<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 14, 2026 at 7:21 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Tue, 14 Apr 2026 16:51:00 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/global-ram-shortage-prompts-microsoft-to-hike-surface-prices-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/global-ram-shortage-prompts-microsoft-to-hike-surface-prices-computerworld/]]></link>
			<title>Global RAM shortage prompts Microsoft to hike Surface prices – Computerworld</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 16:51:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/proton-boosts-drive-performance-and-expands-encrypted-workspace-features/]]></guid>
			<link><![CDATA[https://fxtechnology.org/proton-boosts-drive-performance-and-expands-encrypted-workspace-features/]]></link>
			<title>Proton boosts Drive performance and expands encrypted workspace features</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 16:49:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-php-composer-flaws-enable-arbitrary-command-execution-patches-released/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-php-composer-flaws-enable-arbitrary-command-execution-patches-released/]]></link>
			<title>New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 16:42:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-is-developing-copilot-features-inspired-by-openclaw-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-is-developing-copilot-features-inspired-by-openclaw-computerworld/]]></link>
			<title>Microsoft is developing Copilot features inspired by Openclaw – Computerworld</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 16:33:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/data-centers-are-moving-inland-away-from-some-traditional-locations/]]></guid>
			<link><![CDATA[https://fxtechnology.org/data-centers-are-moving-inland-away-from-some-traditional-locations/]]></link>
			<title>Data centers are moving inland, away from some traditional locations</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 16:23:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-business-rolls-out-to-200-countries-today-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-business-rolls-out-to-200-countries-today-computerworld/]]></link>
			<title>Apple Business rolls out to 200+ countries today – Computerworld</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 15:50:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/brute-force-cyberattacks-originating-in-middle-east-surge-in-q1/]]></guid>
			<link><![CDATA[https://fxtechnology.org/brute-force-cyberattacks-originating-in-middle-east-surge-in-q1/]]></link>
			<title>Brute-force cyberattacks originating in Middle East surge in Q1</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 15:49:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-driven-pushpaganda-scam-exploits-google-discover-to-spread-scareware-and-ad-fraud/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-driven-pushpaganda-scam-exploits-google-discover-to-spread-scareware-and-ad-fraud/]]></link>
			<title>AI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad Fraud</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 15:44:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/goldman-sachs-hyperaware-of-ai-risks-working-with-anthropic-on-mythos/]]></guid>
			<link><![CDATA[https://fxtechnology.org/goldman-sachs-hyperaware-of-ai-risks-working-with-anthropic-on-mythos/]]></link>
			<title>Goldman Sachs &#8216;Hyperaware&#8217; Of AI Risks; Working With Anthropic On Mythos</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 14:48:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/google-adds-rust-based-dns-parser-into-pixel-10-modem-to-enhance-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/google-adds-rust-based-dns-parser-into-pixel-10-modem-to-enhance-security/]]></link>
			<title>Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 14:39:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-knowbe4-agent-risk-manager-addresses-pervasive-ai-agent-risk/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-knowbe4-agent-risk-manager-addresses-pervasive-ai-agent-risk/]]></link>
			<title>New KnowBe4 Agent Risk Manager Addresses Pervasive AI Agent Risk</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:47:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/mirax-android-rat-turns-devices-into-socks5-proxies-reaching-220000-via-meta-ads/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mirax-android-rat-turns-devices-into-socks5-proxies-reaching-220000-via-meta-ads/]]></link>
			<title>Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:40:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/dns-security-is-often-inadequate-and-network-engineers-should-get-more-involved/]]></guid>
			<link><![CDATA[https://fxtechnology.org/dns-security-is-often-inadequate-and-network-engineers-should-get-more-involved/]]></link>
			<title>DNS security is often inadequate, and network engineers should get more involved</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:06:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/108-chrome-extensions-caught-stealing-user-data-and-hijacking-sessions/]]></guid>
			<link><![CDATA[https://fxtechnology.org/108-chrome-extensions-caught-stealing-user-data-and-hijacking-sessions/]]></link>
			<title>108 Chrome extensions caught stealing user data and hijacking sessions</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 10:44:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/analysis-of-216m-security-findings-shows-a-4x-increase-in-critical-risk-2026-report/]]></guid>
			<link><![CDATA[https://fxtechnology.org/analysis-of-216m-security-findings-shows-a-4x-increase-in-critical-risk-2026-report/]]></link>
			<title>Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 10:34:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/australia-social-media-ban-fails-to-stop-under-16-access/]]></guid>
