<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 23, 2026 at 6:37 pm by All in One SEO v4.9.7.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Sat, 23 May 2026 16:21:37 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/mcdonalds-france-resets-accounts-after-customer-data-breach/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mcdonalds-france-resets-accounts-after-customer-data-breach/]]></link>
			<title>McDonald’s France resets accounts after customer data breach</title>
			<pubDate><![CDATA[Sat, 23 May 2026 16:21:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/packagist-supply-chain-attack-infects-8-packages-using-github-hosted-linux-malware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/packagist-supply-chain-attack-infects-8-packages-using-github-hosted-linux-malware/]]></link>
			<title>Packagist Supply Chain Attack Infects 8 Packages Using GitHub-Hosted Linux Malware</title>
			<pubDate><![CDATA[Sat, 23 May 2026 16:17:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/european-agencies-shutter-first-vpn-service/]]></guid>
			<link><![CDATA[https://fxtechnology.org/european-agencies-shutter-first-vpn-service/]]></link>
			<title>European Agencies Shutter First VPN Service</title>
			<pubDate><![CDATA[Sat, 23 May 2026 15:20:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/a-practical-playbook-for-traditional-organizations/]]></guid>
			<link><![CDATA[https://fxtechnology.org/a-practical-playbook-for-traditional-organizations/]]></link>
			<title>A Practical Playbook for Traditional Organizations</title>
			<pubDate><![CDATA[Sat, 23 May 2026 14:19:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/claude-mythos-ai-finds-10000-high-severity-flaws-in-widely-used-software/]]></guid>
			<link><![CDATA[https://fxtechnology.org/claude-mythos-ai-finds-10000-high-severity-flaws-in-widely-used-software/]]></link>
			<title>Claude Mythos AI Finds 10,000 High-Severity Flaws in Widely Used Software</title>
			<pubDate><![CDATA[Sat, 23 May 2026 12:03:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nordvpn-wins-early-court-victory-against-laligas-vpn-blocking-campaign/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nordvpn-wins-early-court-victory-against-laligas-vpn-blocking-campaign/]]></link>
			<title>NordVPN wins early court victory against LaLiga’s VPN blocking campaign</title>
			<pubDate><![CDATA[Sat, 23 May 2026 11:16:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/laravel-lang-php-packages-compromised-to-deliver-cross-platform-credential-stealer/]]></guid>
			<link><![CDATA[https://fxtechnology.org/laravel-lang-php-packages-compromised-to-deliver-cross-platform-credential-stealer/]]></link>
			<title>Laravel-Lang PHP Packages Compromised to Deliver Cross-Platform Credential Stealer</title>
			<pubDate><![CDATA[Sat, 23 May 2026 11:11:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-defender-cve-2026-41091-cve-2026-45498/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-defender-cve-2026-41091-cve-2026-45498/]]></link>
			<title>Microsoft Defender CVE-2026-41091 &#038; CVE-2026-45498</title>
			<pubDate><![CDATA[Sat, 23 May 2026 10:14:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-agentic-ai-and-automation-are-changing-cybersecurity/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-agentic-ai-and-automation-are-changing-cybersecurity/]]></link>
			<title>How Agentic AI and Automation Are Changing Cybersecurity</title>
			<pubDate><![CDATA[Sat, 23 May 2026 09:13:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/drupal-core-sql-injection-bug-actively-exploited-added-to-cisa-kev/]]></guid>
			<link><![CDATA[https://fxtechnology.org/drupal-core-sql-injection-bug-actively-exploited-added-to-cisa-kev/]]></link>
			<title>Drupal Core SQL Injection Bug Actively Exploited, Added to CISA KEV</title>
			<pubDate><![CDATA[Sat, 23 May 2026 09:00:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/litespeed-cpanel-plugin-cve-2026-48172-exploited-to-run-scripts-as-root/]]></guid>
			<link><![CDATA[https://fxtechnology.org/litespeed-cpanel-plugin-cve-2026-48172-exploited-to-run-scripts-as-root/]]></link>
			<title>LiteSpeed cPanel Plugin CVE-2026-48172 Exploited to Run Scripts as Root</title>
			<pubDate><![CDATA[Sat, 23 May 2026 07:59:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/scams-target-soccer-fans-with-fake-world-cup-tickets-merchandise/]]></guid>
			<link><![CDATA[https://fxtechnology.org/scams-target-soccer-fans-with-fake-world-cup-tickets-merchandise/]]></link>
			<title>Scams target soccer fans with fake World Cup tickets, merchandise</title>
