massive cPanel campaign compromised 44,000 servers worldwide</title>
			<pubDate><![CDATA[Sat, 02 May 2026 22:50:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/us-and-allies-urge-careful-adoption-of-ai-agents/]]></guid>
			<link><![CDATA[https://fxtechnology.org/us-and-allies-urge-careful-adoption-of-ai-agents/]]></link>
			<title>US and allies urge ‘careful adoption’ of AI agents</title>
			<pubDate><![CDATA[Sat, 02 May 2026 09:37:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/trellix-confirms-source-code-breach-with-unauthorized-repository-access/]]></guid>
			<link><![CDATA[https://fxtechnology.org/trellix-confirms-source-code-breach-with-unauthorized-repository-access/]]></link>
			<title>Trellix Confirms Source Code Breach With Unauthorized Repository Access</title>
			<pubDate><![CDATA[Sat, 02 May 2026 07:03:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/memory-shortage-and-cost-surge-push-enterprises-toward-the-cloud/]]></guid>
			<link><![CDATA[https://fxtechnology.org/memory-shortage-and-cost-surge-push-enterprises-toward-the-cloud/]]></link>
			<title>Memory shortage and cost surge push enterprises toward the cloud</title>
			<pubDate><![CDATA[Mon, 04 May 2026 12:14:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisa-adds-actively-exploited-linux-root-access-bug-cve-2026-31431-to-kev/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisa-adds-actively-exploited-linux-root-access-bug-cve-2026-31431-to-kev/]]></link>
			<title>CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV</title>
			<pubDate><![CDATA[Sun, 03 May 2026 06:51:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-year-of-ai-assisted-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-year-of-ai-assisted-attacks/]]></link>
			<title>The Year of AI-Assisted Attacks</title>
			<pubDate><![CDATA[Mon, 04 May 2026 12:07:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/phishing-campaigns-and-bec-attacks-through-amazon-ses/]]></guid>
			<link><![CDATA[https://fxtechnology.org/phishing-campaigns-and-bec-attacks-through-amazon-ses/]]></link>
			<title>Phishing campaigns and BEC attacks through Amazon SES</title>
			<pubDate><![CDATA[Mon, 04 May 2026 10:38:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/critical-cpanel-vulnerability-weaponized-to-target-government-and-msp-networks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/critical-cpanel-vulnerability-weaponized-to-target-government-and-msp-networks/]]></link>
			<title>Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks</title>
			<pubDate><![CDATA[Mon, 04 May 2026 10:05:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/operationalizing-cyber-resilience-a-practitioners-framework-for-real-world-security-constraints/]]></guid>
			<link><![CDATA[https://fxtechnology.org/operationalizing-cyber-resilience-a-practitioners-framework-for-real-world-security-constraints/]]></link>
			<title>Operationalizing Cyber Resilience: A Practitioner’s Framework for Real-World Security Constraints</title>
			<pubDate><![CDATA[Mon, 04 May 2026 09:26:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cyber-enabled-cargo-theft-costs-hit-725m-fbi-issues-alert/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cyber-enabled-cargo-theft-costs-hit-725m-fbi-issues-alert/]]></link>
			<title>Cyber-Enabled Cargo Theft Costs Hit $725M, FBI Issues Alert</title>
			<pubDate><![CDATA[Mon, 04 May 2026 07:24:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/pytorch-lightning-and-intercom-client-hit-in-supply-chain-attacks-to-steal-credentials/]]></guid>
			<link><![CDATA[https://fxtechnology.org/pytorch-lightning-and-intercom-client-hit-in-supply-chain-attacks-to-steal-credentials/]]></link>
			<title>PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials</title>
			<pubDate><![CDATA[Mon, 04 May 2026 07:21:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/relying-on-llms-is-nearly-impossible-when-ai-vendors-keep-changing-things-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/relying-on-llms-is-nearly-impossible-when-ai-vendors-keep-changing-things-computerworld/]]></link>
			<title>Relying on LLMs is nearly impossible when AI vendors keep changing things – Computerworld</title>
			<pubDate><![CDATA[Mon, 04 May 2026 07:09:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/global-crackdown-arrests-276-shuts-9-crypto-scam-centers-seizes-701m/]]></guid>
			<link><![CDATA[https://fxtechnology.org/global-crackdown-arrests-276-shuts-9-crypto-scam-centers-seizes-701m/]]></link>
			<title>Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M</title>