			<link><![CDATA[https://fxtechnology.org/australia-social-media-ban-fails-to-stop-under-16-access/]]></link>
			<title>Australia Social Media Ban Fails To Stop Under-16 Access</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:43:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/quantum-developments-put-focus-on-authentication/]]></guid>
			<link><![CDATA[https://fxtechnology.org/quantum-developments-put-focus-on-authentication/]]></link>
			<title>Quantum developments put focus on authentication</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 08:10:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/12-quantum-training-courses-from-isc2-ibm-aws-and-more/]]></guid>
			<link><![CDATA[https://fxtechnology.org/12-quantum-training-courses-from-isc2-ibm-aws-and-more/]]></link>
			<title>12 quantum training courses from ISC2, IBM, AWS and more</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 08:03:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/a-wild-ride-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/a-wild-ride-computerworld/]]></link>
			<title>‘A wild ride’ – Computerworld</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 07:20:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/surfshark-unveils-new-dausos-vpn-protocol-with-dedicated-user-tunnels/]]></guid>
			<link><![CDATA[https://fxtechnology.org/surfshark-unveils-new-dausos-vpn-protocol-with-dedicated-user-tunnels/]]></link>
			<title>Surfshark unveils new Dausos VPN protocol with dedicated user tunnels</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 06:40:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/showdoc-rce-flaw-cve-2025-0520-actively-exploited-on-unpatched-servers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/showdoc-rce-flaw-cve-2025-0520-actively-exploited-on-unpatched-servers/]]></link>
			<title>ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 06:29:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/basic-fit-data-breach-exposes-member-data-across-europe/]]></guid>
			<link><![CDATA[https://fxtechnology.org/basic-fit-data-breach-exposes-member-data-across-europe/]]></link>
			<title>Basic-Fit Data Breach Exposes Member Data Across Europe</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 05:39:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/rockstar-games-confirms-data-breach-as-shinyhunters-leaks-78-million-records/]]></guid>
			<link><![CDATA[https://fxtechnology.org/rockstar-games-confirms-data-breach-as-shinyhunters-leaks-78-million-records/]]></link>
			<title>Rockstar Games confirms data breach as ShinyHunters leaks 78 million records</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 02:36:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/linux-7-0-debuts-with-some-big-changes-for-networking/]]></guid>
			<link><![CDATA[https://fxtechnology.org/linux-7-0-debuts-with-some-big-changes-for-networking/]]></link>
			<title>Linux 7.0 debuts with some big changes for networking</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 01:57:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/us-indonesia-shut-down-sophisticated-phishing-kit/]]></guid>
			<link><![CDATA[https://fxtechnology.org/us-indonesia-shut-down-sophisticated-phishing-kit/]]></link>
			<title>US, Indonesia shut down ‘sophisticated’ phishing kit</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 01:34:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/gta-5-dev-faces-data-threat/]]></guid>
			<link><![CDATA[https://fxtechnology.org/gta-5-dev-faces-data-threat/]]></link>
			<title>GTA 5 Dev Faces Data Threat</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 00:33:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/alleged-10-petabyte-data-theft-from-chinas-tianjin-supercomputing-hub/]]></guid>
			<link><![CDATA[https://fxtechnology.org/alleged-10-petabyte-data-theft-from-chinas-tianjin-supercomputing-hub/]]></link>
			<title>Alleged 10 Petabyte Data Theft From China’s Tianjin Supercomputing Hub</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 11:25:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/why-the-human-layer-matters-more-not-less/]]></guid>
			<link><![CDATA[https://fxtechnology.org/why-the-human-layer-matters-more-not-less/]]></link>
			<title>Why the Human Layer Matters More, Not Less</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 23:32:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-french-government-eyes-alternatives-to-windows/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-french-government-eyes-alternatives-to-windows/]]></link>
			<title>The French government eyes alternatives to Windows</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 20:32:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/booking-com-data-breach-exposed-users-reservation-details/]]></guid>
			<link><![CDATA[https://fxtechnology.org/booking-com-data-breach-exposed-users-reservation-details/]]></link>
			<title>Booking.com data breach exposed users’ reservation details</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 20:28:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisos-see-gaps-in-their-incident-response-playbooks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisos-see-gaps-in-their-incident-response-playbooks/]]></link>
			<title>CISOs see gaps in their incident response playbooks</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 19:28:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/chipsoft-ransomware-incident-hits-dutch-healthcare-systems/]]></guid>
			<link><![CDATA[https://fxtechnology.org/chipsoft-ransomware-incident-hits-dutch-healthcare-systems/]]></link>
			<title>ChipSoft Ransomware Incident Hits Dutch Healthcare Systems</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 18:26:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/janelarat-malware-targets-latin-american-banks-with-14739-attacks-in-brazil-in-2025/]]></guid>