			<pubDate><![CDATA[Sat, 23 May 2026 06:43:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/proton-vpn-vows-to-resist-canadian-surveillance-demands-under-bill-c-22/]]></guid>
			<link><![CDATA[https://fxtechnology.org/proton-vpn-vows-to-resist-canadian-surveillance-demands-under-bill-c-22/]]></link>
			<title>Proton VPN vows to resist Canadian surveillance demands under Bill C-22</title>
			<pubDate><![CDATA[Sat, 23 May 2026 06:08:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-driven-threats-critical-vulnerabilities-and-supply-chain-breaches-define-the-week-in-may-2026/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-driven-threats-critical-vulnerabilities-and-supply-chain-breaches-define-the-week-in-may-2026/]]></link>
			<title>AI-Driven Threats, Critical Vulnerabilities, and Supply Chain Breaches Define the Week in May 2026</title>
			<pubDate><![CDATA[Sat, 23 May 2026 05:07:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-york-regulator-calls-for-additional-cyber-mitigation-amid-heightened-threat-environment/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-york-regulator-calls-for-additional-cyber-mitigation-amid-heightened-threat-environment/]]></link>
			<title>New York regulator calls for additional cyber mitigation amid heightened threat environment</title>
			<pubDate><![CDATA[Sat, 23 May 2026 04:05:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/vulnerability-exploitation-tops-cyber-breach-entry-points/]]></guid>
			<link><![CDATA[https://fxtechnology.org/vulnerability-exploitation-tops-cyber-breach-entry-points/]]></link>
			<title>Vulnerability Exploitation Tops Cyber Breach Entry Points</title>
			<pubDate><![CDATA[Sat, 23 May 2026 03:04:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-tycoon-2fa-phishing-kit-has-evolved/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-tycoon-2fa-phishing-kit-has-evolved/]]></link>
			<title>The Tycoon 2FA Phishing Kit Has Evolved</title>
			<pubDate><![CDATA[Sat, 23 May 2026 02:03:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/telegrams-mtproto-protocol-leaks-persistent-identifiers-enabling-user-tracking/]]></guid>
			<link><![CDATA[https://fxtechnology.org/telegrams-mtproto-protocol-leaks-persistent-identifiers-enabling-user-tracking/]]></link>
			<title>Telegram’s MTProto protocol leaks persistent identifiers enabling user tracking</title>
			<pubDate><![CDATA[Fri, 22 May 2026 23:00:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/data-sanitization-challenges-are-increasing-in-the-ai-era/]]></guid>
			<link><![CDATA[https://fxtechnology.org/data-sanitization-challenges-are-increasing-in-the-ai-era/]]></link>
			<title>Data Sanitization Challenges Are Increasing in the AI Era </title>
			<pubDate><![CDATA[Fri, 22 May 2026 21:59:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/iran-linked-hackers-target-key-us-allied-sectors-with-sophisticated-spear-phishing-messages/]]></guid>
			<link><![CDATA[https://fxtechnology.org/iran-linked-hackers-target-key-us-allied-sectors-with-sophisticated-spear-phishing-messages/]]></link>
			<title>Iran-linked hackers target key US, allied sectors with sophisticated spear-phishing messages</title>
			<pubDate><![CDATA[Fri, 22 May 2026 20:58:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-powered-marketing-service-active-listening-deceived-customers-ftc/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-powered-marketing-service-active-listening-deceived-customers-ftc/]]></link>
			<title>AI-Powered Marketing Service “Active Listening” Deceived Customers: FTC</title>
			<pubDate><![CDATA[Fri, 22 May 2026 19:57:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/knowbe4-ceo-bryan-palma-qa-from-kb4-con-2026/]]></guid>
			<link><![CDATA[https://fxtechnology.org/knowbe4-ceo-bryan-palma-qa-from-kb4-con-2026/]]></link>
			<title>KnowBe4 CEO Bryan Palma Q&#038;A From KB4-CON 2026</title>
			<pubDate><![CDATA[Fri, 22 May 2026 18:56:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/police-take-down-vpn-service-this-time-with-a-good-reason-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/police-take-down-vpn-service-this-time-with-a-good-reason-computerworld/]]></link>
			<title>Police take down VPN service (this time with a good reason) – Computerworld</title>
			<pubDate><![CDATA[Fri, 22 May 2026 18:25:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ibm-plans-2b-quantum-chip-foundry-government-will-pay-half/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ibm-plans-2b-quantum-chip-foundry-government-will-pay-half/]]></link>
			<title>IBM plans $2B quantum chip foundry; government will pay half</title>
