<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 21, 2026 at 12:29 pm by All in One SEO v4.9.7.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Wed, 20 May 2026 21:01:50 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/tor-launches-crowdfunding-campaign-to-support-internet-freedom-projects/]]></guid>
			<link><![CDATA[https://fxtechnology.org/tor-launches-crowdfunding-campaign-to-support-internet-freedom-projects/]]></link>
			<title>Tor launches crowdfunding campaign to support internet freedom projects</title>
			<pubDate><![CDATA[Wed, 20 May 2026 21:01:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-warns-of-two-actively-exploited-defender-vulnerabilities/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-warns-of-two-actively-exploited-defender-vulnerabilities/]]></link>
			<title>Microsoft Warns of Two Actively Exploited Defender Vulnerabilities</title>
			<pubDate><![CDATA[Thu, 21 May 2026 11:09:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-disrupts-malware-signing-service-used-by-ransomware-gangs/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-disrupts-malware-signing-service-used-by-ransomware-gangs/]]></link>
			<title>Microsoft Disrupts Malware-Signing Service Used by Ransomware Gangs</title>
			<pubDate><![CDATA[Wed, 20 May 2026 20:00:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/github-confirms-internal-repository-theft-as-teampcp-claims-attack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/github-confirms-internal-repository-theft-as-teampcp-claims-attack/]]></link>
			<title>GitHub confirms internal repository theft as TeamPCP claims attack</title>
			<pubDate><![CDATA[Thu, 21 May 2026 09:14:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/browser-threats-are-expanding-the-smb-attack-surface/]]></guid>
			<link><![CDATA[https://fxtechnology.org/browser-threats-are-expanding-the-smb-attack-surface/]]></link>
			<title>Browser Threats Are Expanding the SMB Attack Surface </title>
			<pubDate><![CDATA[Thu, 21 May 2026 08:13:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/9-year-old-linux-kernel-flaw-enables-root-command-execution-on-major-distros/]]></guid>
			<link><![CDATA[https://fxtechnology.org/9-year-old-linux-kernel-flaw-enables-root-command-execution-on-major-distros/]]></link>
			<title>9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros</title>
			<pubDate><![CDATA[Thu, 21 May 2026 08:06:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-world-of-ai-tokens-and-why-they-matter-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-world-of-ai-tokens-and-why-they-matter-computerworld/]]></link>
			<title>The world of AI tokens — and why they matter – Computerworld</title>
			<pubDate><![CDATA[Thu, 21 May 2026 07:13:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/compromised-coding-tool-helped-hackers-breach-thousands-of-github-repositories/]]></guid>
			<link><![CDATA[https://fxtechnology.org/compromised-coding-tool-helped-hackers-breach-thousands-of-github-repositories/]]></link>
			<title>Compromised coding tool helped hackers breach thousands of GitHub repositories</title>
			<pubDate><![CDATA[Thu, 21 May 2026 07:12:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/webworm-new-burrowing-techniques/]]></guid>
			<link><![CDATA[https://fxtechnology.org/webworm-new-burrowing-techniques/]]></link>
			<title>Webworm: New burrowing techniques</title>
			<pubDate><![CDATA[Thu, 21 May 2026 06:58:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/account-theft-scheme-uncovered-by-ukraine-cyber-police/]]></guid>
			<link><![CDATA[https://fxtechnology.org/account-theft-scheme-uncovered-by-ukraine-cyber-police/]]></link>
			<title>Account Theft Scheme Uncovered By Ukraine Cyber Police</title>
			<pubDate><![CDATA[Thu, 21 May 2026 06:11:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/github-internal-repositories-breached-via-malicious-nx-console-vs-code-extension/]]></guid>
			<link><![CDATA[https://fxtechnology.org/github-internal-repositories-breached-via-malicious-nx-console-vs-code-extension/]]></link>
			<title>GitHub Internal Repositories Breached via Malicious Nx Console VS Code Extension</title>
			<pubDate><![CDATA[Thu, 21 May 2026 04:28:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-assistants-can-be-hijacked-and-manipulated-by-inaudible-sounds/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-assistants-can-be-hijacked-and-manipulated-by-inaudible-sounds/]]></link>
			<title>AI assistants can be hijacked and manipulated by inaudible sounds</title>
