<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 8, 2026 at 4:27 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Wed, 08 Apr 2026 15:06:59 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/anthropic-launches-project-glasswing-after-its-new-ai-model-finds-thousands-of-zero-day-flaws/]]></guid>
			<link><![CDATA[https://fxtechnology.org/anthropic-launches-project-glasswing-after-its-new-ai-model-finds-thousands-of-zero-day-flaws/]]></link>
			<title>Anthropic launches ‘Project Glasswing’ after its new AI model finds thousands of zero-day flaws</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 15:06:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/10-chatgpt-prompts-l1-soc-analysts-can-use-in-their-daily-work/]]></guid>
			<link><![CDATA[https://fxtechnology.org/10-chatgpt-prompts-l1-soc-analysts-can-use-in-their-daily-work/]]></link>
			<title>10 ChatGPT Prompts L1 SOC Analysts Can Use in Their Daily Work</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 14:05:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/]]></link>
			<title>APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 13:55:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/threat-cluster-launches-extortion-campaign-using-social-engineering/]]></guid>
			<link><![CDATA[https://fxtechnology.org/threat-cluster-launches-extortion-campaign-using-social-engineering/]]></link>
			<title>Threat cluster launches extortion campaign using social engineering</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 13:05:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/flowise-rce-vulnerability-cve-2025-59528-exploited-now/]]></guid>
			<link><![CDATA[https://fxtechnology.org/flowise-rce-vulnerability-cve-2025-59528-exploited-now/]]></link>
			<title>Flowise RCE Vulnerability CVE-2025-59528 Exploited Now</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 12:03:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/z-ai-unveils-glm-5-1-enabling-ai-coding-agents-to-run-autonomously-for-hours/]]></guid>
			<link><![CDATA[https://fxtechnology.org/z-ai-unveils-glm-5-1-enabling-ai-coding-agents-to-run-autonomously-for-hours/]]></link>
			<title>Z.ai unveils GLM-5.1, enabling AI coding agents to  run autonomously for hours</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 10:34:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-android-dark-mode-upgrade-you-deserve-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-android-dark-mode-upgrade-you-deserve-computerworld/]]></link>
			<title>The Android dark mode upgrade you deserve – Computerworld</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 10:06:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems/]]></guid>
			<link><![CDATA[https://fxtechnology.org/anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems/]]></link>
			<title>Anthropic&#8217;s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 09:51:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/kaspersky-financial-threat-report-2025/]]></guid>
			<link><![CDATA[https://fxtechnology.org/kaspersky-financial-threat-report-2025/]]></link>
			<title>Kaspersky financial threat report 2025</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 09:08:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/disgruntled-researcher-drops-bluehammer-windows-zero-day-lpe-exploit/]]></guid>
			<link><![CDATA[https://fxtechnology.org/disgruntled-researcher-drops-bluehammer-windows-zero-day-lpe-exploit/]]></link>
			<title>Disgruntled researcher drops “BlueHammer” Windows zero-day LPE exploit</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 08:58:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/docker-flaw-cve-2026-34040-lets-attackers-bypass-security-controls-and-take-over-hosts/]]></guid>
			<link><![CDATA[https://fxtechnology.org/docker-flaw-cve-2026-34040-lets-attackers-bypass-security-controls-and-take-over-hosts/]]></link>
			<title>Docker Flaw (CVE-2026-34040) Lets Attackers Bypass Security Controls and Take Over Hosts</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 07:58:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust/]]></guid>
			<link><![CDATA[https://fxtechnology.org/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust/]]></link>
			<title>N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 07:52:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/as-iran-war-drags-on-idc-sees-worsening-tech-environment-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/as-iran-war-drags-on-idc-sees-worsening-tech-environment-computerworld/]]></link>
			<title>As Iran war drags on, IDC sees worsening tech environment – Computerworld</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 07:30:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/olympic-games-fifa-world-cup-offer-huge-platforms-rich-cyberattack-surface/]]></guid>
			<link><![CDATA[https://fxtechnology.org/olympic-games-fifa-world-cup-offer-huge-platforms-rich-cyberattack-surface/]]></link>
			<title>Olympic Games, FIFA World Cup offer huge platforms, rich cyberattack surface</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 06:57:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/researchers-spot-zero-day-attack-targeting-adobe-reader/]]></guid>
			<link><![CDATA[https://fxtechnology.org/researchers-spot-zero-day-attack-targeting-adobe-reader/]]></link>
			<title>Researchers Spot Zero-Day Attack Targeting Adobe Reader</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 05:56:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cyberheistnews-vol-16-14-heads-up-clever-hackers-use-custom-fonts-to-bypass-ai-defenses/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cyberheistnews-vol-16-14-heads-up-clever-hackers-use-custom-fonts-to-bypass-ai-defenses/]]></link>
			<title>CyberheistNews Vol 16 #14 [Heads Up] Clever Hackers Use Custom Fonts to Bypass AI Defenses</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 04:54:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/iran-linked-hackers-disrupt-u-s-critical-infrastructure-by-targeting-internet-exposed-plcs/]]></guid>