			<pubDate><![CDATA[Fri, 22 May 2026 18:08:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fbi-warns-of-kali-oauth-stealers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fbi-warns-of-kali-oauth-stealers/]]></link>
			<title>FBI warns of Kali Oauth stealers</title>
			<pubDate><![CDATA[Fri, 22 May 2026 17:58:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ghostwriter-targets-ukraine-government-entities-with-prometheus-phishing-malware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ghostwriter-targets-ukraine-government-entities-with-prometheus-phishing-malware/]]></link>
			<title>Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware</title>
			<pubDate><![CDATA[Fri, 22 May 2026 17:47:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/meta-says-goodbye-to-those-who-wont-use-ai-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/meta-says-goodbye-to-those-who-wont-use-ai-computerworld/]]></link>
			<title>Meta says goodbye to those who won&#8217;t use AI – Computerworld</title>
			<pubDate><![CDATA[Fri, 22 May 2026 17:24:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/copy-fail-root-on-virtually-any-linux/]]></guid>
			<link><![CDATA[https://fxtechnology.org/copy-fail-root-on-virtually-any-linux/]]></link>
			<title>Copy Fail: root on virtually any Linux</title>
			<pubDate><![CDATA[Fri, 22 May 2026 17:00:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/workday-extends-sana-ai-to-itsm-after-hr-finance-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/workday-extends-sana-ai-to-itsm-after-hr-finance-computerworld/]]></link>
			<title>Workday extends Sana AI to ITSM after HR, finance – Computerworld</title>
			<pubDate><![CDATA[Fri, 22 May 2026 16:56:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak-krebs-on-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak-krebs-on-security/]]></link>
			<title>Lawmakers Demand Answers as CISA Tries to Contain Data Leak – Krebs on Security</title>
			<pubDate><![CDATA[Fri, 22 May 2026 16:55:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-ai-that-cracked-apple-silicon-is-only-the-beginning-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-ai-that-cracked-apple-silicon-is-only-the-beginning-computerworld/]]></link>
			<title>The AI that cracked Apple Silicon is only the beginning – Computerworld</title>
			<pubDate><![CDATA[Fri, 22 May 2026 16:23:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-says-its-making-ai-safe-for-work-in-your-browser-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-says-its-making-ai-safe-for-work-in-your-browser-computerworld/]]></link>
			<title>Microsoft says it&#8217;s making AI &#8216;safe for work&#8217; in your browser – Computerworld</title>
			<pubDate><![CDATA[Fri, 22 May 2026 15:56:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/canadian-arrested-for-operating-kimwolf-botnet-tied-to-record-ddos-attack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/canadian-arrested-for-operating-kimwolf-botnet-tied-to-record-ddos-attack/]]></link>
			<title>Canadian arrested for operating KimWolf botnet tied to record DDoS attack</title>
			<pubDate><![CDATA[Fri, 22 May 2026 15:52:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-ey-to-spend-1-billion-on-helping-customers-buy-agentic-ai-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-ey-to-spend-1-billion-on-helping-customers-buy-agentic-ai-computerworld/]]></link>
			<title>Microsoft, EY to spend $1 billion on helping customers buy agentic AI – Computerworld</title>
			<pubDate><![CDATA[Fri, 22 May 2026 15:22:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-ai-traffic-is-radically-reshaping-wans/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-ai-traffic-is-radically-reshaping-wans/]]></link>
			<title>Cisco: AI traffic is radically reshaping WANs</title>
			<pubDate><![CDATA[Fri, 22 May 2026 15:05:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-cybersecurity-education-and-the-defense-of-americas-digital-border/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-cybersecurity-education-and-the-defense-of-americas-digital-border/]]></link>
			<title>AI, Cybersecurity Education, and the Defense of America’s Digital Border</title>
			<pubDate><![CDATA[Fri, 22 May 2026 14:51:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cybersecurity-threats-ai-risks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cybersecurity-threats-ai-risks/]]></link>
			<title>Cybersecurity Threats &#038; AI Risks</title>
			<pubDate><![CDATA[Fri, 22 May 2026 13:50:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/megalodon-github-attack-targets-5561-repos-with-malicious-ci-cd-workflows/]]></guid>
