<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 13, 2026 at 10:41 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Wed, 13 May 2026 21:43:30 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/whatsapp-launches-incognito-chat-for-private-ai-conversations/]]></guid>
			<link><![CDATA[https://fxtechnology.org/whatsapp-launches-incognito-chat-for-private-ai-conversations/]]></link>
			<title>WhatsApp launches “Incognito Chat” for private AI conversations</title>
			<pubDate><![CDATA[Wed, 13 May 2026 21:43:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/foxconn-confirms-cyberattack-affecting-some-north-american-facilities/]]></guid>
			<link><![CDATA[https://fxtechnology.org/foxconn-confirms-cyberattack-affecting-some-north-american-facilities/]]></link>
			<title>Foxconn confirms cyberattack affecting some North American facilities</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:41:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/jobs-lost-to-ai-could-reappear-elsewhere-and-solidify-ai-focused-roles-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/jobs-lost-to-ai-could-reappear-elsewhere-and-solidify-ai-focused-roles-computerworld/]]></link>
			<title>Jobs lost to AI could reappear elsewhere — and solidify AI-focused roles – Computerworld</title>
			<pubDate><![CDATA[Wed, 13 May 2026 19:41:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/navigating-the-cybersecurity-landscape-in-india-empowering-human-and-ai-agents/]]></guid>
			<link><![CDATA[https://fxtechnology.org/navigating-the-cybersecurity-landscape-in-india-empowering-human-and-ai-agents/]]></link>
			<title>Navigating the Cybersecurity Landscape in India Empowering Human and AI Agents</title>
			<pubDate><![CDATA[Wed, 13 May 2026 19:39:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/startup-span-teams-with-nvidia-to-put-data-center-nodes-in-your-backyard/]]></guid>
			<link><![CDATA[https://fxtechnology.org/startup-span-teams-with-nvidia-to-put-data-center-nodes-in-your-backyard/]]></link>
			<title>Startup SPAN teams with Nvidia to put data center nodes in your backyard</title>
			<pubDate><![CDATA[Wed, 13 May 2026 18:08:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/wi-fi-8-is-closer-than-you-think-heres-what-you-need-to-know/]]></guid>
			<link><![CDATA[https://fxtechnology.org/wi-fi-8-is-closer-than-you-think-heres-what-you-need-to-know/]]></link>
			<title>Wi-Fi 8 is closer than you think. Here’s what you need to know</title>
			<pubDate><![CDATA[Wed, 13 May 2026 17:47:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-board-is-asking-the-wrong-security-question/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-board-is-asking-the-wrong-security-question/]]></link>
			<title>The Board Is Asking The Wrong Security Question</title>
			<pubDate><![CDATA[Wed, 13 May 2026 17:35:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/raccoonline-shares-technical-overview-of-vless-protocol-in-new-engineering-explainer-latest-hacking-news/]]></guid>
			<link><![CDATA[https://fxtechnology.org/raccoonline-shares-technical-overview-of-vless-protocol-in-new-engineering-explainer-latest-hacking-news/]]></link>
			<title>RaccoonLine Shares Technical Overview of VLESS Protocol in New Engineering Explainer &#8211; Latest Hacking News</title>
			<pubDate><![CDATA[Wed, 13 May 2026 17:16:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hard-drive-shortage-affecting-enterprise-storage-needs/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hard-drive-shortage-affecting-enterprise-storage-needs/]]></link>
			<title>Hard drive shortage affecting enterprise storage needs</title>
			<pubDate><![CDATA[Wed, 13 May 2026 17:07:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/viral-ruview-github-project-uses-wi-fi-to-track-movement-through-walls/]]></guid>
			<link><![CDATA[https://fxtechnology.org/viral-ruview-github-project-uses-wi-fi-to-track-movement-through-walls/]]></link>
			<title>Viral ‘RuView’ GitHub project uses Wi-Fi to track movement through walls</title>
			<pubDate><![CDATA[Wed, 13 May 2026 16:35:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsofts-mdash-ai-system-finds-16-windows-flaws-fixed-in-patch-tuesday/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsofts-mdash-ai-system-finds-16-windows-flaws-fixed-in-patch-tuesday/]]></link>
			<title>Microsoft&#8217;s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday</title>
			<pubDate><![CDATA[Wed, 13 May 2026 16:25:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/first-they-come-for-foxconn-then-they-come-for-you-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/first-they-come-for-foxconn-then-they-come-for-you-computerworld/]]></link>
			<title>First they come for Foxconn, then they come for you – Computerworld</title>
