<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 10, 2026 at 3:53 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Fri, 10 Apr 2026 13:53:27 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides/]]></guid>
			<link><![CDATA[https://fxtechnology.org/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides/]]></link>
			<title>GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 13:53:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hungarian-government-email-passwords-exposed-ahead-of-election-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hungarian-government-email-passwords-exposed-ahead-of-election-computerworld/]]></link>
			<title>Hungarian government email passwords exposed ahead of election – Computerworld</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 13:37:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/meta-moves-fast-toward-a-world-where-ai-builds-the-software-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/meta-moves-fast-toward-a-world-where-ai-builds-the-software-computerworld/]]></link>
			<title>Meta moves fast toward a world where AI builds the software – Computerworld</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 13:03:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-adds-hidden-feature-flags-to-windows-insider-builds-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-adds-hidden-feature-flags-to-windows-insider-builds-computerworld/]]></link>
			<title>Microsoft adds hidden feature flags to Windows Insider builds – Computerworld</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 12:36:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/pc-sales-rise-in-q1-despite-memory-shortage-idc-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/pc-sales-rise-in-q1-despite-memory-shortage-idc-computerworld/]]></link>
			<title>PC sales rise in Q1 despite memory shortage — IDC – Computerworld</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 12:02:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/signal-is-testing-a-new-plaintext-chat-export-feature-in-beta-8-7/]]></guid>
			<link><![CDATA[https://fxtechnology.org/signal-is-testing-a-new-plaintext-chat-export-feature-in-beta-8-7/]]></link>
			<title>Signal is testing a new plaintext chat export feature in Beta 8.7</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 12:00:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/iphone-notifications-become-a-backdoor/]]></guid>
			<link><![CDATA[https://fxtechnology.org/iphone-notifications-become-a-backdoor/]]></link>
			<title>IPhone Notifications Become A Backdoor</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:58:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/marimo-rce-flaw-cve-2026-39987-exploited-within-10-hours-of-disclosure/]]></guid>
			<link><![CDATA[https://fxtechnology.org/marimo-rce-flaw-cve-2026-39987-exploited-within-10-hours-of-disclosure/]]></link>
			<title>Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:45:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows/]]></guid>
			<link><![CDATA[https://fxtechnology.org/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows/]]></link>
			<title>Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 08:49:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/customer-service-bots-that-code-for-free-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/customer-service-bots-that-code-for-free-computerworld/]]></link>
			<title>customer-service bots that code for free – Computerworld</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 07:56:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/tor-explores-stateless-relays-to-prevent-data-exposure-from-server-seizures/]]></guid>
			<link><![CDATA[https://fxtechnology.org/tor-explores-stateless-relays-to-prevent-data-exposure-from-server-seizures/]]></link>
			<title>Tor explores “stateless” relays to prevent data exposure from server seizures</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 07:54:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/googles-new-ai-app-is-a-glimpse-of-the-future/]]></guid>
			<link><![CDATA[https://fxtechnology.org/googles-new-ai-app-is-a-glimpse-of-the-future/]]></link>
			<title>Google’s new AI app is a glimpse of the future</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 07:29:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/gitlab-security-update-fixes-cve-2026-5173-flaw/]]></guid>
			<link><![CDATA[https://fxtechnology.org/gitlab-security-update-fixes-cve-2026-5173-flaw/]]></link>
			<title>GitLab Security Update Fixes CVE-2026-5173 Flaw</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 06:53:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/backdoored-smart-slider-3-pro-update-distributed-via-compromised-nextend-servers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/backdoored-smart-slider-3-pro-update-distributed-via-compromised-nextend-servers/]]></link>
			<title>Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 06:47:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fbi-retrieved-deleted-signal-messages-from-iphone-notification-database/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fbi-retrieved-deleted-signal-messages-from-iphone-notification-database/]]></link>
			<title>FBI retrieved deleted Signal messages from iPhone notification database</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 03:51:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/adobe-acrobat-reader-zero-day-exploited-in-active-pdf-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/adobe-acrobat-reader-zero-day-exploited-in-active-pdf-attacks/]]></link>
			<title>Adobe Acrobat Reader Zero Day Exploited in Active PDF Attacks</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 02:50:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/google-owns-the-most-ai-compute-and-it-built-it-its-way/]]></guid>
			<link><![CDATA[https://fxtechnology.org/google-owns-the-most-ai-compute-and-it-built-it-its-way/]]></link>