			<pubDate><![CDATA[Mon, 04 May 2026 06:00:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/preparing-for-hybrid-warfare-actions-to-take-when-the-cloud-goes-dark/]]></guid>
			<link><![CDATA[https://fxtechnology.org/preparing-for-hybrid-warfare-actions-to-take-when-the-cloud-goes-dark/]]></link>
			<title>Preparing For Hybrid Warfare: Actions To Take When The Cloud Goes Dark</title>
			<pubDate><![CDATA[Mon, 04 May 2026 04:21:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/innovator-spotlight-the-open-group/]]></guid>
			<link><![CDATA[https://fxtechnology.org/innovator-spotlight-the-open-group/]]></link>
			<title>Innovator Spotlight: The Open Group</title>
			<pubDate><![CDATA[Mon, 04 May 2026 00:16:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-agents-can-bypass-guardrails-and-put-credentials-at-risk-okta-study-finds-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-agents-can-bypass-guardrails-and-put-credentials-at-risk-okta-study-finds-computerworld/]]></link>
			<title>AI agents can bypass guardrails and put credentials at risk, Okta study finds – Computerworld</title>
			<pubDate><![CDATA[Fri, 01 May 2026 23:29:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/canonical-hit-by-sustained-ddos-attack-disrupting-ubuntu-services-worldwide/]]></guid>
			<link><![CDATA[https://fxtechnology.org/canonical-hit-by-sustained-ddos-attack-disrupting-ubuntu-services-worldwide/]]></link>
			<title>Canonical Hit by Sustained DDoS Attack, Disrupting Ubuntu Services Worldwide</title>
			<pubDate><![CDATA[Fri, 01 May 2026 23:25:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/white-house-questions-tech-industry-on-defensive-ai-use-cybersecurity-resilience/]]></guid>
			<link><![CDATA[https://fxtechnology.org/white-house-questions-tech-industry-on-defensive-ai-use-cybersecurity-resilience/]]></link>
			<title>White House questions tech industry on defensive AI use, cybersecurity resilience</title>
			<pubDate><![CDATA[Fri, 01 May 2026 22:24:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/your-knowbe4-fresh-content-updates-from-april-2026/]]></guid>
			<link><![CDATA[https://fxtechnology.org/your-knowbe4-fresh-content-updates-from-april-2026/]]></link>
			<title>Your KnowBe4 Fresh Content Updates from April 2026</title>
			<pubDate><![CDATA[Fri, 01 May 2026 21:23:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/windows-shell-spoofing-vulnerability-puts-sensitive-data-at-risk-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/windows-shell-spoofing-vulnerability-puts-sensitive-data-at-risk-computerworld/]]></link>
			<title>Windows shell spoofing vulnerability puts sensitive data at risk – Computerworld</title>
			<pubDate><![CDATA[Fri, 01 May 2026 20:26:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/extreme-networks-memory-advantage-wi-fi-7-and-competitive-flux-drive-momentum/]]></guid>
			<link><![CDATA[https://fxtechnology.org/extreme-networks-memory-advantage-wi-fi-7-and-competitive-flux-drive-momentum/]]></link>
			<title>Extreme Networks: Memory advantage, Wi-Fi 7 and competitive flux drive momentum</title>
			<pubDate><![CDATA[Fri, 01 May 2026 19:42:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/german-mps-advised-to-drop-signal-in-favor-of-wire-over-security-concerns/]]></guid>
			<link><![CDATA[https://fxtechnology.org/german-mps-advised-to-drop-signal-in-favor-of-wire-over-security-concerns/]]></link>
			<title>German MPs advised to drop Signal in favor of Wire over security concerns</title>
			<pubDate><![CDATA[Fri, 01 May 2026 18:20:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/30000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign/]]></guid>
			<link><![CDATA[https://fxtechnology.org/30000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign/]]></link>
			<title>30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign</title>
			<pubDate><![CDATA[Fri, 01 May 2026 18:10:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/scenes-from-the-great-data-center-revolt/]]></guid>
			<link><![CDATA[https://fxtechnology.org/scenes-from-the-great-data-center-revolt/]]></link>
			<title>Scenes from the great data center revolt</title>
			<pubDate><![CDATA[Fri, 01 May 2026 17:40:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/supply-chain-attacks-ai-security-and-major-breaches-define-this-week-in-cybersecurity-in-may-2026/]]></guid>
			<link><![CDATA[https://fxtechnology.org/supply-chain-attacks-ai-security-and-major-breaches-define-this-week-in-cybersecurity-in-may-2026/]]></link>