			<link><![CDATA[https://fxtechnology.org/iran-linked-hackers-disrupt-u-s-critical-infrastructure-by-targeting-internet-exposed-plcs/]]></link>
			<title>Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 04:49:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/as-breakout-time-accelerates-prevention-first-cybersecurity-takes-center-stage/]]></guid>
			<link><![CDATA[https://fxtechnology.org/as-breakout-time-accelerates-prevention-first-cybersecurity-takes-center-stage/]]></link>
			<title>As breakout time accelerates, prevention-first cybersecurity takes center stage</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 02:45:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/intel-bets-on-terafab-to-help-it-reassert-itself-in-the-ai-chip-race/]]></guid>
			<link><![CDATA[https://fxtechnology.org/intel-bets-on-terafab-to-help-it-reassert-itself-in-the-ai-chip-race/]]></link>
			<title>Intel bets on Terafab to help it reassert itself in the AI chip race</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 02:25:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-often-doesnt-deliver-roi-for-it-departments-either/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-often-doesnt-deliver-roi-for-it-departments-either/]]></link>
			<title>AI often doesn’t deliver ROI for IT departments either</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 01:57:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/linkedin-faces-class-action-over-alleged-covert-scanning-of-users-browsers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/linkedin-faces-class-action-over-alleged-covert-scanning-of-users-browsers/]]></link>
			<title>LinkedIn faces class action over alleged covert scanning of users’ browsers</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 01:50:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-v2-ualink-specification-aims-to-catch-up-to-nvlink/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-v2-ualink-specification-aims-to-catch-up-to-nvlink/]]></link>
			<title>New v2 UALink specification aims to catch up to NVLink</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 01:23:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nomshub-vulnerability-chain-exposes-hidden-risks-in-ai-coding-tools/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nomshub-vulnerability-chain-exposes-hidden-risks-in-ai-coding-tools/]]></link>
			<title>NomShub Vulnerability Chain Exposes Hidden Risks in AI Coding Tools</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 00:49:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisas-vulnerability-scans-field-support-on-chopping-block-in-trump-budget/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisas-vulnerability-scans-field-support-on-chopping-block-in-trump-budget/]]></link>
			<title>CISA’s vulnerability scans, field support on chopping block in Trump budget</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 23:48:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/forticlientems-flaws-under-active-exploitation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/forticlientems-flaws-under-active-exploitation/]]></link>
			<title>FortiClientEMS Flaws Under Active Exploitation</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 22:47:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-joins-anthropics-multivendor-effort-to-secure-ai-software/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-joins-anthropics-multivendor-effort-to-secure-ai-software/]]></link>
			<title>Cisco joins Anthropic’s multivendor effort to secure AI software</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 22:20:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/minimus-taps-yael-nardi-to-lead-strategic-operations-as-chief-business-officer-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/minimus-taps-yael-nardi-to-lead-strategic-operations-as-chief-business-officer-computerworld/]]></link>
			<title>Minimus Taps Yael Nardi to Lead Strategic Operations as Chief Business Officer – Computerworld</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 21:50:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-powered-human-risk-management-shifts-the-focus-to-adaptive-behavior-based-training/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-powered-human-risk-management-shifts-the-focus-to-adaptive-behavior-based-training/]]></link>
			<title>AI-Powered Human Risk Management Shifts the Focus to Adaptive, Behavior-Based Training</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 21:46:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/russia-hacked-routers-to-steal-microsoft-office-tokens-krebs-on-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/russia-hacked-routers-to-steal-microsoft-office-tokens-krebs-on-security/]]></link>
			<title>Russia Hacked Routers to Steal Microsoft Office Tokens – Krebs on Security</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 19:44:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/whatsapp-private-inference-pre-launch-audit-uncovered-critical-flaws/]]></guid>
			<link><![CDATA[https://fxtechnology.org/whatsapp-private-inference-pre-launch-audit-uncovered-critical-flaws/]]></link>
			<title>WhatsApp ‘Private Inference’ pre-launch audit uncovered critical flaws</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 18:43:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cloud-first-vs-sovereign-first-navigating-the-trade-off/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cloud-first-vs-sovereign-first-navigating-the-trade-off/]]></link>
			<title>Cloud-first vs. sovereign-first: Navigating the trade-off</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 18:01:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/minimus-appoints-tech-dealmaker-yael-nardi-as-chief-business-officer-to-drive-hyper-growth/]]></guid>
			<link><![CDATA[https://fxtechnology.org/minimus-appoints-tech-dealmaker-yael-nardi-as-chief-business-officer-to-drive-hyper-growth/]]></link>