			<pubDate><![CDATA[Thu, 21 May 2026 03:09:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/third-party-risk-management-needs-to-evolve/]]></guid>
			<link><![CDATA[https://fxtechnology.org/third-party-risk-management-needs-to-evolve/]]></link>
			<title>Third-Party Risk Management Needs to Evolve </title>
			<pubDate><![CDATA[Thu, 21 May 2026 02:07:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-is-working-on-a-patch-for-yellowkey-attack-on-bitlocker-offers-temporary-fix-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-is-working-on-a-patch-for-yellowkey-attack-on-bitlocker-offers-temporary-fix-computerworld/]]></link>
			<title>Microsoft is working on a patch for &#8216;YellowKey&#8217; attack on Bitlocker, offers temporary fix – Computerworld</title>
			<pubDate><![CDATA[Thu, 21 May 2026 01:08:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-disrupts-cybercrime-operation-that-hid-behind-legitimate-software/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-disrupts-cybercrime-operation-that-hid-behind-legitimate-software/]]></link>
			<title>Microsoft disrupts cybercrime operation that hid behind legitimate software</title>
			<pubDate><![CDATA[Thu, 21 May 2026 01:06:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/private-isac-launched-by-telecom-sector-against-cyberattacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/private-isac-launched-by-telecom-sector-against-cyberattacks/]]></link>
			<title>Private ISAC Launched By Telecom Sector Against Cyberattacks</title>
			<pubDate><![CDATA[Thu, 21 May 2026 00:05:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/7-eleven-hit-by-data-breach/]]></guid>
			<link><![CDATA[https://fxtechnology.org/7-eleven-hit-by-data-breach/]]></link>
			<title>7-Eleven hit by data breach</title>
			<pubDate><![CDATA[Wed, 20 May 2026 18:59:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/google-focuses-on-autonomous-ai-agents-in-gemini-3-5-flash-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/google-focuses-on-autonomous-ai-agents-in-gemini-3-5-flash-computerworld/]]></link>
			<title>Google focuses on autonomous AI agents in Gemini 3.5 Flash – Computerworld</title>
			<pubDate><![CDATA[Wed, 20 May 2026 18:36:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/highly-critical-drupal-core-flaw-exposes-postgresql-sites-to-rce-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/highly-critical-drupal-core-flaw-exposes-postgresql-sites-to-rce-attacks/]]></link>
			<title>Highly Critical Drupal Core Flaw Exposes PostgreSQL Sites to RCE Attacks</title>
			<pubDate><![CDATA[Thu, 21 May 2026 04:01:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/riverbed-expands-autonomous-ai-capabilities-for-aternity-platform/]]></guid>
			<link><![CDATA[https://fxtechnology.org/riverbed-expands-autonomous-ai-capabilities-for-aternity-platform/]]></link>
			<title>Riverbed expands autonomous AI capabilities for Aternity platform</title>
			<pubDate><![CDATA[Wed, 20 May 2026 18:10:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/non-consensual-intimate-images-under-scrutiny-in-uk/]]></guid>
			<link><![CDATA[https://fxtechnology.org/non-consensual-intimate-images-under-scrutiny-in-uk/]]></link>
			<title>Non-Consensual Intimate Images Under Scrutiny In UK</title>
			<pubDate><![CDATA[Wed, 20 May 2026 17:57:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/selector-targets-the-network-visibility-gap-in-multi-cloud-infrastructure/]]></guid>
			<link><![CDATA[https://fxtechnology.org/selector-targets-the-network-visibility-gap-in-multi-cloud-infrastructure/]]></link>
			<title>Selector targets the network visibility gap in multi-cloud infrastructure</title>
			<pubDate><![CDATA[Wed, 20 May 2026 17:35:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/romance-scams-cost-uk-victims-102-million-last-year/]]></guid>
			<link><![CDATA[https://fxtechnology.org/romance-scams-cost-uk-victims-102-million-last-year/]]></link>
			<title>Romance Scams Cost UK Victims £102 Million Last Year</title>
			<pubDate><![CDATA[Wed, 20 May 2026 16:56:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/webworm-deploys-echocreep-and-graphworm-backdoors-using-discord-and-ms-graph-api/]]></guid>
			<link><![CDATA[https://fxtechnology.org/webworm-deploys-echocreep-and-graphworm-backdoors-using-discord-and-ms-graph-api/]]></link>
			<title>Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API</title>
			<pubDate><![CDATA[Wed, 20 May 2026 16:54:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/beth-tschida-takes-over-at-jamf-as-ai-transforms-apple-in-the-enterprise-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/beth-tschida-takes-over-at-jamf-as-ai-transforms-apple-in-the-enterprise-computerworld/]]></link>
