<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 9, 2026 at 7:48 am by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Thu, 07 May 2026 14:25:48 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/the-patient-zero-webinar-on-killing-stealth-breaches/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-patient-zero-webinar-on-killing-stealth-breaches/]]></link>
			<title>The &#8220;Patient Zero&#8221; Webinar on Killing Stealth Breaches</title>
			<pubDate><![CDATA[Thu, 07 May 2026 14:25:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cpanel-whm-release-fixes-for-three-new-vulnerabilities-patch-now/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cpanel-whm-release-fixes-for-three-new-vulnerabilities-patch-now/]]></link>
			<title>cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now</title>
			<pubDate><![CDATA[Sat, 09 May 2026 07:28:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/former-it-contractor-convicted-for-wiping-96-us-government-databases/]]></guid>
			<link><![CDATA[https://fxtechnology.org/former-it-contractor-convicted-for-wiping-96-us-government-databases/]]></link>
			<title>Former IT contractor convicted for wiping 96 US government databases</title>
			<pubDate><![CDATA[Sat, 09 May 2026 05:33:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/world-password-day-2026-why-strong-passwords-alone-are-no-longer-enough/]]></guid>
			<link><![CDATA[https://fxtechnology.org/world-password-day-2026-why-strong-passwords-alone-are-no-longer-enough/]]></link>
			<title>World Password Day 2026: Why Strong Passwords Alone Are No Longer Enough</title>
			<pubDate><![CDATA[Sat, 09 May 2026 04:32:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/anthropics-claude-used-in-attempted-compromise-of-mexican-water-utility/]]></guid>
			<link><![CDATA[https://fxtechnology.org/anthropics-claude-used-in-attempted-compromise-of-mexican-water-utility/]]></link>
			<title>Anthropic’s Claude used in attempted compromise of Mexican water utility</title>
			<pubDate><![CDATA[Sat, 09 May 2026 03:31:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-act-malware-fbi-cyber-alerts/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-act-malware-fbi-cyber-alerts/]]></link>
			<title>AI Act, Malware &#038; FBI Cyber Alerts</title>
			<pubDate><![CDATA[Sat, 09 May 2026 02:30:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-and-meta-warn-canadas-bill-c-22-forces-encryption-backdoors/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-and-meta-warn-canadas-bill-c-22-forces-encryption-backdoors/]]></link>
			<title>Apple and Meta warn Canada’s Bill C-22 forces encryption backdoors</title>
			<pubDate><![CDATA[Fri, 08 May 2026 23:27:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/critical-vulnerabilities-ai-risks-and-supply-chain-breaches-define-this-week-in-cybersecurity-may-2026/]]></guid>
			<link><![CDATA[https://fxtechnology.org/critical-vulnerabilities-ai-risks-and-supply-chain-breaches-define-this-week-in-cybersecurity-may-2026/]]></link>
			<title>Critical Vulnerabilities, AI Risks, and Supply Chain Breaches Define This Week in Cybersecurity May 2026</title>
			<pubDate><![CDATA[Fri, 08 May 2026 22:26:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/instructure-confirms-cybersecurity-incident-cybersecurity-dive/]]></guid>
			<link><![CDATA[https://fxtechnology.org/instructure-confirms-cybersecurity-incident-cybersecurity-dive/]]></link>
			<title>Instructure confirms cybersecurity incident | Cybersecurity Dive</title>
			<pubDate><![CDATA[Fri, 08 May 2026 21:25:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/dirty-frag-lpe-hits-linux-distributions-worldwide-hard/]]></guid>
			<link><![CDATA[https://fxtechnology.org/dirty-frag-lpe-hits-linux-distributions-worldwide-hard/]]></link>
			<title>Dirty Frag LPE Hits Linux Distributions Worldwide Hard</title>
			<pubDate><![CDATA[Fri, 08 May 2026 20:24:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/you-have-60-seconds-to-stop-the-breach-are-you-ready/]]></guid>
			<link><![CDATA[https://fxtechnology.org/you-have-60-seconds-to-stop-the-breach-are-you-ready/]]></link>
			<title>You Have 60 Seconds to Stop the Breach. Are You Ready?</title>
			<pubDate><![CDATA[Fri, 08 May 2026 19:23:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/tclbanker-banking-trojan-targets-financial-platforms-via-whatsapp-and-outlook-worms/]]></guid>
			<link><![CDATA[https://fxtechnology.org/tclbanker-banking-trojan-targets-financial-platforms-via-whatsapp-and-outlook-worms/]]></link>
			<title>TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms</title>
