<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 30, 2026 at 5:37 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Thu, 30 Apr 2026 16:44:15 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/pytorch-lightning-compromised-in-pypi-supply-chain-attack-to-steal-credentials/]]></guid>
			<link><![CDATA[https://fxtechnology.org/pytorch-lightning-compromised-in-pypi-supply-chain-attack-to-steal-credentials/]]></link>
			<title>PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 16:44:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-to-design-security-for-agentic-ai/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-to-design-security-for-agentic-ai/]]></link>
			<title>How to Design Security for Agentic AI</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 15:52:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/quera-claims-quantum-error-correction-breakthrough-with-2-to-1-qubit-ratio/]]></guid>
			<link><![CDATA[https://fxtechnology.org/quera-claims-quantum-error-correction-breakthrough-with-2-to-1-qubit-ratio/]]></link>
			<title>QuEra claims quantum error correction breakthrough with 2-to-1 qubit ratio</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 15:12:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/etherrat-distribution-spoofing-administrative-tools-via-github-facades/]]></guid>
			<link><![CDATA[https://fxtechnology.org/etherrat-distribution-spoofing-administrative-tools-via-github-facades/]]></link>
			<title>EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 14:41:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/sms-blaster-busts-openemr-flaws-600k-roblox-hacks-and-25-more-stories/]]></guid>
			<link><![CDATA[https://fxtechnology.org/sms-blaster-busts-openemr-flaws-600k-roblox-hacks-and-25-more-stories/]]></link>
			<title>SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 14:33:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hpe-expands-proliant-line-with-rugged-edge-servers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hpe-expands-proliant-line-with-rugged-edge-servers/]]></link>
			<title>HPE expands ProLiant line with rugged edge servers</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 14:10:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-reportedly-abandons-vision-pro-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-reportedly-abandons-vision-pro-computerworld/]]></link>
			<title>Apple reportedly abandons Vision Pro – Computerworld</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 13:56:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/critical-cpanel-zero-day-auth-bypass-exploited-since-february/]]></guid>
			<link><![CDATA[https://fxtechnology.org/critical-cpanel-zero-day-auth-bypass-exploited-since-february/]]></link>
			<title>Critical cPanel zero-day auth bypass exploited since February</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 12:49:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-python-backdoor-uses-tunneling-service-to-steal-browser-and-cloud-credentials/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-python-backdoor-uses-tunneling-service-to-steal-browser-and-cloud-credentials/]]></link>
			<title>New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 12:39:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/australia-flags-financial-sector-gaps/]]></guid>
			<link><![CDATA[https://fxtechnology.org/australia-flags-financial-sector-gaps/]]></link>
			<title>Australia Flags Financial Sector Gaps</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 11:48:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-venture-funding-to-shoot-up-this-year-as-bubble-looms-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-venture-funding-to-shoot-up-this-year-as-bubble-looms-computerworld/]]></link>
			<title>AI venture funding to shoot up this year as bubble looms – Computerworld</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 11:21:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-linux-copy-fail-vulnerability-enables-root-access-on-major-distributions/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-linux-copy-fail-vulnerability-enables-root-access-on-major-distributions/]]></link>
			<title>New Linux &#8216;Copy Fail&#8217; Vulnerability Enables Root Access on Major Distributions</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:29:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/deconstructing-the-data-center-a-massive-and-massively-liberating-project/]]></guid>
			<link><![CDATA[https://fxtechnology.org/deconstructing-the-data-center-a-massive-and-massively-liberating-project/]]></link>
			<title>Deconstructing the data center: A massive (and massively liberating) project</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:05:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/chipsoft-cyberattack-patient-data-reportedly-destroyed/]]></guid>
			<link><![CDATA[https://fxtechnology.org/chipsoft-cyberattack-patient-data-reportedly-destroyed/]]></link>
			<title>ChipSoft Cyberattack: Patient Data Reportedly Destroyed</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 07:43:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/google-fixes-cvss-10-gemini-cli-ci-rce-and-cursor-flaws-enable-code-execution/]]></guid>
			<link><![CDATA[https://fxtechnology.org/google-fixes-cvss-10-gemini-cli-ci-rce-and-cursor-flaws-enable-code-execution/]]></link>
			<title>Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 07:26:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/scaling-up-a-tech-startup-in-europe-is-hard-eu-inc-aims-to-help-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/scaling-up-a-tech-startup-in-europe-is-hard-eu-inc-aims-to-help-computerworld/]]></link>
			<title>Scaling up a tech startup in Europe is hard — &#8216;EU Inc.&#8217; aims to help – Computerworld</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 07:15:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/analyzing-the-silver-fox-tax-campaign-and-the-new-abcdoor-backdoor/]]></guid>