			<pubDate><![CDATA[Wed, 13 May 2026 16:06:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nvidia-nemoclaw-research-highlights-ai-sandbox-exfiltration-risks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nvidia-nemoclaw-research-highlights-ai-sandbox-exfiltration-risks/]]></link>
			<title>NVIDIA NemoClaw Research Highlights AI Sandbox Exfiltration Risks</title>
			<pubDate><![CDATA[Wed, 13 May 2026 15:33:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/canvas-owner-reaches-agreement-with-threat-actors-after-data-breach/]]></guid>
			<link><![CDATA[https://fxtechnology.org/canvas-owner-reaches-agreement-with-threat-actors-after-data-breach/]]></link>
			<title>Canvas owner reaches ‘agreement’ with threat actors after data breach</title>
			<pubDate><![CDATA[Wed, 13 May 2026 14:32:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-may-2026-patch-tuesday-fixes-120-flaws/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-may-2026-patch-tuesday-fixes-120-flaws/]]></link>
			<title>Microsoft May 2026 Patch Tuesday Fixes 120 Flaws</title>
			<pubDate><![CDATA[Wed, 13 May 2026 13:31:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-open-sources-agentic-ai-security-spec/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-open-sources-agentic-ai-security-spec/]]></link>
			<title>Cisco open-sources agentic AI security spec</title>
			<pubDate><![CDATA[Wed, 13 May 2026 12:42:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsofts-new-ai-system-finds-16-windows-flaws-including-four-critical-rces/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsofts-new-ai-system-finds-16-windows-flaws-including-four-critical-rces/]]></link>
			<title>Microsoft’s new AI system finds 16 Windows flaws, including four critical RCEs</title>
			<pubDate><![CDATA[Wed, 13 May 2026 12:32:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/4-in-10-uk-businesses-were-breached-by-phishing-last-year/]]></guid>
			<link><![CDATA[https://fxtechnology.org/4-in-10-uk-businesses-were-breached-by-phishing-last-year/]]></link>
			<title>4 in 10 UK Businesses Were Breached by Phishing Last Year</title>
			<pubDate><![CDATA[Wed, 13 May 2026 12:30:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-patches-138-vulnerabilities-including-dns-and-netlogon-rce-flaws/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-patches-138-vulnerabilities-including-dns-and-netlogon-rce-flaws/]]></link>
			<title>Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws</title>
			<pubDate><![CDATA[Wed, 13 May 2026 11:18:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/8-critical-questions-about-the-googlebook-android-and-chromeos-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/8-critical-questions-about-the-googlebook-android-and-chromeos-computerworld/]]></link>
			<title>8 critical questions about the Googlebook, Android, and ChromeOS – Computerworld</title>
			<pubDate><![CDATA[Wed, 13 May 2026 11:01:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/signal-rolls-out-new-protections-against-impersonation-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/signal-rolls-out-new-protections-against-impersonation-attacks/]]></link>
			<title>Signal rolls out new protections against impersonation attacks</title>
			<pubDate><![CDATA[Wed, 13 May 2026 09:27:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/eu-surveillance-technology-exports-face-scrutiny/]]></guid>
			<link><![CDATA[https://fxtechnology.org/eu-surveillance-technology-exports-face-scrutiny/]]></link>
			<title>EU Surveillance Technology Exports Face Scrutiny</title>
			<pubDate><![CDATA[Wed, 13 May 2026 08:26:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/android-adds-intrusion-logging-for-sophisticated-spyware-forensics/]]></guid>
			<link><![CDATA[https://fxtechnology.org/android-adds-intrusion-logging-for-sophisticated-spyware-forensics/]]></link>
			<title>Android Adds Intrusion Logging for Sophisticated Spyware Forensics</title>
			<pubDate><![CDATA[Wed, 13 May 2026 08:20:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/whos-the-winner-in-the-new-microsoft-openai-deal-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/whos-the-winner-in-the-new-microsoft-openai-deal-computerworld/]]></link>
			<title>Who’s the winner in the new Microsoft-OpenAI deal? – Computerworld</title>
			<pubDate><![CDATA[Wed, 13 May 2026 07:27:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/canvas-owner-reaches-agreement-with-shinyhunters-says-user-data-was-deleted/]]></guid>
			<link><![CDATA[https://fxtechnology.org/canvas-owner-reaches-agreement-with-shinyhunters-says-user-data-was-deleted/]]></link>
			<title>Canvas owner reaches agreement with ShinyHunters, says user data was deleted</title>