			<link><![CDATA[https://fxtechnology.org/megalodon-github-attack-targets-5561-repos-with-malicious-ci-cd-workflows/]]></link>
			<title>Megalodon GitHub Attack Targets 5,561 Repos with Malicious CI/CD Workflows</title>
			<pubDate><![CDATA[Fri, 22 May 2026 13:44:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/why-email-security-needs-humans-on-the-loop/]]></guid>
			<link><![CDATA[https://fxtechnology.org/why-email-security-needs-humans-on-the-loop/]]></link>
			<title>Why Email Security Needs Humans-on-the-Loop</title>
			<pubDate><![CDATA[Fri, 22 May 2026 12:49:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/making-vulnerable-drivers-exploitable-without-hardware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/making-vulnerable-drivers-exploitable-without-hardware/]]></link>
			<title>Making Vulnerable Drivers Exploitable Without Hardware</title>
			<pubDate><![CDATA[Fri, 22 May 2026 12:35:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cloud-atlas-group-acquires-new-tools/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cloud-atlas-group-acquires-new-tools/]]></link>
			<title>Cloud Atlas group acquires new tools</title>
			<pubDate><![CDATA[Fri, 22 May 2026 09:49:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/trump-mobile-exposes-data-of-customers-who-ordered-the-t1-phone/]]></guid>
			<link><![CDATA[https://fxtechnology.org/trump-mobile-exposes-data-of-customers-who-ordered-the-t1-phone/]]></link>
			<title>Trump Mobile exposes data of customers who ordered the T1 phone</title>
			<pubDate><![CDATA[Fri, 22 May 2026 09:45:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/xai-anthropic-deal-signals-the-rise-of-ai-compute-as-a-standalone-business/]]></guid>
			<link><![CDATA[https://fxtechnology.org/xai-anthropic-deal-signals-the-rise-of-ai-compute-as-a-standalone-business/]]></link>
			<title>xAI-Anthropic deal signals the rise of AI compute as a standalone business</title>
			<pubDate><![CDATA[Fri, 22 May 2026 08:57:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/2026-verizon-dbir-the-new-era-of-cyber-threats/]]></guid>
			<link><![CDATA[https://fxtechnology.org/2026-verizon-dbir-the-new-era-of-cyber-threats/]]></link>
			<title>2026 Verizon DBIR: The New Era of Cyber Threats </title>
			<pubDate><![CDATA[Fri, 22 May 2026 08:43:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-fixes-cve-2026-20223-secure-workload-api-flaw/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-fixes-cve-2026-20223-secure-workload-api-flaw/]]></link>
			<title>Cisco Fixes CVE-2026-20223 Secure Workload API Flaw</title>
			<pubDate><![CDATA[Fri, 22 May 2026 07:40:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-patches-cvss-10-0-secure-workload-rest-api-flaw-enabling-data-access/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-patches-cvss-10-0-secure-workload-rest-api-flaw-enabling-data-access/]]></link>
			<title>Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access</title>
			<pubDate><![CDATA[Fri, 22 May 2026 07:29:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/with-ai-typings-out-talkings-in-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/with-ai-typings-out-talkings-in-computerworld/]]></link>
			<title>With AI, typing&#8217;s out, talking&#8217;s in – Computerworld</title>
			<pubDate><![CDATA[Fri, 22 May 2026 07:14:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/build-custom-high-impact-training-with-knowbe4s-content-creation-agent/]]></guid>
			<link><![CDATA[https://fxtechnology.org/build-custom-high-impact-training-with-knowbe4s-content-creation-agent/]]></link>
			<title>Build Custom, High-Impact Training with KnowBe4’s Content Creation Agent</title>
			<pubDate><![CDATA[Fri, 22 May 2026 06:37:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisa-adds-exploited-langflow-and-trend-micro-apex-one-vulnerabilities-to-kev/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisa-adds-exploited-langflow-and-trend-micro-apex-one-vulnerabilities-to-kev/]]></link>
			<title>CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV</title>
			<pubDate><![CDATA[Fri, 22 May 2026 06:28:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/alleged-kimwolf-botmaster-dort-arrested-charged-in-u-s-and-canada-krebs-on-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/alleged-kimwolf-botmaster-dort-arrested-charged-in-u-s-and-canada-krebs-on-security/]]></link>
			<title>Alleged Kimwolf Botmaster ‘Dort’ Arrested, Charged in U.S. and Canada – Krebs on Security</title>
			<pubDate><![CDATA[Fri, 22 May 2026 04:33:36 +0000]]></pubDate>
		</item>
				</channel>
</rss>