			<pubDate><![CDATA[Fri, 08 May 2026 19:21:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/why-vulnerability-scanning-is-not-penetration-testing-and-why-cisos-should-care/]]></guid>
			<link><![CDATA[https://fxtechnology.org/why-vulnerability-scanning-is-not-penetration-testing-and-why-cisos-should-care/]]></link>
			<title>Why Vulnerability Scanning Is Not Penetration Testing, And Why Cisos Should Care</title>
			<pubDate><![CDATA[Fri, 08 May 2026 17:22:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/eu-calls-vpns-a-loophole-that-needs-closing-in-age-verification-push/]]></guid>
			<link><![CDATA[https://fxtechnology.org/eu-calls-vpns-a-loophole-that-needs-closing-in-age-verification-push/]]></link>
			<title>EU calls VPNs “a loophole that needs closing” in age verification push</title>
			<pubDate><![CDATA[Fri, 08 May 2026 16:21:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-reveals-security-gaps-in-vision-language-models/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-reveals-security-gaps-in-vision-language-models/]]></link>
			<title>Cisco Reveals Security Gaps in Vision Language Models</title>
			<pubDate><![CDATA[Fri, 08 May 2026 15:19:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/openai-led-consortium-seeks-to-address-ai-processing-bottlenecks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/openai-led-consortium-seeks-to-address-ai-processing-bottlenecks/]]></link>
			<title>OpenAI-led consortium seeks to address AI processing bottlenecks</title>
			<pubDate><![CDATA[Fri, 08 May 2026 15:05:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/online-safety-act-exposes-age-verification-system-flaws/]]></guid>
			<link><![CDATA[https://fxtechnology.org/online-safety-act-exposes-age-verification-system-flaws/]]></link>
			<title>Online Safety Act Exposes Age Verification System Flaws</title>
			<pubDate><![CDATA[Fri, 08 May 2026 14:18:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/terminal-paste-trap-blocked-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/terminal-paste-trap-blocked-computerworld/]]></link>
			<title>Terminal paste trap blocked – Computerworld</title>
			<pubDate><![CDATA[Fri, 08 May 2026 14:05:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-geopolitical-impact-on-cybersecurity-in-africa/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-geopolitical-impact-on-cybersecurity-in-africa/]]></link>
			<title>The Geopolitical Impact on Cybersecurity in Africa</title>
			<pubDate><![CDATA[Fri, 08 May 2026 13:17:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/aws-hit-by-us-east-1-outage-after-data-center-thermal-event/]]></guid>
			<link><![CDATA[https://fxtechnology.org/aws-hit-by-us-east-1-outage-after-data-center-thermal-event/]]></link>
			<title>AWS hit by US-East-1 outage after data center thermal event</title>
			<pubDate><![CDATA[Fri, 08 May 2026 12:36:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/what-25m-alerts-reveal-about-low-severity-risk/]]></guid>
			<link><![CDATA[https://fxtechnology.org/what-25m-alerts-reveal-about-low-severity-risk/]]></link>
			<title>What 25M Alerts Reveal About Low-Severity Risk</title>
			<pubDate><![CDATA[Fri, 08 May 2026 11:12:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/canvas-outage-hits-thousands-of-universities-as-shinyhunters-threatens-leak/]]></guid>
			<link><![CDATA[https://fxtechnology.org/canvas-outage-hits-thousands-of-universities-as-shinyhunters-threatens-leak/]]></link>
			<title>Canvas outage hits thousands of universities as ShinyHunters threatens leak</title>
			<pubDate><![CDATA[Fri, 08 May 2026 10:14:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cloudz-rat-abuses-windows-phone-link-to-steal-otps/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cloudz-rat-abuses-windows-phone-link-to-steal-otps/]]></link>
			<title>CloudZ RAT Abuses Windows Phone Link to Steal OTPs</title>
			<pubDate><![CDATA[Fri, 08 May 2026 09:13:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-linux-pamdoora-backdoor-uses-pam-modules-to-steal-ssh-credentials/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-linux-pamdoora-backdoor-uses-pam-modules-to-steal-ssh-credentials/]]></link>
			<title>New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials</title>
			<pubDate><![CDATA[Fri, 08 May 2026 09:11:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-linux-pamdoora-backdoor-uses-pam-modules-to-steal-ssh-credentials-2/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-linux-pamdoora-backdoor-uses-pam-modules-to-steal-ssh-credentials-2/]]></link>
			<title>New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials</title>