			<title>Minimus Appoints Tech Dealmaker Yael Nardi as Chief Business Officer to Drive Hyper-Growth</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 17:42:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/react2shell-vulnerability-helps-hackers-steal-credentials-ai-platform-keys-and-other-sensitive-data/]]></guid>
			<link><![CDATA[https://fxtechnology.org/react2shell-vulnerability-helps-hackers-steal-credentials-ai-platform-keys-and-other-sensitive-data/]]></link>
			<title>React2Shell vulnerability helps hackers steal credentials, AI platform keys and other sensitive data</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 16:41:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/openai-calls-for-a-four-day-workweek-and-a-robot-tax-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/openai-calls-for-a-four-day-workweek-and-a-robot-tax-computerworld/]]></link>
			<title>OpenAI calls for a four-day workweek — and a &#8216;robot tax&#8217; – Computerworld</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 16:14:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/revil-ransomware-gang-leader-identified-by-germany/]]></guid>
			<link><![CDATA[https://fxtechnology.org/revil-ransomware-gang-leader-identified-by-germany/]]></link>
			<title>REvil Ransomware Gang Leader Identified By Germany</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 15:38:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access/]]></guid>
			<link><![CDATA[https://fxtechnology.org/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access/]]></link>
			<title>Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 15:29:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/because-your-soc-team-has-a-life/]]></guid>
			<link><![CDATA[https://fxtechnology.org/because-your-soc-team-has-a-life/]]></link>
			<title>Because Your SOC Team Has a Life</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 14:37:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/]]></guid>
			<link><![CDATA[https://fxtechnology.org/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/]]></link>
			<title>Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 13:29:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nvidias-schedmd-acquisition-puts-open-source-ai-scheduling-under-scrutiny/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nvidias-schedmd-acquisition-puts-open-source-ai-scheduling-under-scrutiny/]]></link>
			<title>Nvidia’s SchedMD acquisition puts open-source AI scheduling under scrutiny</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:56:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nvidias-schedmd-acquisition-puts-open-source-ai-scheduling-under-scrutiny-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nvidias-schedmd-acquisition-puts-open-source-ai-scheduling-under-scrutiny-computerworld/]]></link>
			<title>Nvidia’s SchedMD acquisition puts open-source AI scheduling under scrutiny – Computerworld</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:38:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apples-mac-grabs-11-of-us-enterprise-market-share-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apples-mac-grabs-11-of-us-enterprise-market-share-computerworld/]]></link>
			<title>Apple&#8217;s Mac grabs 11% of US enterprise market share – Computerworld</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:09:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-hidden-cost-of-recurring-credential-incidents/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-hidden-cost-of-recurring-credential-incidents/]]></link>
			<title>The Hidden Cost of Recurring Credential Incidents</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:03:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/8-advanced-ways-vivaldi-boosts-your-productivity-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/8-advanced-ways-vivaldi-boosts-your-productivity-computerworld/]]></link>
			<title>8 advanced ways Vivaldi boosts your productivity – Computerworld</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 10:37:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/eu-csam-law-lapse-puts-child-safety-at-online-risks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/eu-csam-law-lapse-puts-child-safety-at-online-risks/]]></link>
			<title>EU CSAM Law Lapse Puts Child Safety At Online Risks</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 10:31:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-ai-simplifies-wireless-operations-but-also-taxes-legacy-wi-fi-networks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-ai-simplifies-wireless-operations-but-also-taxes-legacy-wi-fi-networks/]]></link>
			<title>Cisco: AI simplifies wireless operations but also taxes legacy Wi-Fi networks</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 10:06:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/]]></link>
			<title>New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:21:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware/]]></link>
			<title>China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 06:55:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cve-2026-35616-forticlient-ems-flaw-under-active-exploitation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cve-2026-35616-forticlient-ems-flaw-under-active-exploitation/]]></link>
			<title>CVE-2026-35616: FortiClient EMS Flaw Under Active Exploitation</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 06:27:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed/]]></guid>
			<link><![CDATA[https://fxtechnology.org/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed/]]></link>
			<title>Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 06:18:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/european-commission-cloud-breach-stolen-data-posted-online/]]></guid>
			<link><![CDATA[https://fxtechnology.org/european-commission-cloud-breach-stolen-data-posted-online/]]></link>
			<title>European Commission Cloud Breach: Stolen Data Posted Online</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 05:26:23 +0000]]></pubDate>
		</item>
				</channel>
</rss>