			<title>Google owns the most AI compute, and it built it its way</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 02:10:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisa-adds-second-critical-flaw-in-ivanti-epmm-to-exploited-vulnerabilities-catalog/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisa-adds-second-critical-flaw-in-ivanti-epmm-to-exploited-vulnerabilities-catalog/]]></link>
			<title>CISA adds second critical flaw in Ivanti EPMM to exploited vulnerabilities catalog</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 01:47:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-ai-identifies-and-limits-human-risk/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-ai-identifies-and-limits-human-risk/]]></link>
			<title>How AI Identifies and Limits Human Risk</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 23:45:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/soho-router-compromise-forest-blizzard-dns-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/soho-router-compromise-forest-blizzard-dns-attacks/]]></link>
			<title>SOHO Router Compromise: Forest Blizzard DNS Attacks</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:46:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-to-acquire-galileo-for-ai-observability/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-to-acquire-galileo-for-ai-observability/]]></link>
			<title>Cisco to acquire Galileo for AI observability</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 22:05:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/chrome-rolls-out-hardware-bound-session-protection-to-combat-infostealer-malware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/chrome-rolls-out-hardware-bound-session-protection-to-combat-infostealer-malware/]]></link>
			<title>Chrome rolls out hardware-bound session protection to combat infostealer malware</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 20:42:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/3-6-million-crypto-heist-targets-bitcoin-depot/]]></guid>
			<link><![CDATA[https://fxtechnology.org/3-6-million-crypto-heist-targets-bitcoin-depot/]]></link>
			<title>$3.6 Million Crypto Heist Targets Bitcoin Depot</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 19:41:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nerc-is-actively-monitoring-the-grid-following-iran-linked-cyber-threat/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nerc-is-actively-monitoring-the-grid-following-iran-linked-cyber-threat/]]></link>
			<title>NERC is ‘actively monitoring the grid’ following Iran-linked cyber threat</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 18:39:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/what-is-ai-networking-how-it-automates-your-infrastructure-but-faces-challenges/]]></guid>
			<link><![CDATA[https://fxtechnology.org/what-is-ai-networking-how-it-automates-your-infrastructure-but-faces-challenges/]]></link>
			<title>What is AI networking? How it automates your infrastructure (but faces challenges)</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 18:03:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/neoclouds-gain-momentum-in-a-supply-constrained-world/]]></guid>
			<link><![CDATA[https://fxtechnology.org/neoclouds-gain-momentum-in-a-supply-constrained-world/]]></link>
			<title>Neoclouds gain momentum in a supply-constrained world</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 18:01:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/unc6783-turns-bpo-providers-into-cyberattack-gateways/]]></guid>
			<link><![CDATA[https://fxtechnology.org/unc6783-turns-bpo-providers-into-cyberattack-gateways/]]></link>
			<title>UNC6783 Turns BPO Providers Into Cyberattack Gateways</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 17:38:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallets/]]></guid>
			<link><![CDATA[https://fxtechnology.org/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallets/]]></link>
			<title>EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 17:28:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/chrome-vivaldi-and-the-challenge-of-changing-browsers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/chrome-vivaldi-and-the-challenge-of-changing-browsers/]]></link>
			<title>Chrome, Vivaldi, and the challenge of changing browsers</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 17:16:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/phishing-campaign-impersonates-palo-alto-networks-recruiters/]]></guid>
			<link><![CDATA[https://fxtechnology.org/phishing-campaign-impersonates-palo-alto-networks-recruiters/]]></link>
			<title>Phishing Campaign Impersonates Palo Alto Networks Recruiters</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 16:37:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/uat-10362-targets-taiwanese-ngos-with-lucidrook-malware-in-spear-phishing-campaigns/]]></guid>
			<link><![CDATA[https://fxtechnology.org/uat-10362-targets-taiwanese-ngos-with-lucidrook-malware-in-spear-phishing-campaigns/]]></link>
			<title>UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 16:31:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-new-m5-based-macbook-air-is-built-to-last-and-perform-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-new-m5-based-macbook-air-is-built-to-last-and-perform-computerworld/]]></link>
			<title>The new M5-based MacBook Air is built to last — and perform – Computerworld</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 16:14:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-worst-asus-best-for-laptop-repairability-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-worst-asus-best-for-laptop-repairability-computerworld/]]></link>
			<title>Apple worst, Asus best for laptop repairability – Computerworld</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:35:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/mallory-launches-ai-native-threat-intelligence-platform-turning-global-threat-data-into-prioritized-action-latest-hacking-news/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mallory-launches-ai-native-threat-intelligence-platform-turning-global-threat-data-into-prioritized-action-latest-hacking-news/]]></link>