			<pubDate><![CDATA[Fri, 08 May 2026 09:11:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cve-2025-68670-an-rce-vulnerability-in-the-xrdp-server/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cve-2025-68670-an-rce-vulnerability-in-the-xrdp-server/]]></link>
			<title>CVE-2025-68670: an RCE vulnerability in the xrdp server</title>
			<pubDate><![CDATA[Fri, 08 May 2026 08:20:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/eu-ai-act-deal-brings-nudifier-app-ban-and-rule-delays/]]></guid>
			<link><![CDATA[https://fxtechnology.org/eu-ai-act-deal-brings-nudifier-app-ban-and-rule-delays/]]></link>
			<title>EU AI Act Deal Brings Nudifier App Ban And Rule Delays</title>
			<pubDate><![CDATA[Fri, 08 May 2026 08:12:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/linkedin-illegally-blocking-free-accounts-from-seeing-whos-viewed-your-profile-data-group-alleges-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/linkedin-illegally-blocking-free-accounts-from-seeing-whos-viewed-your-profile-data-group-alleges-computerworld/]]></link>
			<title>LinkedIn illegally blocking free accounts from seeing &#8216;who&#8217;s viewed your profile&#8217; data, group alleges – Computerworld</title>
			<pubDate><![CDATA[Thu, 07 May 2026 20:47:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fixing-trivial-passwords-is-as-easy-as-123456/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fixing-trivial-passwords-is-as-easy-as-123456/]]></link>
			<title>Fixing trivial passwords is as easy as 123456</title>
			<pubDate><![CDATA[Fri, 08 May 2026 08:03:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/deepfakes-are-exposing-gaps-in-cyber-insurance-policies/]]></guid>
			<link><![CDATA[https://fxtechnology.org/deepfakes-are-exposing-gaps-in-cyber-insurance-policies/]]></link>
			<title>Deepfakes Are Exposing Gaps in Cyber Insurance Policies</title>
			<pubDate><![CDATA[Thu, 07 May 2026 20:00:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-callphantom-tricks-android-users/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-callphantom-tricks-android-users/]]></link>
			<title>How CallPhantom tricks Android users</title>
			<pubDate><![CDATA[Fri, 08 May 2026 08:00:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-clones-the-good-the-bad-and-the-ugly/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-clones-the-good-the-bad-and-the-ugly/]]></link>
			<title>AI clones: the good, the bad, and the ugly</title>
			<pubDate><![CDATA[Fri, 08 May 2026 07:13:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/businesses-hide-vast-majority-of-ransomware-attacks-report-finds/]]></guid>
			<link><![CDATA[https://fxtechnology.org/businesses-hide-vast-majority-of-ransomware-attacks-report-finds/]]></link>
			<title>Businesses hide vast majority of ransomware attacks, report finds</title>
			<pubDate><![CDATA[Thu, 07 May 2026 18:59:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/canvas-breach-disrupts-schools-colleges-nationwide-krebs-on-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/canvas-breach-disrupts-schools-colleges-nationwide-krebs-on-security/]]></link>
			<title>Canvas Breach Disrupts Schools &#038; Colleges Nationwide – Krebs on Security</title>
			<pubDate><![CDATA[Fri, 08 May 2026 06:10:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/linux-kernel-dirty-frag-lpe-exploit-enables-root-access-across-major-distributions/]]></guid>
			<link><![CDATA[https://fxtechnology.org/linux-kernel-dirty-frag-lpe-exploit-enables-root-access-across-major-distributions/]]></link>
			<title>Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions</title>
			<pubDate><![CDATA[Fri, 08 May 2026 06:02:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/inside-rsac-2026-cyber-defense-magazine/]]></guid>
			<link><![CDATA[https://fxtechnology.org/inside-rsac-2026-cyber-defense-magazine/]]></link>
			<title>Inside RSAC 2026 &#8211; Cyber Defense Magazine</title>
			<pubDate><![CDATA[Fri, 08 May 2026 05:09:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-tclbanker-malware-self-spreads-through-whatsapp-and-outlook/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-tclbanker-malware-self-spreads-through-whatsapp-and-outlook/]]></link>
			<title>New TCLBANKER malware self-spreads through WhatsApp and Outlook</title>
			<pubDate><![CDATA[Fri, 08 May 2026 04:08:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/shinyhunters-extorts-universities-in-new-instructure-canvas-hack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/shinyhunters-extorts-universities-in-new-instructure-canvas-hack/]]></link>
			<title>ShinyHunters Extorts Universities in New Instructure Canvas Hack </title>