			<link><![CDATA[https://fxtechnology.org/analyzing-the-silver-fox-tax-campaign-and-the-new-abcdoor-backdoor/]]></link>
			<title>Analyzing the Silver Fox tax campaign and the new ABCDoor backdoor</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 07:05:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/github-flaw-enables-remote-code-execution-with-a-single-git-push/]]></guid>
			<link><![CDATA[https://fxtechnology.org/github-flaw-enables-remote-code-execution-with-a-single-git-push/]]></link>
			<title>GitHub Flaw Enables Remote Code Execution With a Single Git Push</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 03:38:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/google-appsheet-abused-to-compromise-30000-facebook-accounts/]]></guid>
			<link><![CDATA[https://fxtechnology.org/google-appsheet-abused-to-compromise-30000-facebook-accounts/]]></link>
			<title>Google AppSheet abused to compromise 30,000 Facebook accounts</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 23:34:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cve-2026-3854-rce-flaw-in-github-enterprise-server/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cve-2026-3854-rce-flaw-in-github-enterprise-server/]]></link>
			<title>CVE-2026-3854 RCE Flaw In GitHub Enterprise Server</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 02:37:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cpanel-vulnerability-exposes-servers-to-takeover/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cpanel-vulnerability-exposes-servers-to-takeover/]]></link>
			<title>cPanel Vulnerability Exposes Servers to Takeover </title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 22:34:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/state-cisos-losing-confidence-in-ability-to-manage-cyber-risks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/state-cisos-losing-confidence-in-ability-to-manage-cyber-risks/]]></link>
			<title>State CISOs losing confidence in ability to manage cyber risks</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 21:32:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-bolsters-security-ai-support-in-latest-sd-wan-release/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-bolsters-security-ai-support-in-latest-sd-wan-release/]]></link>
			<title>Cisco bolsters security, AI support in latest SD-WAN release</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 21:04:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hutt-city-council-phishing-attack-exposes-700-users/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hutt-city-council-phishing-attack-exposes-700-users/]]></link>
			<title>Hutt City Council Phishing Attack Exposes 700+ Users</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 20:31:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-era-of-chatbot-aiops-is-fading-as-agentic-ai-gains-traction/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-era-of-chatbot-aiops-is-fading-as-agentic-ai-gains-traction/]]></link>
			<title>The era of chatbot AIOps is fading as agentic AI gains traction</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 20:04:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/auvik-bets-agentic-ai-can-fill-the-networking-skills-gap/]]></guid>
			<link><![CDATA[https://fxtechnology.org/auvik-bets-agentic-ai-can-fill-the-networking-skills-gap/]]></link>
			<title>Auvik bets agentic AI can fill the networking skills gap</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 18:00:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-removes-adguards-trusttunnel-ios-app-from-russian-app-store/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-removes-adguards-trusttunnel-ios-app-from-russian-app-store/]]></link>
			<title>Apple removes AdGuard’s TrustTunnel iOS app from Russian App Store</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 17:27:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/sap-related-npm-packages-compromised-in-credential-stealing-supply-chain-attack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/sap-related-npm-packages-compromised-in-credential-stealing-supply-chain-attack/]]></link>
			<title>SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 17:18:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/clickup-data-leak-exposes-enterprise-emails-for-over-a-year/]]></guid>
			<link><![CDATA[https://fxtechnology.org/clickup-data-leak-exposes-enterprise-emails-for-over-a-year/]]></link>
			<title>ClickUp Data Leak Exposes Enterprise Emails for Over a Year </title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 16:27:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-will-be-behind-on-ai-until-it-isnt-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-will-be-behind-on-ai-until-it-isnt-computerworld/]]></link>
			<title>Apple will be behind on AI — until it isn’t – Computerworld</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 15:58:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisa-adds-microsoft-connectwise-vulnerabilities-to-active-exploitation-catalog/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisa-adds-microsoft-connectwise-vulnerabilities-to-active-exploitation-catalog/]]></link>
			<title>CISA adds Microsoft, ConnectWise vulnerabilities to active exploitation catalog</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 15:26:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-firms-and-rats/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-firms-and-rats/]]></link>
			<title>New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 15:15:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/iocta-2026-report-warns-of-ai-driven-cybercrime/]]></guid>
			<link><![CDATA[https://fxtechnology.org/iocta-2026-report-warns-of-ai-driven-cybercrime/]]></link>
			<title>IOCTA 2026 Report Warns Of AI-Driven Cybercrime</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 14:25:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/phishing-attacks-target-executives-via-microsoft-teams/]]></guid>
