<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 22, 2026 at 10:17 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Wed, 22 Apr 2026 21:27:27 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/mullvad-to-add-feature-that-forces-all-ios-traffic-through-the-vpn-tunnel/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mullvad-to-add-feature-that-forces-all-ios-traffic-through-the-vpn-tunnel/]]></link>
			<title>Mullvad to add feature that forces all iOS traffic through the VPN tunnel</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 21:27:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-ai-is-changing-copper-fiber-networking/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-ai-is-changing-copper-fiber-networking/]]></link>
			<title>How AI is changing copper, fiber networking</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 20:37:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/anthropic-probes-alleged-unauthorized-access-to-ai-security-tool-mythos/]]></guid>
			<link><![CDATA[https://fxtechnology.org/anthropic-probes-alleged-unauthorized-access-to-ai-security-tool-mythos/]]></link>
			<title>Anthropic Probes Alleged Unauthorized Access to AI Security Tool Mythos</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 20:26:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/self-propagating-supply-chain-worm-hijacks-npm-packages-to-steal-developer-tokens/]]></guid>
			<link><![CDATA[https://fxtechnology.org/self-propagating-supply-chain-worm-hijacks-npm-packages-to-steal-developer-tokens/]]></link>
			<title>Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 20:16:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-sharepoint-vulnerability-widely-exposed-across-multiple-countries/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-sharepoint-vulnerability-widely-exposed-across-multiple-countries/]]></link>
			<title>Microsoft SharePoint vulnerability widely exposed across multiple countries</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 19:25:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/almost-40-of-data-center-projects-will-be-late-this-year-2027-looks-no-better/]]></guid>
			<link><![CDATA[https://fxtechnology.org/almost-40-of-data-center-projects-will-be-late-this-year-2027-looks-no-better/]]></link>
			<title>Almost 40% of data center projects will be late this year, 2027 looks no better</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 18:35:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/bissa-scanner-an-ai-assisted-credential-harvesting-factory/]]></guid>
			<link><![CDATA[https://fxtechnology.org/bissa-scanner-an-ai-assisted-credential-harvesting-factory/]]></link>
			<title>Bissa Scanner, An AI-Assisted Credential Harvesting Factory</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 18:23:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/malicious-kics-docker-images-and-vs-code-extensions-hit-checkmarx-supply-chain/]]></guid>
			<link><![CDATA[https://fxtechnology.org/malicious-kics-docker-images-and-vs-code-extensions-hit-checkmarx-supply-chain/]]></link>
			<title>Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 18:14:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/phishing-campaigns-abuse-ai-workflow-automation-platforms/]]></guid>
			<link><![CDATA[https://fxtechnology.org/phishing-campaigns-abuse-ai-workflow-automation-platforms/]]></link>
			<title>Phishing Campaigns Abuse AI Workflow Automation Platforms</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 17:22:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/its-the-end-of-set-and-forget-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/its-the-end-of-set-and-forget-security/]]></link>
			<title>It’s the end of set-and-forget security</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 16:32:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/harvester-deploys-linux-gogra-backdoor-in-south-asia-using-microsoft-graph-api/]]></guid>
			<link><![CDATA[https://fxtechnology.org/harvester-deploys-linux-gogra-backdoor-in-south-asia-using-microsoft-graph-api/]]></link>
			<title>Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 16:11:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/google-chat-becomes-an-agent-interface-for-workspace-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/google-chat-becomes-an-agent-interface-for-workspace-computerworld/]]></link>
			<title>Google Chat becomes an agent interface for Workspace – Computerworld</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 14:20:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/mozilla-says-claudes-mythos-ai-helped-uncover-271-flaws-in-firefox/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mozilla-says-claudes-mythos-ai-helped-uncover-271-flaws-in-firefox/]]></link>
			<title>Mozilla says Claude’s Mythos AI helped uncover 271 flaws in Firefox</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 14:19:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/2026-threat-landscape-ransomware-breaches-exploits/]]></guid>
			<link><![CDATA[https://fxtechnology.org/2026-threat-landscape-ransomware-breaches-exploits/]]></link>
			<title>2026 Threat Landscape: Ransomware, Breaches &#038; Exploits</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 13:18:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/google-bets-on-workload-specific-tpus-with-8t-and-8i-launch/]]></guid>
			<link><![CDATA[https://fxtechnology.org/google-bets-on-workload-specific-tpus-with-8t-and-8i-launch/]]></link>
			<title>Google bets on workload-specific TPUs with 8t and 8i launch</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 12:40:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/gemini-enterprise-update-brings-ai-agents-into-collaborative-workflows-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/gemini-enterprise-update-brings-ai-agents-into-collaborative-workflows-computerworld/]]></link>
			<title>Gemini Enterprise update brings AI agents into collaborative workflows – Computerworld</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 12:18:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cyberheistnews-vol-16-16-how-identity-at-the-edge-highlights-the-new-frontiers-of-trust/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cyberheistnews-vol-16-16-how-identity-at-the-edge-highlights-the-new-frontiers-of-trust/]]></link>