			<title>Supply Chain Attacks, AI Security, and Major Breaches Define This Week in Cybersecurity in May 2026</title>
			<pubDate><![CDATA[Fri, 01 May 2026 17:19:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/enterprise-spotlight-transforming-software-development-with-ai/]]></guid>
			<link><![CDATA[https://fxtechnology.org/enterprise-spotlight-transforming-software-development-with-ai/]]></link>
			<title>Enterprise Spotlight: Transforming software development with AI</title>
			<pubDate><![CDATA[Fri, 01 May 2026 16:40:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/as-email-phishing-evolves-malicious-attachments-decline-and-qr-codes-surge/]]></guid>
			<link><![CDATA[https://fxtechnology.org/as-email-phishing-evolves-malicious-attachments-decline-and-qr-codes-surge/]]></link>
			<title>As email phishing evolves, malicious attachments decline and QR codes surge</title>
			<pubDate><![CDATA[Fri, 01 May 2026 16:18:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cybercrime-groups-using-vishing-and-sso-abuse-in-rapid-saas-extortion-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cybercrime-groups-using-vishing-and-sso-abuse-in-rapid-saas-extortion-attacks/]]></link>
			<title>Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks</title>
			<pubDate><![CDATA[Fri, 01 May 2026 14:43:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/china-linked-hackers-target-asian-governments-nato-state-journalists-and-activists/]]></guid>
			<link><![CDATA[https://fxtechnology.org/china-linked-hackers-target-asian-governments-nato-state-journalists-and-activists/]]></link>
			<title>China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists</title>
			<pubDate><![CDATA[Fri, 01 May 2026 14:07:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-breaks-records-admits-it-cant-make-macs-fast-enough-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-breaks-records-admits-it-cant-make-macs-fast-enough-computerworld/]]></link>
			<title>Apple breaks records, admits it can’t make Macs fast enough – Computerworld</title>
			<pubDate><![CDATA[Fri, 01 May 2026 13:46:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/spotlight-report-transforming-software-development-with-ai/]]></guid>
			<link><![CDATA[https://fxtechnology.org/spotlight-report-transforming-software-development-with-ai/]]></link>
			<title>Spotlight report: Transforming software development with AI</title>
			<pubDate><![CDATA[Fri, 01 May 2026 12:17:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/utah-becomes-first-us-state-to-require-age-verification-for-vpn-use/]]></guid>
			<link><![CDATA[https://fxtechnology.org/utah-becomes-first-us-state-to-require-age-verification-for-vpn-use/]]></link>
			<title>Utah becomes first US state to require age verification for VPN use</title>
			<pubDate><![CDATA[Fri, 01 May 2026 12:13:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/poisoned-ruby-gems-and-go-modules-exploit-ci-pipelines-for-credential-theft/]]></guid>
			<link><![CDATA[https://fxtechnology.org/poisoned-ruby-gems-and-go-modules-exploit-ci-pipelines-for-credential-theft/]]></link>
			<title>Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft</title>
			<pubDate><![CDATA[Fri, 01 May 2026 12:04:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cybersecurity-breaches-ai-risks-2026/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cybersecurity-breaches-ai-risks-2026/]]></link>
			<title>Cybersecurity Breaches &#038; AI Risks 2026</title>
			<pubDate><![CDATA[Fri, 01 May 2026 11:12:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/25-great-uses-for-an-old-android-device-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/25-great-uses-for-an-old-android-device-computerworld/]]></link>
			<title>25 great uses for an old Android device – Computerworld</title>
			<pubDate><![CDATA[Fri, 01 May 2026 10:16:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/two-cybersecurity-professionals-get-4-year-sentences-in-blackcat-ransomware-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/two-cybersecurity-professionals-get-4-year-sentences-in-blackcat-ransomware-attacks/]]></link>
			<title>Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks</title>
			<pubDate><![CDATA[Fri, 01 May 2026 10:02:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-chatbots-need-deception-mode-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-chatbots-need-deception-mode-computerworld/]]></link>
			<title>AI chatbots need ‘deception mode’ – Computerworld</title>
			<pubDate><![CDATA[Fri, 01 May 2026 07:13:41 +0000]]></pubDate>
		</item>
				</channel>
</rss>