			<title>Beth Tschida takes over at Jamf as AI transforms Apple in the enterprise – Computerworld</title>
			<pubDate><![CDATA[Wed, 20 May 2026 15:59:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-reshapes-cybersecurity-workforce-priorities-as-it-teams-brace-for-new-risks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-reshapes-cybersecurity-workforce-priorities-as-it-teams-brace-for-new-risks/]]></link>
			<title>AI reshapes cybersecurity workforce priorities as IT teams brace for new risks</title>
			<pubDate><![CDATA[Wed, 20 May 2026 15:06:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-takes-down-malware-signing-service-behind-ransomware-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-takes-down-malware-signing-service-behind-ransomware-attacks/]]></link>
			<title>Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks</title>
			<pubDate><![CDATA[Wed, 20 May 2026 14:51:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/steam-removes-beyond-the-dark-horror-game-over-malware-reports/]]></guid>
			<link><![CDATA[https://fxtechnology.org/steam-removes-beyond-the-dark-horror-game-over-malware-reports/]]></link>
			<title>Steam removes &#8216;Beyond The Dark&#8217; horror game over malware reports</title>
			<pubDate><![CDATA[Wed, 20 May 2026 13:54:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/google-talks-singularity-while-scaling-up-agentic-ai-for-enterprises-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/google-talks-singularity-while-scaling-up-agentic-ai-for-enterprises-computerworld/]]></link>
			<title>Google talks ‘singularity’ while scaling up agentic AI for enterprises – Computerworld</title>
			<pubDate><![CDATA[Wed, 20 May 2026 13:31:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/chanhassen-dinner-theatres-cyberattack-disrupts-shows/]]></guid>
			<link><![CDATA[https://fxtechnology.org/chanhassen-dinner-theatres-cyberattack-disrupts-shows/]]></link>
			<title>Chanhassen Dinner Theatres Cyberattack Disrupts Shows</title>
			<pubDate><![CDATA[Wed, 20 May 2026 12:53:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/your-hub-for-document-creation-and-analysis-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/your-hub-for-document-creation-and-analysis-computerworld/]]></link>
			<title>Your hub for document creation and analysis – Computerworld</title>
			<pubDate><![CDATA[Wed, 20 May 2026 11:29:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/10-android-circle-to-search-superpowers-you-probably-never-noticed-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/10-android-circle-to-search-superpowers-you-probably-never-noticed-computerworld/]]></link>
			<title>10 Android Circle to Search superpowers you probably never noticed – Computerworld</title>
			<pubDate><![CDATA[Wed, 20 May 2026 10:53:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/github-breached-employee-device-hack-led-to-exfiltration-of-3800-internal-repos/]]></guid>
			<link><![CDATA[https://fxtechnology.org/github-breached-employee-device-hack-led-to-exfiltration-of-3800-internal-repos/]]></link>
			<title>GitHub Breached — Employee Device Hack Led to Exfiltration of 3,800+ Internal Repos</title>
			<pubDate><![CDATA[Wed, 20 May 2026 10:46:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-a-single-image-takes-control-of-a-mac/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-a-single-image-takes-control-of-a-mac/]]></link>
			<title>How a single image takes control of a Mac</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:56:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/discord-enables-e2ee-by-default-for-all-voice-and-video-communications/]]></guid>
			<link><![CDATA[https://fxtechnology.org/discord-enables-e2ee-by-default-for-all-voice-and-video-communications/]]></link>
			<title>Discord enables E2EE by default for all voice and video communications</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:50:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/chromadb-fastapi-chromatoast-rce-exploit-now/]]></guid>
			<link><![CDATA[https://fxtechnology.org/chromadb-fastapi-chromatoast-rce-exploit-now/]]></link>
			<title>ChromaDB FastAPI ChromaToast RCE Exploit Now</title>
			<pubDate><![CDATA[Wed, 20 May 2026 08:49:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-releases-mitigation-for-yellowkey-bitlocker-bypass-cve-2026-45585-exploit/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-releases-mitigation-for-yellowkey-bitlocker-bypass-cve-2026-45585-exploit/]]></link>
