<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 24, 2026 at 12:23 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Thu, 23 Apr 2026 23:57:29 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/checkmarx-supply-chain-attack-exploits-docker-images-and-ci-cd-pipelines/]]></guid>
			<link><![CDATA[https://fxtechnology.org/checkmarx-supply-chain-attack-exploits-docker-images-and-ci-cd-pipelines/]]></link>
			<title>Checkmarx Supply Chain Attack Exploits Docker Images and CI/CD Pipelines </title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 23:57:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/china-disguises-cyberattacks-with-covert-network-botnets-us-and-allies-warn/]]></guid>
			<link><![CDATA[https://fxtechnology.org/china-disguises-cyberattacks-with-covert-network-botnets-us-and-allies-warn/]]></link>
			<title>China disguises cyberattacks with ‘covert network’ botnets, US and allies warn</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 22:56:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-may-be-the-only-laptop-vendor-to-grow-in-2026-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-may-be-the-only-laptop-vendor-to-grow-in-2026-computerworld/]]></link>
			<title>Apple may be the only laptop vendor to grow in 2026 – Computerworld</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 19:14:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/tropic-trooper-uses-trojanized-sumatrapdf-and-github-to-deploy-adaptixc2/]]></guid>
			<link><![CDATA[https://fxtechnology.org/tropic-trooper-uses-trojanized-sumatrapdf-and-github-to-deploy-adaptixc2/]]></link>
			<title>Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 10:01:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/uk-biobank-data-breach-raises-health-data-privacy-concerns/]]></guid>
			<link><![CDATA[https://fxtechnology.org/uk-biobank-data-breach-raises-health-data-privacy-concerns/]]></link>
			<title>UK Biobank Data Breach Raises Health Data Privacy Concerns</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 09:06:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/290m-defi-hack-macos-lotl-abuse-proxysmart-sim-farms-25-new-stories/]]></guid>
			<link><![CDATA[https://fxtechnology.org/290m-defi-hack-macos-lotl-abuse-proxysmart-sim-farms-25-new-stories/]]></link>
			<title>$290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 08:47:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/disclosing-phantomrpc-a-privilege-escalation-vulnerability-in-rpc/]]></guid>
			<link><![CDATA[https://fxtechnology.org/disclosing-phantomrpc-a-privilege-escalation-vulnerability-in-rpc/]]></link>
			<title>Disclosing PhantomRPC – a privilege escalation vulnerability in RPC</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 08:13:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure/]]></guid>
			<link><![CDATA[https://fxtechnology.org/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure/]]></link>
			<title>LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 07:46:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-fixes-ios-privacy-flaw-that-allowed-signal-message-retrieval/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-fixes-ios-privacy-flaw-that-allowed-signal-message-retrieval/]]></link>
			<title>Apple fixes iOS privacy flaw that allowed Signal message retrieval</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 06:03:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/a-burrow-full-of-malware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/a-burrow-full-of-malware/]]></link>
			<title>A burrow full of malware</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 05:45:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/university-of-warsaw-cyberattack-over-200000-files-leaked/]]></guid>
			<link><![CDATA[https://fxtechnology.org/university-of-warsaw-cyberattack-over-200000-files-leaked/]]></link>
			<title>University Of Warsaw Cyberattack: Over 200,000 Files Leaked</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 21:55:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/iran-nexus-threat-groups-refine-attacks-against-critical-infrastructure/]]></guid>
			<link><![CDATA[https://fxtechnology.org/iran-nexus-threat-groups-refine-attacks-against-critical-infrastructure/]]></link>
			<title>Iran-nexus threat groups refine attacks against critical infrastructure</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 05:02:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/enhance-eu-cybersecurity-with-ncaf-2-0-framework/]]></guid>
			<link><![CDATA[https://fxtechnology.org/enhance-eu-cybersecurity-with-ncaf-2-0-framework/]]></link>
			<title>Enhance EU Cybersecurity With NCAF 2.0 Framework</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 04:01:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-ai-workplace-paradox-higher-productivity-higher-anxiety/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-ai-workplace-paradox-higher-productivity-higher-anxiety/]]></link>
			<title>The AI workplace paradox: Higher productivity, higher anxiety</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 03:03:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-agentic-ai-frenzy-increases-as-more-vendors-stake-their-claims-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-agentic-ai-frenzy-increases-as-more-vendors-stake-their-claims-computerworld/]]></link>
			<title>The agentic AI frenzy increases as more vendors stake their claims – Computerworld</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 02:02:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/sony-to-enforce-age-checks-for-playstation-users-in-the-uk-starting-in-june/]]></guid>
			<link><![CDATA[https://fxtechnology.org/sony-to-enforce-age-checks-for-playstation-users-in-the-uk-starting-in-june/]]></link>
			<title>Sony to enforce age checks for PlayStation users in the UK starting in June</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 00:58:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/global-it-spending-to-grow-by-13-5-this-year-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/global-it-spending-to-grow-by-13-5-this-year-computerworld/]]></link>
