<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 7:04 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Thu, 02 Apr 2026 10:59:14 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action/]]></guid>
			<link><![CDATA[https://fxtechnology.org/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action/]]></link>
			<title>WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:59:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/a-core-infrastructure-engineer-pleads-guilty-to-federal-charges-in-insider-attack-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/a-core-infrastructure-engineer-pleads-guilty-to-federal-charges-in-insider-attack-computerworld/]]></link>
			<title>A core infrastructure engineer pleads guilty to federal charges in insider attack – Computerworld</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 18:52:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-2026-state-of-wireless-report-ai-wireless-threats-grow-as-security-gaps-widen/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-2026-state-of-wireless-report-ai-wireless-threats-grow-as-security-gaps-widen/]]></link>
			<title>Cisco 2026 State of Wireless Report: AI Wireless Threats Grow as Security Gaps Widen</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 18:49:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fbi-warns-of-avrecon-malware-targeting-network-devices-across-163-countries/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fbi-warns-of-avrecon-malware-targeting-network-devices-across-163-countries/]]></link>
			<title>FBI Warns Of AVrecon Malware Targeting Network Devices Across 163 Countries</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 23:17:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing/]]></guid>
			<link><![CDATA[https://fxtechnology.org/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing/]]></link>
			<title>China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 18:45:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-chatbot-use-can-hinder-students-knowledge-retention-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-chatbot-use-can-hinder-students-knowledge-retention-computerworld/]]></link>
			<title>AI chatbot use can hinder students’ knowledge retention – Computerworld</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:51:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/trumps-fy2027-budget-again-targets-cisa/]]></guid>
			<link><![CDATA[https://fxtechnology.org/trumps-fy2027-budget-again-targets-cisa/]]></link>
			<title>Trump’s FY2027 budget again targets CISA</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:48:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-fixes-critical-imc-auth-bypass-present-in-many-products/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-fixes-critical-imc-auth-bypass-present-in-many-products/]]></link>
			<title>Cisco fixes critical IMC auth bypass present in many products</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 22:49:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cert-eu-blames-trivy-supply-chain-attack-for-europa-eu-data-breach/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cert-eu-blames-trivy-supply-chain-attack-for-europa-eu-data-breach/]]></link>
			<title>CERT-EU blames Trivy supply chain attack for Europa.eu data breach</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 16:57:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/french-government-take-bull-by-horns-for-e404-million/]]></guid>
			<link><![CDATA[https://fxtechnology.org/french-government-take-bull-by-horns-for-e404-million/]]></link>
			<title>French government take Bull by horns for €404 million</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 16:56:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hasbro-cyberattack-company-investigates-security-breach/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hasbro-cyberattack-company-investigates-security-breach/]]></link>
			<title>Hasbro Cyberattack: Company Investigates Security Breach</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 16:47:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-leans-into-the-component-crisis-storm-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-leans-into-the-component-crisis-storm-computerworld/]]></link>
			<title>Apple leans into the component crisis storm – Computerworld</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 15:47:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-to-prevent-phishing-emails-by-reducing-human-risk/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-to-prevent-phishing-emails-by-reducing-human-risk/]]></link>
			<title>How to Prevent Phishing Emails by Reducing Human Risk</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 22:15:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/phishing-attacks-are-exploiting-the-war-in-iran/]]></guid>
			<link><![CDATA[https://fxtechnology.org/phishing-attacks-are-exploiting-the-war-in-iran/]]></link>
			<title>Phishing Attacks Are Exploiting the War in Iran</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 15:45:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/samsung-galaxy-s25-ships-browser-vulnerable-to-rce-and-xss-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/samsung-galaxy-s25-ships-browser-vulnerable-to-rce-and-xss-attacks/]]></link>
			<title>Samsung Galaxy S25 ships browser vulnerable to RCE and XSS attacks</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 12:39:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/]]></guid>
			<link><![CDATA[https://fxtechnology.org/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/]]></link>