			<title>Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action &#8211; Latest Hacking News</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:13:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/lumen-upstream-network-visibility-is-enterprise-securitys-new-front-line/]]></guid>
			<link><![CDATA[https://fxtechnology.org/lumen-upstream-network-visibility-is-enterprise-securitys-new-front-line/]]></link>
			<title>Lumen: Upstream network visibility is enterprise security&#8217;s new front line</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:11:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/yael-nardi-joins-minimus-as-chief-business-officer-to-head-growth-strategy/]]></guid>
			<link><![CDATA[https://fxtechnology.org/yael-nardi-joins-minimus-as-chief-business-officer-to-head-growth-strategy/]]></link>
			<title>Yael Nardi joins Minimus as Chief Business Officer to head growth strategy</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:56:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/us-court-refuses-to-stay-pentagons-supply-chain-risk-blacklisting-of-anthropic-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/us-court-refuses-to-stay-pentagons-supply-chain-risk-blacklisting-of-anthropic-computerworld/]]></link>
			<title>US court refuses to stay Pentagon’s ‘supply-chain risk’ blacklisting of Anthropic – Computerworld</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:35:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hackers-are-exploiting-adobe-reader-zero-day-flaw-to-steal-data/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hackers-are-exploiting-adobe-reader-zero-day-flaw-to-steal-data/]]></link>
			<title>Hackers are exploiting Adobe Reader zero-day flaw to steal data</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/]]></link>
			<title>Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:23:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nvidia-rubin-gpus-may-be-delayed-slowing-the-next-phase-of-ai-infrastructure/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nvidia-rubin-gpus-may-be-delayed-slowing-the-next-phase-of-ai-infrastructure/]]></link>
			<title>Nvidia Rubin GPUs may be delayed, slowing the next phase of AI infrastructure</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 12:55:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/grafanaghost-flaw-allows-silent-data-exfiltration/]]></guid>
			<link><![CDATA[https://fxtechnology.org/grafanaghost-flaw-allows-silent-data-exfiltration/]]></link>
			<title>GrafanaGhost Flaw Allows Silent Data Exfiltration</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 12:32:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/signature-healthcare-cyberattack-disrupts-brockton-hospital/]]></guid>
			<link><![CDATA[https://fxtechnology.org/signature-healthcare-cyberattack-disrupts-brockton-hospital/]]></link>
			<title>Signature Healthcare Cyberattack Disrupts Brockton Hospital</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 11:31:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/bitter-linked-hack-for-hire-campaign-targets-journalists-across-mena-region/]]></guid>
			<link><![CDATA[https://fxtechnology.org/bitter-linked-hack-for-hire-campaign-targets-journalists-across-mena-region/]]></link>
			<title>Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 11:25:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/adobe-reader-zero-day-exploited-via-malicious-pdfs-since-december-2025/]]></guid>
			<link><![CDATA[https://fxtechnology.org/adobe-reader-zero-day-exploited-via-malicious-pdfs-since-december-2025/]]></link>
			<title>Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 11:21:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/from-audit-fatigue-to-continuous-readiness/]]></guid>
			<link><![CDATA[https://fxtechnology.org/from-audit-fatigue-to-continuous-readiness/]]></link>
			<title>From Audit Fatigue to Continuous Readiness</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 15:03:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/clipbanker-trojan-masquerades-as-proxifier-software/]]></guid>
			<link><![CDATA[https://fxtechnology.org/clipbanker-trojan-masquerades-as-proxifier-software/]]></link>
			<title>ClipBanker Trojan masquerades as Proxifier software</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:37:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/us-warns-of-iranian-hackers-targeting-plcs-across-critical-sectors/]]></guid>
			<link><![CDATA[https://fxtechnology.org/us-warns-of-iranian-hackers-targeting-plcs-across-critical-sectors/]]></link>
			<title>US warns of Iranian hackers targeting PLCs across critical sectors</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 08:28:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/bitcoin-depot-cyberattack-leads-to-3-6-million-crypto-theft/]]></guid>
			<link><![CDATA[https://fxtechnology.org/bitcoin-depot-cyberattack-leads-to-3-6-million-crypto-theft/]]></link>
			<title>Bitcoin Depot Cyberattack Leads To $3.6 Million Crypto Theft</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 07:26:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/authorities-disrupt-dns-hijacking-campaign-targeting-tp-link-routers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/authorities-disrupt-dns-hijacking-campaign-targeting-tp-link-routers/]]></link>
			<title>Authorities disrupt DNS hijacking campaign targeting TP-Link routers</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 04:23:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-unveiled-a-new-high-end-market-opportunity-this-week-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-unveiled-a-new-high-end-market-opportunity-this-week-computerworld/]]></link>
			<title>Apple unveiled a new high-end market opportunity this week – Computerworld</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 15:40:52 +0000]]></pubDate>
		</item>
				</channel>
</rss>