			<pubDate><![CDATA[Fri, 08 May 2026 03:07:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/when-ai-stops-assisting-and-starts-discovering-what-claude-mythos-preview-means-for-cybersecurity/]]></guid>
			<link><![CDATA[https://fxtechnology.org/when-ai-stops-assisting-and-starts-discovering-what-claude-mythos-preview-means-for-cybersecurity/]]></link>
			<title>When AI Stops Assisting And Starts Discovering: What Claude Mythos Preview Means For Cybersecurity</title>
			<pubDate><![CDATA[Thu, 07 May 2026 22:02:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/claudebleed-allows-any-chrome-extension-to-control-anthropics-ai-assistant/]]></guid>
			<link><![CDATA[https://fxtechnology.org/claudebleed-allows-any-chrome-extension-to-control-anthropics-ai-assistant/]]></link>
			<title>“ClaudeBleed” allows any Chrome extension to control Anthropic’s AI assistant</title>
			<pubDate><![CDATA[Thu, 07 May 2026 21:01:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/pcpjack-credential-stealer-exploits-5-cves-to-spread-worm-like-across-cloud-systems/]]></guid>
			<link><![CDATA[https://fxtechnology.org/pcpjack-credential-stealer-exploits-5-cves-to-spread-worm-like-across-cloud-systems/]]></link>
			<title>PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems</title>
			<pubDate><![CDATA[Thu, 07 May 2026 18:56:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ivanti-epmm-cve-2026-6973-rce-under-active-exploitation-grants-admin-level-access/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ivanti-epmm-cve-2026-6973-rce-under-active-exploitation-grants-admin-level-access/]]></link>
			<title>Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access</title>
			<pubDate><![CDATA[Thu, 07 May 2026 18:52:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/gluwares-titan-rises-to-meet-mythos-network-vulnerability-challenge/]]></guid>
			<link><![CDATA[https://fxtechnology.org/gluwares-titan-rises-to-meet-mythos-network-vulnerability-challenge/]]></link>
			<title>Gluware&#8217;s Titan rises to meet Mythos network vulnerability challenge</title>
			<pubDate><![CDATA[Thu, 07 May 2026 18:16:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/qlearn-cybersecurity-incident-hits-queensland-schools/]]></guid>
			<link><![CDATA[https://fxtechnology.org/qlearn-cybersecurity-incident-hits-queensland-schools/]]></link>
			<title>QLearn Cybersecurity Incident Hits Queensland Schools</title>
			<pubDate><![CDATA[Thu, 07 May 2026 17:57:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/amd-launches-ai-targeted-pcie-cards-for-current-servers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/amd-launches-ai-targeted-pcie-cards-for-current-servers/]]></link>
			<title>AMD launches AI-targeted PCIe cards for current servers</title>
			<pubDate><![CDATA[Thu, 07 May 2026 17:15:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/treat-identity-as-the-perimeter-and-act-like-it/]]></guid>
			<link><![CDATA[https://fxtechnology.org/treat-identity-as-the-perimeter-and-act-like-it/]]></link>
			<title>Treat Identity as the Perimeter (and Act Like It)</title>
			<pubDate><![CDATA[Thu, 07 May 2026 16:56:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/eu-lawmakers-strike-provisional-deal-to-soften-ai-act/]]></guid>
			<link><![CDATA[https://fxtechnology.org/eu-lawmakers-strike-provisional-deal-to-soften-ai-act/]]></link>
			<title>EU lawmakers strike provisional deal to soften AI Act</title>
			<pubDate><![CDATA[Thu, 07 May 2026 15:42:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/bouncing-back-from-cyberattacks-how-fast-recovery-is-mastered/]]></guid>
			<link><![CDATA[https://fxtechnology.org/bouncing-back-from-cyberattacks-how-fast-recovery-is-mastered/]]></link>
			<title>Bouncing Back from Cyberattacks: How Fast Recovery Is Mastered</title>
			<pubDate><![CDATA[Thu, 07 May 2026 14:54:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/palo-alto-networks-warns-state-linked-cluster-behind-zero-day-exploitation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/palo-alto-networks-warns-state-linked-cluster-behind-zero-day-exploitation/]]></link>
			<title>Palo Alto Networks warns state-linked cluster behind zero-day exploitation</title>
			<pubDate><![CDATA[Fri, 08 May 2026 02:06:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/operation-epic-fury-exposes-ot-security-detection-gaps/]]></guid>
			<link><![CDATA[https://fxtechnology.org/operation-epic-fury-exposes-ot-security-detection-gaps/]]></link>
			<title>Operation Epic Fury Exposes OT Security Detection Gaps</title>
			<pubDate><![CDATA[Fri, 08 May 2026 01:05:44 +0000]]></pubDate>
		</item>
				</channel>
</rss>