			<title>CyberheistNews Vol 16 #16 How Identity at the Edge Highlights the New Frontiers of Trust</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 12:16:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/when-cross-app-permissions-stack-into-risk/]]></guid>
			<link><![CDATA[https://fxtechnology.org/when-cross-app-permissions-stack-into-risk/]]></link>
			<title>When Cross-App Permissions Stack into Risk</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 11:33:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/lotus-wiper-malware-targets-venezuelan-energy-systems-in-destructive-attack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/lotus-wiper-malware-targets-venezuelan-energy-systems-in-destructive-attack/]]></link>
			<title>Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 11:02:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-smartest-ways-to-sync-your-android-and-computer-clipboards-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-smartest-ways-to-sync-your-android-and-computer-clipboards-computerworld/]]></link>
			<title>The smartest ways to sync your Android and computer clipboards – Computerworld</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 10:37:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/meta-to-track-employee-keystrokes-screen-activity-to-train-ai-agents-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/meta-to-track-employee-keystrokes-screen-activity-to-train-ai-agents-computerworld/]]></link>
			<title>Meta to track employee keystrokes, screen activity to train AI agents – Computerworld</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 10:17:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-patches-critical-asp-net-core-cve-2026-40372-privilege-escalation-bug/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-patches-critical-asp-net-core-cve-2026-40372-privilege-escalation-bug/]]></link>
			<title>Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 09:50:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/mustang-pandas-new-lotuslite-variant-targets-india-banks-south-korea-policy-circles/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mustang-pandas-new-lotuslite-variant-targets-india-banks-south-korea-policy-circles/]]></link>
			<title>Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 08:59:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisa-confirms-exploitation-of-3-more-cisco-networking-device-vulnerabilities/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisa-confirms-exploitation-of-3-more-cisco-networking-device-vulnerabilities/]]></link>
			<title>CISA confirms exploitation of 3 more Cisco networking device vulnerabilities</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 08:12:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cohere-ai-terrarium-sandbox-flaw-enables-root-code-execution-container-escape/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cohere-ai-terrarium-sandbox-flaw-enables-root-code-execution-container-escape/]]></link>
			<title>Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 07:48:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-trims-cloud-desktop-pricing-even-as-it-boosts-ai-costs-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-trims-cloud-desktop-pricing-even-as-it-boosts-ai-costs-computerworld/]]></link>
			<title>Microsoft trims cloud desktop pricing, even as it boosts AI costs – Computerworld</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 07:14:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/south-korea-keris-expand-ai-cybersecurity-in-education/]]></guid>
			<link><![CDATA[https://fxtechnology.org/south-korea-keris-expand-ai-cybersecurity-in-education/]]></link>
			<title>South Korea, KERIS Expand AI Cybersecurity In Education</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 07:11:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nobody-runs-a-marathon-by-accident/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nobody-runs-a-marathon-by-accident/]]></link>
			<title>Nobody runs a marathon by accident</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 06:09:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-ngate-variant-hides-in-a-trojanized-nfc-payment-app/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-ngate-variant-hides-in-a-trojanized-nfc-payment-app/]]></link>
			<title>New NGate variant hides in a trojanized NFC payment app</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 06:03:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-ngate-android-malware-variant-uses-nfc-app-to-steal-card-data/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-ngate-android-malware-variant-uses-nfc-app-to-steal-card-data/]]></link>
			<title>New NGate Android malware variant uses NFC app to steal card data</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 03:01:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/suse-bets-automated-migration-can-break-vmwares-grip-on-virtualization/]]></guid>
			<link><![CDATA[https://fxtechnology.org/suse-bets-automated-migration-can-break-vmwares-grip-on-virtualization/]]></link>
			<title>SUSE bets automated migration can break VMware&#8217;s grip on virtualization</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 02:29:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/293m-kelpdao-crypto-heist-exposes-cross-chain-weaknesses-in-defi/]]></guid>
			<link><![CDATA[https://fxtechnology.org/293m-kelpdao-crypto-heist-exposes-cross-chain-weaknesses-in-defi/]]></link>
			<title>$293M KelpDAO Crypto Heist Exposes Cross-Chain Weaknesses in DeFi</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 01:59:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/adobe-builds-an-agentic-content-supply-chain-for-the-ai-era-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/adobe-builds-an-agentic-content-supply-chain-for-the-ai-era-computerworld/]]></link>
			<title>Adobe builds an ‘agentic content supply chain’ for the AI era – Computerworld</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 01:00:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/big-banks-seek-to-ease-security-worries-as-ai-push-accelerates/]]></guid>
			<link><![CDATA[https://fxtechnology.org/big-banks-seek-to-ease-security-worries-as-ai-push-accelerates/]]></link>