			<title>Global IT spending to grow by 13.5% this year – Computerworld</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 18:53:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/bitwarden-cli-backdoored-in-checkmarx-supply-chain-attack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/bitwarden-cli-backdoored-in-checkmarx-supply-chain-attack/]]></link>
			<title>Bitwarden CLI backdoored in Checkmarx supply chain attack</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 18:51:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/unc6692-impersonates-it-helpdesk-via-microsoft-teams-to-deploy-snow-malware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/unc6692-impersonates-it-helpdesk-via-microsoft-teams-to-deploy-snow-malware/]]></link>
			<title>UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 18:42:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/mullvad-to-add-feature-that-forces-all-ios-traffic-through-the-vpn-tunnel/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mullvad-to-add-feature-that-forces-all-ios-traffic-through-the-vpn-tunnel/]]></link>
			<title>Mullvad to add feature that forces all iOS traffic through the VPN tunnel</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 21:27:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/firefox-flaw-enables-cross-site-tracking-undermines-tor-browser-defenses/]]></guid>
			<link><![CDATA[https://fxtechnology.org/firefox-flaw-enables-cross-site-tracking-undermines-tor-browser-defenses/]]></link>
			<title>Firefox flaw enables cross-site tracking, undermines Tor Browser defenses</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 10:07:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/anthropic-probes-alleged-unauthorized-access-to-ai-security-tool-mythos/]]></guid>
			<link><![CDATA[https://fxtechnology.org/anthropic-probes-alleged-unauthorized-access-to-ai-security-tool-mythos/]]></link>
			<title>Anthropic Probes Alleged Unauthorized Access to AI Security Tool Mythos</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 20:26:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/self-propagating-supply-chain-worm-hijacks-npm-packages-to-steal-developer-tokens/]]></guid>
			<link><![CDATA[https://fxtechnology.org/self-propagating-supply-chain-worm-hijacks-npm-packages-to-steal-developer-tokens/]]></link>
			<title>Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 20:16:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-written-software-creates-hassles-for-wary-security-teams/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-written-software-creates-hassles-for-wary-security-teams/]]></link>
			<title>AI-written software creates hassles for wary security teams</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 17:49:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/facial-recognition-policy-upheld-by-uk-court/]]></guid>
			<link><![CDATA[https://fxtechnology.org/facial-recognition-policy-upheld-by-uk-court/]]></link>
			<title>Facial Recognition Policy Upheld By UK Court</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 16:48:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/americans-lost-more-than-20-billion-to-fraud-last-year/]]></guid>
			<link><![CDATA[https://fxtechnology.org/americans-lost-more-than-20-billion-to-fraud-last-year/]]></link>
			<title>Americans Lost More Than $20 billion to Fraud Last Year</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 15:47:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/290m-defi-hack-macos-lol-abuse-proxysmart-sim-farms-25-new-stories/]]></guid>
			<link><![CDATA[https://fxtechnology.org/290m-defi-hack-macos-lol-abuse-proxysmart-sim-farms-25-new-stories/]]></link>
			<title>$290M DeFi Hack, macOS LoL Abuse, ProxySmart SIM Farms +25 New Stories</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 13:25:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/brave-brings-shred-to-android-for-one-tap-tracking-data-deletion/]]></guid>
			<link><![CDATA[https://fxtechnology.org/brave-brings-shred-to-android-for-one-tap-tracking-data-deletion/]]></link>
			<title>Brave brings “Shred” to Android for one-tap tracking data deletion</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 12:43:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/project-glasswing-proved-ai-can-find-the-bugs-whos-going-to-fix-them/]]></guid>
			<link><![CDATA[https://fxtechnology.org/project-glasswing-proved-ai-can-find-the-bugs-whos-going-to-fix-them/]]></link>
			<title>Project Glasswing Proved AI Can Find the Bugs. Who&#8217;s Going to Fix Them?</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 12:01:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cve-2026-40372-microsoft-patches-asp-net-core-privilege-escalation-vulnerability/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cve-2026-40372-microsoft-patches-asp-net-core-privilege-escalation-vulnerability/]]></link>
			<title>CVE-2026-40372: Microsoft Patches ASP.NET Core Privilege Escalation Vulnerability</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 11:42:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hacker-active-well-beyond-context-ai-compromise-vercel-ceo/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hacker-active-well-beyond-context-ai-compromise-vercel-ceo/]]></link>
			<title>Hacker Active Well Beyond Context.ai Compromise: Vercel CEO</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 10:41:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-ai-is-changing-copper-fiber-networking/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-ai-is-changing-copper-fiber-networking/]]></link>
			<title>How AI is changing copper, fiber networking</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 20:37:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/china-linked-gopherwhisper-infects-12-mongolian-government-systems-with-go-backdoors/]]></guid>
			<link><![CDATA[https://fxtechnology.org/china-linked-gopherwhisper-infects-12-mongolian-government-systems-with-go-backdoors/]]></link>
