<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 9, 2026 at 7:07 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Wed, 08 Apr 2026 06:57:17 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/olympic-games-fifa-world-cup-offer-huge-platforms-rich-cyberattack-surface/]]></guid>
			<link><![CDATA[https://fxtechnology.org/olympic-games-fifa-world-cup-offer-huge-platforms-rich-cyberattack-surface/]]></link>
			<title>Olympic Games, FIFA World Cup offer huge platforms, rich cyberattack surface</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 06:57:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nerc-is-actively-monitoring-the-grid-following-iran-linked-cyber-threat/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nerc-is-actively-monitoring-the-grid-following-iran-linked-cyber-threat/]]></link>
			<title>NERC is ‘actively monitoring the grid’ following Iran-linked cyber threat</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 18:39:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/what-is-ai-networking-how-it-automates-your-infrastructure-but-faces-challenges/]]></guid>
			<link><![CDATA[https://fxtechnology.org/what-is-ai-networking-how-it-automates-your-infrastructure-but-faces-challenges/]]></link>
			<title>What is AI networking? How it automates your infrastructure (but faces challenges)</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 18:03:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/neoclouds-gain-momentum-in-a-supply-constrained-world/]]></guid>
			<link><![CDATA[https://fxtechnology.org/neoclouds-gain-momentum-in-a-supply-constrained-world/]]></link>
			<title>Neoclouds gain momentum in a supply-constrained world</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 18:01:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/unc6783-turns-bpo-providers-into-cyberattack-gateways/]]></guid>
			<link><![CDATA[https://fxtechnology.org/unc6783-turns-bpo-providers-into-cyberattack-gateways/]]></link>
			<title>UNC6783 Turns BPO Providers Into Cyberattack Gateways</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 17:38:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallets/]]></guid>
			<link><![CDATA[https://fxtechnology.org/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallets/]]></link>
			<title>EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 17:28:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/chrome-vivaldi-and-the-challenge-of-changing-browsers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/chrome-vivaldi-and-the-challenge-of-changing-browsers/]]></link>
			<title>Chrome, Vivaldi, and the challenge of changing browsers</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 17:16:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/phishing-campaign-impersonates-palo-alto-networks-recruiters/]]></guid>
			<link><![CDATA[https://fxtechnology.org/phishing-campaign-impersonates-palo-alto-networks-recruiters/]]></link>
			<title>Phishing Campaign Impersonates Palo Alto Networks Recruiters</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 16:37:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/uat-10362-targets-taiwanese-ngos-with-lucidrook-malware-in-spear-phishing-campaigns/]]></guid>
			<link><![CDATA[https://fxtechnology.org/uat-10362-targets-taiwanese-ngos-with-lucidrook-malware-in-spear-phishing-campaigns/]]></link>
			<title>UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 16:31:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-new-m5-based-macbook-air-is-built-to-last-and-perform-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-new-m5-based-macbook-air-is-built-to-last-and-perform-computerworld/]]></link>
			<title>The new M5-based MacBook Air is built to last — and perform – Computerworld</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 16:14:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-worst-asus-best-for-laptop-repairability-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-worst-asus-best-for-laptop-repairability-computerworld/]]></link>
			<title>Apple worst, Asus best for laptop repairability – Computerworld</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:35:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/mallory-launches-ai-native-threat-intelligence-platform-turning-global-threat-data-into-prioritized-action-latest-hacking-news/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mallory-launches-ai-native-threat-intelligence-platform-turning-global-threat-data-into-prioritized-action-latest-hacking-news/]]></link>
			<title>Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action &#8211; Latest Hacking News</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:13:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/lumen-upstream-network-visibility-is-enterprise-securitys-new-front-line/]]></guid>
			<link><![CDATA[https://fxtechnology.org/lumen-upstream-network-visibility-is-enterprise-securitys-new-front-line/]]></link>
			<title>Lumen: Upstream network visibility is enterprise security&#8217;s new front line</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:11:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/yael-nardi-joins-minimus-as-chief-business-officer-to-head-growth-strategy/]]></guid>
			<link><![CDATA[https://fxtechnology.org/yael-nardi-joins-minimus-as-chief-business-officer-to-head-growth-strategy/]]></link>
			<title>Yael Nardi joins Minimus as Chief Business Officer to head growth strategy</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:56:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/us-court-refuses-to-stay-pentagons-supply-chain-risk-blacklisting-of-anthropic-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/us-court-refuses-to-stay-pentagons-supply-chain-risk-blacklisting-of-anthropic-computerworld/]]></link>
			<title>US court refuses to stay Pentagon’s ‘supply-chain risk’ blacklisting of Anthropic – Computerworld</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:35:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hackers-are-exploiting-adobe-reader-zero-day-flaw-to-steal-data/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hackers-are-exploiting-adobe-reader-zero-day-flaw-to-steal-data/]]></link>