			<title>Why Third-Party Risk Is the Biggest Gap in Your Clients&#8217; Security Posture</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 11:56:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/claude-code-leak-exposes-ai-supply-chain-threats/]]></guid>
			<link><![CDATA[https://fxtechnology.org/claude-code-leak-exposes-ai-supply-chain-threats/]]></link>
			<title>Claude Code Leak Exposes AI Supply Chain Threats</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 11:37:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/]]></link>
			<title>UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 11:35:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/why-cant-we-have-nice-routers-anymore/]]></guid>
			<link><![CDATA[https://fxtechnology.org/why-cant-we-have-nice-routers-anymore/]]></link>
			<title>Why can&#8217;t we have nice routers anymore?</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 21:24:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ransomware-supply-chain-threats/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ransomware-supply-chain-threats/]]></link>
			<title>Ransomware &#038; Supply Chain Threats</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 10:35:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/]]></link>
			<title>New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:31:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/]]></guid>
			<link><![CDATA[https://fxtechnology.org/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/]]></link>
			<title>Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:52:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/why-ai-lies-cheats-and-steals/]]></guid>
			<link><![CDATA[https://fxtechnology.org/why-ai-lies-cheats-and-steals/]]></link>
			<title>Why AI lies, cheats and steals</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 07:31:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/office-365-rebranded-and-expanded-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/office-365-rebranded-and-expanded-computerworld/]]></link>
			<title>Office 365, rebranded and expanded – Computerworld</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 06:29:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/genai-alone-isnt-enough-rethinking-ai-in-cybersecurity/]]></guid>
			<link><![CDATA[https://fxtechnology.org/genai-alone-isnt-enough-rethinking-ai-in-cybersecurity/]]></link>
			<title>GenAI Alone Isn’t Enough: Rethinking AI in Cybersecurity</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 06:27:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/alleged-starbucks-incident-exposes-code-and-firmware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/alleged-starbucks-incident-exposes-code-and-firmware/]]></link>
			<title>Alleged Starbucks Incident Exposes Code and Firmware</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 18:11:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/intesa-sanpaolo-data-breach-reveals-monitoring-gaps/]]></guid>
			<link><![CDATA[https://fxtechnology.org/intesa-sanpaolo-data-breach-reveals-monitoring-gaps/]]></link>
			<title>Intesa Sanpaolo Data Breach Reveals Monitoring Gaps</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 05:24:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-builds-its-own-ai-stack-to-help-wean-it-from-its-reliance-on-openai-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-builds-its-own-ai-stack-to-help-wean-it-from-its-reliance-on-openai-computerworld/]]></link>
			<title>Microsoft builds its own AI stack to help wean it from its reliance on OpenAI – Computerworld</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 02:22:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/spyware-firm-used-fake-whatsapp-app-in-targeted-surveillance-operation/]]></guid>
			<link><![CDATA[https://fxtechnology.org/spyware-firm-used-fake-whatsapp-app-in-targeted-surveillance-operation/]]></link>
			<title>Spyware firm used fake WhatsApp app in targeted surveillance operation</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 02:21:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cloudflares-new-cms-is-not-a-wordpress-killer-its-a-wordpress-alternative/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cloudflares-new-cms-is-not-a-wordpress-killer-its-a-wordpress-alternative/]]></link>
			<title>Cloudflare’s new CMS is not a WordPress killer, it’s a WordPress alternative</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 01:21:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/kyndryl-service-targets-ai-agent-automation-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/kyndryl-service-targets-ai-agent-automation-security/]]></link>
			<title>Kyndryl service targets AI agent automation, security</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 22:25:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/google-research-talks-compression-technology-it-says-will-greatly-reduce-memory-needed-for-ai-processing/]]></guid>
			<link><![CDATA[https://fxtechnology.org/google-research-talks-compression-technology-it-says-will-greatly-reduce-memory-needed-for-ai-processing/]]></link>
			<title>Google Research talks compression technology it says will greatly reduce memory needed for AI processing</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 21:48:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/amazon-middle-east-datacenter-suffers-second-drone-hit-as-iran-steps-up-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/amazon-middle-east-datacenter-suffers-second-drone-hit-as-iran-steps-up-attacks/]]></link>
			<title>Amazon Middle East datacenter suffers second drone hit as Iran steps up attacks</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 21:31:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/]]></link>