			<title>China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 10:33:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/vercel-finds-more-compromised-accounts-in-context-ai-linked-breach/]]></guid>
			<link><![CDATA[https://fxtechnology.org/vercel-finds-more-compromised-accounts-in-context-ai-linked-breach/]]></link>
			<title>Vercel Finds More Compromised Accounts in Context.ai-Linked Breach</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 08:57:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-patches-ios-flaw-that-stored-deleted-signal-notifications-in-fbi-forensic-case/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-patches-ios-flaw-that-stored-deleted-signal-notifications-in-fbi-forensic-case/]]></link>
			<title>Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 08:21:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/a-successful-ceo-who-stumbled-over-ai-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/a-successful-ceo-who-stumbled-over-ai-computerworld/]]></link>
			<title>a successful CEO who stumbled over AI – Computerworld</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 07:40:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/over-1300-sharepoint-servers-still-exposed-to-actively-exploited-spoofing-flaw/]]></guid>
			<link><![CDATA[https://fxtechnology.org/over-1300-sharepoint-servers-still-exposed-to-actively-exploited-spoofing-flaw/]]></link>
			<title>Over 1,300 SharePoint Servers Still Exposed to Actively Exploited Spoofing Flaw</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 06:37:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/phishing-sometimes-with-ais-help-topped-initial-access-methods-in-q1-cisco-says/]]></guid>
			<link><![CDATA[https://fxtechnology.org/phishing-sometimes-with-ais-help-topped-initial-access-methods-in-q1-cisco-says/]]></link>
			<title>Phishing — sometimes with AI’s help — topped initial-access methods in Q1, Cisco says</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 05:36:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/claude-mythos-signals-a-new-era-in-ai-driven-security-finding-271-flaws-in-firefox-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/claude-mythos-signals-a-new-era-in-ai-driven-security-finding-271-flaws-in-firefox-computerworld/]]></link>
			<title>Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox – Computerworld</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 01:56:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/5-best-free-vpns-you-can-trust/]]></guid>
			<link><![CDATA[https://fxtechnology.org/5-best-free-vpns-you-can-trust/]]></link>
			<title>5 Best Free VPNs You Can Trust</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 01:31:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/trumps-cisa-director-pick-withdraws-after-tumultuous-nomination/]]></guid>
			<link><![CDATA[https://fxtechnology.org/trumps-cisa-director-pick-withdraws-after-tumultuous-nomination/]]></link>
			<title>Trump’s CISA director pick withdraws after tumultuous nomination</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 00:30:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-sharepoint-vulnerability-widely-exposed-across-multiple-countries/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-sharepoint-vulnerability-widely-exposed-across-multiple-countries/]]></link>
			<title>Microsoft SharePoint vulnerability widely exposed across multiple countries</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 19:25:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/almost-40-of-data-center-projects-will-be-late-this-year-2027-looks-no-better/]]></guid>
			<link><![CDATA[https://fxtechnology.org/almost-40-of-data-center-projects-will-be-late-this-year-2027-looks-no-better/]]></link>
			<title>Almost 40% of data center projects will be late this year, 2027 looks no better</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 18:35:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-campaign/]]></guid>
			<link><![CDATA[https://fxtechnology.org/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-campaign/]]></link>
			<title>Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 14:37:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/bissa-scanner-an-ai-assisted-credential-harvesting-factory/]]></guid>
			<link><![CDATA[https://fxtechnology.org/bissa-scanner-an-ai-assisted-credential-harvesting-factory/]]></link>
			<title>Bissa Scanner, An AI-Assisted Credential Harvesting Factory</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 18:23:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/malicious-kics-docker-images-and-vs-code-extensions-hit-checkmarx-supply-chain/]]></guid>
			<link><![CDATA[https://fxtechnology.org/malicious-kics-docker-images-and-vs-code-extensions-hit-checkmarx-supply-chain/]]></link>
			<title>Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 18:14:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-switch-aimed-at-building-practical-quantum-networks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-switch-aimed-at-building-practical-quantum-networks/]]></link>
			<title>Cisco switch aimed at building practical quantum networks</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 13:59:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/phishing-campaigns-abuse-ai-workflow-automation-platforms/]]></guid>
			<link><![CDATA[https://fxtechnology.org/phishing-campaigns-abuse-ai-workflow-automation-platforms/]]></link>
			<title>Phishing Campaigns Abuse AI Workflow Automation Platforms</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 17:22:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/its-the-end-of-set-and-forget-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/its-the-end-of-set-and-forget-security/]]></link>
			<title>It’s the end of set-and-forget security</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 16:32:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases/]]></guid>
			<link><![CDATA[https://fxtechnology.org/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases/]]></link>
			<title>26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 12:04:58 +0000]]></pubDate>
		</item>
				</channel>
</rss>