			<title>Hackers are exploiting Adobe Reader zero-day flaw to steal data</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/]]></link>
			<title>Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:23:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nvidia-rubin-gpus-may-be-delayed-slowing-the-next-phase-of-ai-infrastructure/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nvidia-rubin-gpus-may-be-delayed-slowing-the-next-phase-of-ai-infrastructure/]]></link>
			<title>Nvidia Rubin GPUs may be delayed, slowing the next phase of AI infrastructure</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 12:55:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/grafanaghost-flaw-allows-silent-data-exfiltration/]]></guid>
			<link><![CDATA[https://fxtechnology.org/grafanaghost-flaw-allows-silent-data-exfiltration/]]></link>
			<title>GrafanaGhost Flaw Allows Silent Data Exfiltration</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 12:32:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/signature-healthcare-cyberattack-disrupts-brockton-hospital/]]></guid>
			<link><![CDATA[https://fxtechnology.org/signature-healthcare-cyberattack-disrupts-brockton-hospital/]]></link>
			<title>Signature Healthcare Cyberattack Disrupts Brockton Hospital</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 11:31:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/bitter-linked-hack-for-hire-campaign-targets-journalists-across-mena-region/]]></guid>
			<link><![CDATA[https://fxtechnology.org/bitter-linked-hack-for-hire-campaign-targets-journalists-across-mena-region/]]></link>
			<title>Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 11:25:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/adobe-reader-zero-day-exploited-via-malicious-pdfs-since-december-2025/]]></guid>
			<link><![CDATA[https://fxtechnology.org/adobe-reader-zero-day-exploited-via-malicious-pdfs-since-december-2025/]]></link>
			<title>Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 11:21:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/clipbanker-trojan-masquerades-as-proxifier-software/]]></guid>
			<link><![CDATA[https://fxtechnology.org/clipbanker-trojan-masquerades-as-proxifier-software/]]></link>
			<title>ClipBanker Trojan masquerades as Proxifier software</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:37:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/us-warns-of-iranian-hackers-targeting-plcs-across-critical-sectors/]]></guid>
			<link><![CDATA[https://fxtechnology.org/us-warns-of-iranian-hackers-targeting-plcs-across-critical-sectors/]]></link>
			<title>US warns of Iranian hackers targeting PLCs across critical sectors</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 08:28:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/bitcoin-depot-cyberattack-leads-to-3-6-million-crypto-theft/]]></guid>
			<link><![CDATA[https://fxtechnology.org/bitcoin-depot-cyberattack-leads-to-3-6-million-crypto-theft/]]></link>
			<title>Bitcoin Depot Cyberattack Leads To $3.6 Million Crypto Theft</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 07:26:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/authorities-disrupt-dns-hijacking-campaign-targeting-tp-link-routers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/authorities-disrupt-dns-hijacking-campaign-targeting-tp-link-routers/]]></link>
			<title>Authorities disrupt DNS hijacking campaign targeting TP-Link routers</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 04:23:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/api-security-risks-rise-as-ai-adoption-accelerates/]]></guid>
			<link><![CDATA[https://fxtechnology.org/api-security-risks-rise-as-ai-adoption-accelerates/]]></link>
			<title>API Security Risks Rise as AI Adoption Accelerates</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 03:22:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-suspends-veracrypt-and-wireguard-signing-accounts-blocking-windows-updates/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-suspends-veracrypt-and-wireguard-signing-accounts-blocking-windows-updates/]]></link>
			<title>Microsoft suspends VeraCrypt and WireGuard signing accounts, blocking Windows updates</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 22:15:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/iranian-threat-actors-target-u-s-critical-infrastructure/]]></guid>
			<link><![CDATA[https://fxtechnology.org/iranian-threat-actors-target-u-s-critical-infrastructure/]]></link>
			<title>Iranian Threat Actors Target U.S. Critical Infrastructure</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 21:13:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/us-operation-evicts-russia-from-hacked-soho-routers-used-to-breach-critical-infrastructure/]]></guid>
			<link><![CDATA[https://fxtechnology.org/us-operation-evicts-russia-from-hacked-soho-routers-used-to-breach-critical-infrastructure/]]></link>
			<title>US operation evicts Russia from hacked SOHO routers used to breach critical infrastructure</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 20:12:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/winona-county-cyberattack-prompts-state-response/]]></guid>
			<link><![CDATA[https://fxtechnology.org/winona-county-cyberattack-prompts-state-response/]]></link>
			<title>Winona County Cyberattack Prompts State Response</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 19:11:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/voice-phishing-is-a-growing-social-engineering-threat/]]></guid>
			<link><![CDATA[https://fxtechnology.org/voice-phishing-is-a-growing-social-engineering-threat/]]></link>
			<title>Voice Phishing is a Growing Social Engineering Threat</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:10:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/]]></link>