			<pubDate><![CDATA[Wed, 13 May 2026 05:23:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-and-an-absent-government-takeaways-from-rsac-2026/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-and-an-absent-government-takeaways-from-rsac-2026/]]></link>
			<title>AI and an absent government: Takeaways from RSAC 2026</title>
			<pubDate><![CDATA[Wed, 13 May 2026 04:22:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-is-ready-to-take-over-python-programming-but-not-much-else-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-is-ready-to-take-over-python-programming-but-not-much-else-computerworld/]]></link>
			<title>AI is ready to take over Python programming, but not much else – Computerworld</title>
			<pubDate><![CDATA[Wed, 13 May 2026 02:51:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/windows-11-security-update-fixes-critical-bing-and-azure-flaws/]]></guid>
			<link><![CDATA[https://fxtechnology.org/windows-11-security-update-fixes-critical-bing-and-azure-flaws/]]></link>
			<title>Windows 11 security update fixes critical Bing and Azure flaws</title>
			<pubDate><![CDATA[Wed, 13 May 2026 00:17:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/banks-face-a-growing-ai-risk-at-the-database-layer/]]></guid>
			<link><![CDATA[https://fxtechnology.org/banks-face-a-growing-ai-risk-at-the-database-layer/]]></link>
			<title>Banks Face a Growing AI Risk at the Database Layer</title>
			<pubDate><![CDATA[Tue, 12 May 2026 23:16:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/guardrail-technologies-launches-traffic-light-for-code-first-security-technology-to-verify-secure-ai-code-and-the-people-creating-it/]]></guid>
			<link><![CDATA[https://fxtechnology.org/guardrail-technologies-launches-traffic-light-for-code-first-security-technology-to-verify-secure-ai-code-and-the-people-creating-it/]]></link>
			<title>Guardrail Technologies launches Traffic Light for Code &#038; AI™; first security technology to verify &#038; secure AI code and the people creating it</title>
			<pubDate><![CDATA[Tue, 12 May 2026 22:15:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/navigating-human-and-agentic-risks-for-financial-institutions-in-the-apj-region/]]></guid>
			<link><![CDATA[https://fxtechnology.org/navigating-human-and-agentic-risks-for-financial-institutions-in-the-apj-region/]]></link>
			<title>Navigating Human and Agentic Risks for Financial Institutions in the APJ Region</title>
			<pubDate><![CDATA[Tue, 12 May 2026 21:14:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/mullvad-shares-workaround-for-android-16-vpn-leak-that-remains-unfixed/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mullvad-shares-workaround-for-android-16-vpn-leak-that-remains-unfixed/]]></link>
			<title>Mullvad shares workaround for Android 16 VPN leak that remains unfixed</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:10:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/rubygems-suspends-new-signups-after-hundreds-of-malicious-packages-are-uploaded/]]></guid>
			<link><![CDATA[https://fxtechnology.org/rubygems-suspends-new-signups-after-hundreds-of-malicious-packages-are-uploaded/]]></link>
			<title>RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:05:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hpe-revamps-private-cloud-stack-for-enterprises-rethinking-vmware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hpe-revamps-private-cloud-stack-for-enterprises-rethinking-vmware/]]></link>
			<title>HPE revamps private cloud stack for enterprises rethinking VMware</title>
			<pubDate><![CDATA[Tue, 12 May 2026 17:24:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/over-1-million-baby-monitors-and-security-cameras-exposed-through-meari-flaws/]]></guid>
			<link><![CDATA[https://fxtechnology.org/over-1-million-baby-monitors-and-security-cameras-exposed-through-meari-flaws/]]></link>
			<title>Over 1 Million Baby Monitors and Security Cameras Exposed Through Meari Flaws</title>
			<pubDate><![CDATA[Tue, 12 May 2026 17:10:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-exim-bdat-vulnerability-exposes-gnutls-builds-to-potential-code-execution/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-exim-bdat-vulnerability-exposes-gnutls-builds-to-potential-code-execution/]]></link>
			<title>New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution</title>
			<pubDate><![CDATA[Tue, 12 May 2026 17:01:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/from-nextstep-for-apple-to-apples-next-step-for-ai-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/from-nextstep-for-apple-to-apples-next-step-for-ai-computerworld/]]></link>
			<title>From NeXTStep for Apple to Apple’s next step for AI – Computerworld</title>
			<pubDate><![CDATA[Tue, 12 May 2026 16:41:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/versa-takes-aim-at-fragmented-enterprise-security-with-cspm-orchestration-update-and-ai-agent-controls/]]></guid>