			<link><![CDATA[https://fxtechnology.org/phishing-attacks-target-executives-via-microsoft-teams/]]></link>
			<title>Phishing Attacks Target Executives via Microsoft Teams</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 13:24:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/eu-lawmakers-fail-to-agree-on-watered-down-ai-act-talks-pushed-to-may-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/eu-lawmakers-fail-to-agree-on-watered-down-ai-act-talks-pushed-to-may-computerworld/]]></link>
			<title>EU lawmakers fail to agree on watered-down AI Act, talks pushed to May – Computerworld</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 12:55:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/6-best-intrusion-detection-prevention-systems/]]></guid>
			<link><![CDATA[https://fxtechnology.org/6-best-intrusion-detection-prevention-systems/]]></link>
			<title>6 Best Intrusion Detection &#038; Prevention Systems</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:21:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/critical-cpanel-authentication-vulnerability-identified-update-your-server-immediately/]]></guid>
			<link><![CDATA[https://fxtechnology.org/critical-cpanel-authentication-vulnerability-identified-update-your-server-immediately/]]></link>
			<title>Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 10:05:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/android-reminders-reinvented-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/android-reminders-reinvented-computerworld/]]></link>
			<title>Android reminders, reinvented – Computerworld</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 09:53:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cert-in-warns-msmes-of-rising-ai-cyberattack-risks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cert-in-warns-msmes-of-rising-ai-cyberattack-risks/]]></link>
			<title>CERT-In Warns MSMEs Of Rising AI Cyberattack Risks</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 09:20:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisa-adds-actively-exploited-connectwise-and-windows-flaws-to-kev/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisa-adds-actively-exploited-connectwise-and-windows-flaws-to-kev/]]></link>
			<title>CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 09:04:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/whos-the-better-ceo-apples-tim-cook-or-microsofts-satya-nadella-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/whos-the-better-ceo-apples-tim-cook-or-microsofts-satya-nadella-computerworld/]]></link>
			<title>Who’s the better CEO, Apple’s Tim Cook or Microsoft’s Satya Nadella? – Computerworld</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 07:24:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/litellm-cve-2026-42208-sql-injection-exploited-within-36-hours-of-disclosure/]]></guid>
			<link><![CDATA[https://fxtechnology.org/litellm-cve-2026-42208-sql-injection-exploited-within-36-hours-of-disclosure/]]></link>
			<title>LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 05:44:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/best-ai-deepfake-and-scam-detection-tools-for-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/best-ai-deepfake-and-scam-detection-tools-for-security/]]></link>
			<title>Best AI Deepfake and Scam Detection Tools for Security</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 05:15:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/clickup-disclosed-feature-flag-misconfiguration-exposed-893-email-addresses/]]></guid>
			<link><![CDATA[https://fxtechnology.org/clickup-disclosed-feature-flag-misconfiguration-exposed-893-email-addresses/]]></link>
			<title>ClickUp Disclosed Feature Flag Misconfiguration Exposed 893 Email Addresses</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 04:13:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cpanel-cve-2026-41940-auth-bypass-flaw-patch-now-fast/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cpanel-cve-2026-41940-auth-bypass-flaw-patch-now-fast/]]></link>
			<title>CPanel CVE-2026-41940 Auth Bypass Flaw: Patch Now Fast!</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 16:53:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/aws-unveils-trio-of-key-ai-strategy-announcements/]]></guid>
			<link><![CDATA[https://fxtechnology.org/aws-unveils-trio-of-key-ai-strategy-announcements/]]></link>
			<title>AWS unveils trio of key AI strategy announcements</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 02:19:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/sas-makes-ai-governance-the-centerpiece-of-its-agent-strategy-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/sas-makes-ai-governance-the-centerpiece-of-its-agent-strategy-computerworld/]]></link>
			<title>SAS makes AI governance the centerpiece of its agent strategy – Computerworld</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 01:46:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/signal-to-roll-out-anti-phishing-safeguards-following-account-takeovers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/signal-to-roll-out-anti-phishing-safeguards-following-account-takeovers/]]></link>
			<title>Signal to roll out anti-phishing safeguards following account takeovers</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 01:09:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/7-best-network-security-tools-to-use/]]></guid>
			<link><![CDATA[https://fxtechnology.org/7-best-network-security-tools-to-use/]]></link>
			<title>7 Best Network Security Tools to Use</title>
			<pubDate><![CDATA[Wed, 29 Apr 2026 00:08:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/gartner-sees-untamed-growth-in-agentic-ai-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/gartner-sees-untamed-growth-in-agentic-ai-computerworld/]]></link>
			<title>Gartner sees untamed growth in agentic AI – Computerworld</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 17:26:28 +0000]]></pubDate>
		</item>
				</channel>
</rss>