			<title>New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:05:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices/]]></guid>
			<link><![CDATA[https://fxtechnology.org/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices/]]></link>
			<title>Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:59:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/anthropic-launches-project-glasswing-after-its-new-ai-model-finds-thousands-of-zero-day-flaws/]]></guid>
			<link><![CDATA[https://fxtechnology.org/anthropic-launches-project-glasswing-after-its-new-ai-model-finds-thousands-of-zero-day-flaws/]]></link>
			<title>Anthropic launches ‘Project Glasswing’ after its new AI model finds thousands of zero-day flaws</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 15:06:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/10-chatgpt-prompts-l1-soc-analysts-can-use-in-their-daily-work/]]></guid>
			<link><![CDATA[https://fxtechnology.org/10-chatgpt-prompts-l1-soc-analysts-can-use-in-their-daily-work/]]></link>
			<title>10 ChatGPT Prompts L1 SOC Analysts Can Use in Their Daily Work</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 14:05:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/]]></link>
			<title>APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 13:55:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/iran-linked-hackers-target-water-energy-in-us-fbi-and-cisa-warn/]]></guid>
			<link><![CDATA[https://fxtechnology.org/iran-linked-hackers-target-water-energy-in-us-fbi-and-cisa-warn/]]></link>
			<title>Iran-linked hackers target water, energy in US, FBI and CISA warn</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 02:21:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/questions-raised-about-how-linkedin-uses-the-petabytes-of-data-it-collects-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/questions-raised-about-how-linkedin-uses-the-petabytes-of-data-it-collects-computerworld/]]></link>
			<title>Questions raised about how LinkedIn uses the petabytes of data it collects – Computerworld</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 01:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/threat-cluster-launches-extortion-campaign-using-social-engineering/]]></guid>
			<link><![CDATA[https://fxtechnology.org/threat-cluster-launches-extortion-campaign-using-social-engineering/]]></link>
			<title>Threat cluster launches extortion campaign using social engineering</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 13:05:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/flowise-rce-vulnerability-cve-2025-59528-exploited-now/]]></guid>
			<link><![CDATA[https://fxtechnology.org/flowise-rce-vulnerability-cve-2025-59528-exploited-now/]]></link>
			<title>Flowise RCE Vulnerability CVE-2025-59528 Exploited Now</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 12:03:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/z-ai-unveils-glm-5-1-enabling-ai-coding-agents-to-run-autonomously-for-hours/]]></guid>
			<link><![CDATA[https://fxtechnology.org/z-ai-unveils-glm-5-1-enabling-ai-coding-agents-to-run-autonomously-for-hours/]]></link>
			<title>Z.ai unveils GLM-5.1, enabling AI coding agents to  run autonomously for hours</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 10:34:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-android-dark-mode-upgrade-you-deserve-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-android-dark-mode-upgrade-you-deserve-computerworld/]]></link>
			<title>The Android dark mode upgrade you deserve – Computerworld</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 10:06:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems/]]></guid>
			<link><![CDATA[https://fxtechnology.org/anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems/]]></link>
			<title>Anthropic&#8217;s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 09:51:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/kaspersky-financial-threat-report-2025/]]></guid>
			<link><![CDATA[https://fxtechnology.org/kaspersky-financial-threat-report-2025/]]></link>
			<title>Kaspersky financial threat report 2025</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 09:08:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/disgruntled-researcher-drops-bluehammer-windows-zero-day-lpe-exploit/]]></guid>
			<link><![CDATA[https://fxtechnology.org/disgruntled-researcher-drops-bluehammer-windows-zero-day-lpe-exploit/]]></link>
			<title>Disgruntled researcher drops “BlueHammer” Windows zero-day LPE exploit</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 08:58:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/docker-flaw-cve-2026-34040-lets-attackers-bypass-security-controls-and-take-over-hosts/]]></guid>
			<link><![CDATA[https://fxtechnology.org/docker-flaw-cve-2026-34040-lets-attackers-bypass-security-controls-and-take-over-hosts/]]></link>
			<title>Docker Flaw (CVE-2026-34040) Lets Attackers Bypass Security Controls and Take Over Hosts</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 07:58:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust/]]></guid>
			<link><![CDATA[https://fxtechnology.org/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust/]]></link>
			<title>N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 07:52:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/as-iran-war-drags-on-idc-sees-worsening-tech-environment-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/as-iran-war-drags-on-idc-sees-worsening-tech-environment-computerworld/]]></link>
			<title>As Iran war drags on, IDC sees worsening tech environment – Computerworld</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 07:30:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fbi-disrupts-router-attack-network/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fbi-disrupts-router-attack-network/]]></link>
			<title>FBI Disrupts Router Attack Network</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 01:19:31 +0000]]></pubDate>
		</item>
				</channel>
</rss>