			<link><![CDATA[https://fxtechnology.org/versa-takes-aim-at-fragmented-enterprise-security-with-cspm-orchestration-update-and-ai-agent-controls/]]></link>
			<title>Versa takes aim at fragmented enterprise security with CSPM, orchestration update, and AI agent controls</title>
			<pubDate><![CDATA[Tue, 12 May 2026 16:22:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/identity-takes-center-stage-as-a-leading-factor-in-enterprise-cyberattacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/identity-takes-center-stage-as-a-leading-factor-in-enterprise-cyberattacks/]]></link>
			<title>Identity takes center stage as a leading factor in enterprise cyberattacks</title>
			<pubDate><![CDATA[Tue, 12 May 2026 16:08:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-skills-development-could-define-europes-future/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-skills-development-could-define-europes-future/]]></link>
			<title>AI Skills Development Could Define Europe’s Future</title>
			<pubDate><![CDATA[Tue, 12 May 2026 15:07:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/red-hat-opens-ansible-to-ai-agents-within-limits/]]></guid>
			<link><![CDATA[https://fxtechnology.org/red-hat-opens-ansible-to-ai-agents-within-limits/]]></link>
			<title>Red Hat opens Ansible to AI agents, within limits</title>
			<pubDate><![CDATA[Tue, 12 May 2026 14:24:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cyberheistnews-vol-16-19-crafty-criminals-continue-to-pose-as-help-desks-in-social-engineering-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cyberheistnews-vol-16-19-crafty-criminals-continue-to-pose-as-help-desks-in-social-engineering-attacks/]]></link>
			<title>CyberheistNews Vol 16 #19 Crafty Criminals Continue to Pose as Help Desks in Social Engineering Attacks</title>
			<pubDate><![CDATA[Tue, 12 May 2026 14:06:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-trickmo-variant-uses-ton-c2-and-socks5-to-create-android-network-pivots/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-trickmo-variant-uses-ton-c2-and-socks5-to-create-android-network-pivots/]]></link>
			<title>New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots</title>
			<pubDate><![CDATA[Tue, 12 May 2026 14:00:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/openai-introduces-daybreak-cyber-platform-takes-on-anthropic-mythos-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/openai-introduces-daybreak-cyber-platform-takes-on-anthropic-mythos-computerworld/]]></link>
			<title>OpenAI introduces Daybreak cyber platform, takes on Anthropic Mythos – Computerworld</title>
			<pubDate><![CDATA[Tue, 12 May 2026 13:39:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/red-hat-sovereignty-is-more-than-just-compliance/]]></guid>
			<link><![CDATA[https://fxtechnology.org/red-hat-sovereignty-is-more-than-just-compliance/]]></link>
			<title>Red Hat: Sovereignty is more than just compliance</title>
			<pubDate><![CDATA[Tue, 12 May 2026 12:23:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/red-hat-offers-endless-linux-support-for-a-fee/]]></guid>
			<link><![CDATA[https://fxtechnology.org/red-hat-offers-endless-linux-support-for-a-fee/]]></link>
			<title>Red Hat offers endless Linux support — for a fee</title>
			<pubDate><![CDATA[Tue, 12 May 2026 12:19:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-shai-hulud-attack-breached-hundreds-of-npm-and-pypi-packages/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-shai-hulud-attack-breached-hundreds-of-npm-and-pypi-packages/]]></link>
			<title>New ‘Shai-Hulud’ attack breached hundreds of npm and PyPI packages</title>
			<pubDate><![CDATA[Tue, 12 May 2026 11:00:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-can-smbs-keep-up-with-ai-governance/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-can-smbs-keep-up-with-ai-governance/]]></link>
			<title>How Can SMBs Keep Up With AI Governance? </title>
			<pubDate><![CDATA[Tue, 12 May 2026 09:59:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/mini-shai-hulud-worm-compromises-tanstack-mistral-ai-guardrails-ai-more-packages/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mini-shai-hulud-worm-compromises-tanstack-mistral-ai-guardrails-ai-more-packages/]]></link>
			<title>Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI &#038; More Packages</title>
			<pubDate><![CDATA[Tue, 12 May 2026 09:56:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/openai-daybreak-introduces-gpt-5-5-for-security-operations/]]></guid>
			<link><![CDATA[https://fxtechnology.org/openai-daybreak-introduces-gpt-5-5-for-security-operations/]]></link>
			<title>OpenAI Daybreak Introduces GPT-5.5 For Security Operations</title>
			<pubDate><![CDATA[Tue, 12 May 2026 08:58:48 +0000]]></pubDate>
		</item>
				</channel>
</rss>