			<link><![CDATA[https://fxtechnology.org/janelarat-malware-targets-latin-american-banks-with-14739-attacks-in-brazil-in-2025/]]></link>
			<title>JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 18:19:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-phishing-kit-streamlines-clickfix-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-phishing-kit-streamlines-clickfix-attacks/]]></link>
			<title>New Phishing Kit Streamlines ClickFix Attacks</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 17:25:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-preps-for-the-face-race-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-preps-for-the-face-race-computerworld/]]></link>
			<title>Apple preps for the face race – Computerworld</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 16:03:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fbi-and-indonesian-police-dismantle-w3ll-phishing-network-behind-20m-fraud-attempts/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fbi-and-indonesian-police-dismantle-w3ll-phishing-network-behind-20m-fraud-attempts/]]></link>
			<title>FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:52:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/standard-fiber-optic-cables-can-be-turned-into-remote-microphones/]]></guid>
			<link><![CDATA[https://fxtechnology.org/standard-fiber-optic-cables-can-be-turned-into-remote-microphones/]]></link>
			<title>Standard fiber optic cables can be turned into remote microphones</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:22:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cyber-fraud-threatens-cybersecurity-in-zimbabwe-systems/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cyber-fraud-threatens-cybersecurity-in-zimbabwe-systems/]]></link>
			<title>Cyber Fraud Threatens Cybersecurity In Zimbabwe Systems</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 13:21:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fiber-optic-spying-windows-rootkit-ai-vulnerability-hunting-and-more/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fiber-optic-spying-windows-rootkit-ai-vulnerability-hunting-and-more/]]></link>
			<title>Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 13:10:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-to-build-your-own-ai-agents-with-google-workspace-studio-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-to-build-your-own-ai-agents-with-google-workspace-studio-computerworld/]]></link>
			<title>How to build your own AI agents with Google Workspace Studio – Computerworld</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 11:24:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/north-koreas-apt37-uses-facebook-social-engineering-to-deliver-rokrat-malware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/north-koreas-apt37-uses-facebook-social-engineering-to-deliver-rokrat-malware/]]></link>
			<title>North Korea&#8217;s APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 11:11:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads/]]></link>
			<title>CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 06:37:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621/]]></guid>
			<link><![CDATA[https://fxtechnology.org/adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621/]]></link>
			<title>Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 04:28:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/digital-asset-cybersecurity-initiative-announced-by-treasury/]]></guid>
			<link><![CDATA[https://fxtechnology.org/digital-asset-cybersecurity-initiative-announced-by-treasury/]]></link>
			<title>Digital Asset Cybersecurity Initiative Announced By Treasury</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 15:30:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/bitcoin-depot-reports-3-6-million-loss-in-cybersecurity-incident/]]></guid>
			<link><![CDATA[https://fxtechnology.org/bitcoin-depot-reports-3-6-million-loss-in-cybersecurity-incident/]]></link>
			<title>Bitcoin Depot reports $3.6 million loss in cybersecurity incident</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 12:26:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/janelarat-targeting-online-banking-users-in-latin-america/]]></guid>
			<link><![CDATA[https://fxtechnology.org/janelarat-targeting-online-banking-users-in-latin-america/]]></link>
			<title>JanelaRAT targeting online banking users in Latin America</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:26:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-adobe-hopes-to-redesign-marketing-and-creativity-with-ai-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-adobe-hopes-to-redesign-marketing-and-creativity-with-ai-computerworld/]]></link>
			<title>How Adobe hopes to redesign marketing and creativity with AI – Computerworld</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:22:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/marimo-rce-flaw-exploited-within-hours-of-disclosure/]]></guid>
			<link><![CDATA[https://fxtechnology.org/marimo-rce-flaw-exploited-within-hours-of-disclosure/]]></link>
			<title>Marimo RCE Flaw Exploited Within Hours of Disclosure</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:17:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/authorities-dismantle-w3ll-phishing-empire/]]></guid>
			<link><![CDATA[https://fxtechnology.org/authorities-dismantle-w3ll-phishing-empire/]]></link>
			<title>Authorities Dismantle ‘W3LL’ Phishing Empire</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 08:15:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident/]]></guid>
			<link><![CDATA[https://fxtechnology.org/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident/]]></link>
			<title>OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 07:07:54 +0000]]></pubDate>
		</item>
				</channel>
</rss>