			<title>Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 19:32:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/independent-audit-confirms-cloudflares-1-1-1-1-resolver-privacy-claims/]]></guid>
			<link><![CDATA[https://fxtechnology.org/independent-audit-confirms-cloudflares-1-1-1-1-resolver-privacy-claims/]]></link>
			<title>Independent audit confirms Cloudflare’s 1.1.1.1 resolver privacy claims</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 19:11:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/onlyoffice-accuses-euro-office-of-licensing-violations-suspends-nextcloud-partnership-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/onlyoffice-accuses-euro-office-of-licensing-violations-suspends-nextcloud-partnership-computerworld/]]></link>
			<title>OnlyOffice accuses Euro-Office of licensing violations, suspends Nextcloud partnership – Computerworld</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 17:11:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/critical-flaw-in-f5-big-ip-faces-wide-exploitation-risk/]]></guid>
			<link><![CDATA[https://fxtechnology.org/critical-flaw-in-f5-big-ip-faces-wide-exploitation-risk/]]></link>
			<title>Critical flaw in F5 BIG-IP faces wide exploitation risk</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 17:09:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/jamf-warns-of-massive-app-insecurities-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/jamf-warns-of-massive-app-insecurities-computerworld/]]></link>
			<title>Jamf warns of massive app insecurities – Computerworld</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:09:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fbi-warns-of-data-security-risks-in-foreign-mobile-apps/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fbi-warns-of-data-security-risks-in-foreign-mobile-apps/]]></link>
			<title>FBI Warns Of Data Security Risks In Foreign Mobile Apps</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:08:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/]]></link>
			<title>Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:02:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-tool-on-aws-makes-it-easier-to-develop-quantum-error-correction/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-tool-on-aws-makes-it-easier-to-develop-quantum-error-correction/]]></link>
			<title>New tool on AWS makes it easier to develop quantum error correction</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 13:17:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/toy-giant-hasbro-hit-by-cyberattack-that-disrupted-operations/]]></guid>
			<link><![CDATA[https://fxtechnology.org/toy-giant-hasbro-hit-by-cyberattack-that-disrupted-operations/]]></link>
			<title>Toy giant Hasbro hit by cyberattack that disrupted operations</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 13:05:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners/]]></guid>
			<link><![CDATA[https://fxtechnology.org/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners/]]></link>
			<title>Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 13:02:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories/]]></guid>
			<link><![CDATA[https://fxtechnology.org/pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories/]]></link>
			<title>Pre-Auth Chains, Android Rootkits, CloudTrail Evasion &#038; 10 More Stories</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:59:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-project-failure-has-little-to-do-with-ai-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-project-failure-has-little-to-do-with-ai-computerworld/]]></link>
			<title>AI project ‘failure’ has little to do with AI – Computerworld</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:37:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ibm-arm-team-up-to-bring-arm-software-to-ibm-z-mainframes/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ibm-arm-team-up-to-bring-arm-software-to-ibm-z-mainframes/]]></link>
			<title>IBM, Arm team up to bring Arm software to IBM Z mainframes</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:16:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/pxa-stealer-vietnam-linked-actors-exploit-linkedin/]]></guid>
			<link><![CDATA[https://fxtechnology.org/pxa-stealer-vietnam-linked-actors-exploit-linkedin/]]></link>
			<title>PXA Stealer: Vietnam-Linked Actors Exploit LinkedIn</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:03:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-state-of-trusted-open-source-report/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-state-of-trusted-open-source-report/]]></link>
			<title>The State of Trusted Open Source Report</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 11:57:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/crowdstrike-2026-global-threat-report-adversaries-use-ai-to-bypass-defenses/]]></guid>
			<link><![CDATA[https://fxtechnology.org/crowdstrike-2026-global-threat-report-adversaries-use-ai-to-bypass-defenses/]]></link>
			<title>Crowdstrike 2026 Global Threat Report: Adversaries Use AI to Bypass Defenses</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 01:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/retail-and-hospitality-cisos-expect-budget-growth-new-ai-headaches-and-opportunities/]]></guid>
			<link><![CDATA[https://fxtechnology.org/retail-and-hospitality-cisos-expect-budget-growth-new-ai-headaches-and-opportunities/]]></link>
			<title>Retail and hospitality CISOs expect budget growth, new AI headaches and opportunities</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 00:19:14 +0000]]></pubDate>
		</item>
				</channel>
</rss>