			<title>Big banks seek to ease security worries as AI push accelerates</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 00:58:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/italian-data-protection-authority-fine-over-data-misuse/]]></guid>
			<link><![CDATA[https://fxtechnology.org/italian-data-protection-authority-fine-over-data-misuse/]]></link>
			<title>Italian Data Protection Authority Fine Over Data Misuse</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 23:56:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/this-sophisticated-scam-should-be-a-warning-to-all-companies/]]></guid>
			<link><![CDATA[https://fxtechnology.org/this-sophisticated-scam-should-be-a-warning-to-all-companies/]]></link>
			<title>This Sophisticated Scam Should Be a Warning To All Companies</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 22:55:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-zero-networks-is-closing-the-network-enforcement-gap-for-ai-agents/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-zero-networks-is-closing-the-network-enforcement-gap-for-ai-agents/]]></link>
			<title>How Zero Networks is closing the network enforcement gap for AI agents</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 21:08:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/scattered-spider-member-tylerb-pleads-guilty-krebs-on-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/scattered-spider-member-tylerb-pleads-guilty-krebs-on-security/]]></link>
			<title>‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty – Krebs on Security</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 20:53:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/67-of-android-apps-log-data-not-mentioned-in-their-privacy-policies/]]></guid>
			<link><![CDATA[https://fxtechnology.org/67-of-android-apps-log-data-not-mentioned-in-their-privacy-policies/]]></link>
			<title>67% of Android apps log data not mentioned in their privacy policies</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 19:51:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/you-can-now-test-and-compare-ai-models-on-linkedin-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/you-can-now-test-and-compare-ai-models-on-linkedin-computerworld/]]></link>
			<title>You can now test and compare AI models on LinkedIn – Computerworld</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 19:23:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/systembc-c2-server-reveals-1570-victims-in-the-gentlemen-ransomware-operation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/systembc-c2-server-reveals-1570-victims-in-the-gentlemen-ransomware-operation/]]></link>
			<title>SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 19:15:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/130k-users-compromised-by-stealtok-campaign-that-uses-fake-tiktok-downloaders/]]></guid>
			<link><![CDATA[https://fxtechnology.org/130k-users-compromised-by-stealtok-campaign-that-uses-fake-tiktok-downloaders/]]></link>
			<title>130K Users Compromised by StealTok Campaign That Uses Fake TikTok Downloaders </title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 18:50:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisa-urges-security-teams-to-view-environments-following-axios-compromise/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisa-urges-security-teams-to-view-environments-following-axios-compromise/]]></link>
			<title>CISA urges security teams to view environments following axios compromise</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 17:49:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ants-data-breach-impacts-user-personal-details-in-france/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ants-data-breach-impacts-user-personal-details-in-france/]]></link>
			<title>ANTS Data Breach Impacts User Personal Details In France</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 16:47:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/22-bridgebreak-flaws-expose-thousands-of-lantronix-and-silex-serial-to-ip-converters/]]></guid>
			<link><![CDATA[https://fxtechnology.org/22-bridgebreak-flaws-expose-thousands-of-lantronix-and-silex-serial-to-ip-converters/]]></link>
			<title>22 BRIDGE:BREAK Flaws Expose Thousands of Lantronix and Silex Serial-to-IP Converters</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 16:34:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/whatsapp-phishing-campaign-delivers-malware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/whatsapp-phishing-campaign-delivers-malware/]]></link>
			<title>WhatsApp Phishing Campaign Delivers Malware</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 15:46:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ransomware-negotiator-pleads-guilty-to-aiding-blackcat-attacks-in-2023/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ransomware-negotiator-pleads-guilty-to-aiding-blackcat-attacks-in-2023/]]></link>
			<title>Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 15:11:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/azure-sre-agent-flaw-lets-outsiders-silently-eavesdrop-on-enterprise-cloud-operations/]]></guid>
			<link><![CDATA[https://fxtechnology.org/azure-sre-agent-flaw-lets-outsiders-silently-eavesdrop-on-enterprise-cloud-operations/]]></link>
			<title>Azure SRE Agent flaw lets outsiders silently eavesdrop on enterprise cloud operations</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 12:58:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/uk-probes-telegram-and-other-chat-apps-over-child-safety-failures/]]></guid>
			<link><![CDATA[https://fxtechnology.org/uk-probes-telegram-and-other-chat-apps-over-child-safety-failures/]]></link>
			<title>UK probes Telegram and other chat apps over child safety failures</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 12:43:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/with-john-ternus-as-ceo-expect-apples-platforms-to-proliferate-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/with-john-ternus-as-ceo-expect-apples-platforms-to-proliferate-computerworld/]]></link>
			<title>With John Ternus as CEO, expect Apple’s platforms to proliferate – Computerworld</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 12:13:02 +0000]]></pubDate>
		</item>
				</channel>
</rss>