			<title>Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit</title>
			<pubDate><![CDATA[Wed, 20 May 2026 08:40:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/phishing-campaign-exploits-google-appsheets-to-target-facebook-accounts/]]></guid>
			<link><![CDATA[https://fxtechnology.org/phishing-campaign-exploits-google-appsheets-to-target-facebook-accounts/]]></link>
			<title>Phishing Campaign Exploits Google AppSheets to Target Facebook Accounts</title>
			<pubDate><![CDATA[Wed, 20 May 2026 07:48:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-quest-for-greater-tech-independence/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-quest-for-greater-tech-independence/]]></link>
			<title>The quest for greater tech independence</title>
			<pubDate><![CDATA[Wed, 20 May 2026 06:40:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/grafana-github-breach-exposes-source-code-via-tanstack-npm-attack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/grafana-github-breach-exposes-source-code-via-tanstack-npm-attack/]]></link>
			<title>Grafana GitHub Breach Exposes Source Code via TanStack npm Attack</title>
			<pubDate><![CDATA[Wed, 20 May 2026 06:07:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/github-investigating-teampcp-claimed-breach-of-4000-internal-repositories/]]></guid>
			<link><![CDATA[https://fxtechnology.org/github-investigating-teampcp-claimed-breach-of-4000-internal-repositories/]]></link>
			<title>GitHub Investigating TeamPCP Claimed Breach of ~4,000 Internal Repositories</title>
			<pubDate><![CDATA[Wed, 20 May 2026 05:40:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/mozilla-hardens-firefox-against-fingerprinting-adds-one-click-session-wipe/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mozilla-hardens-firefox-against-fingerprinting-adds-one-click-session-wipe/]]></link>
			<title>Mozilla hardens Firefox against fingerprinting, adds one-click session wipe</title>
			<pubDate><![CDATA[Wed, 20 May 2026 04:45:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/6-best-enterprise-password-managers-youll-actually-trust/]]></guid>
			<link><![CDATA[https://fxtechnology.org/6-best-enterprise-password-managers-youll-actually-trust/]]></link>
			<title>6 Best Enterprise Password Managers You’ll Actually Trust</title>
			<pubDate><![CDATA[Wed, 20 May 2026 03:44:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/patch-bypass-allows-hackers-to-exploit-prior-flaw-in-sonicwall-ssl-vpn/]]></guid>
			<link><![CDATA[https://fxtechnology.org/patch-bypass-allows-hackers-to-exploit-prior-flaw-in-sonicwall-ssl-vpn/]]></link>
			<title>Patch bypass allows hackers to exploit prior flaw in SonicWall SSL-VPN</title>
			<pubDate><![CDATA[Wed, 20 May 2026 02:43:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-refreshes-surface-line-with-biz-friendly-features-and-a-high-price-tag-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-refreshes-surface-line-with-biz-friendly-features-and-a-high-price-tag-computerworld/]]></link>
			<title>Microsoft refreshes Surface line with biz-friendly features – and a high price tag – Computerworld</title>
			<pubDate><![CDATA[Thu, 21 May 2026 11:55:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/enterpriseclaw-wants-to-bring-governance-to-the-openclaw-era-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/enterpriseclaw-wants-to-bring-governance-to-the-openclaw-era-computerworld/]]></link>
			<title>EnterpriseClaw wants to bring governance to the OpenClaw era – Computerworld</title>
			<pubDate><![CDATA[Wed, 20 May 2026 01:43:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nginx-rift-cve-2026-42945-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nginx-rift-cve-2026-42945-exploited-in-attacks/]]></link>
			<title>NGINX Rift: CVE-2026-42945 Exploited In Attacks</title>
			<pubDate><![CDATA[Wed, 20 May 2026 01:41:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cyberheistnews-vol-16-20-heads-up-today-you-have-only-60-seconds-to-stop-that-breach-are-you-ready/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cyberheistnews-vol-16-20-heads-up-today-you-have-only-60-seconds-to-stop-that-breach-are-you-ready/]]></link>
			<title>CyberheistNews Vol 16 #20 [Heads Up] Today You Have Only 60 Seconds to Stop That Breach. Are You Ready?</title>
			<pubDate><![CDATA[Wed, 20 May 2026 00:40:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/macos-flaw-allowed-rogue-apps-to-access-chat-and-browser-data/]]></guid>
			<link><![CDATA[https://fxtechnology.org/macos-flaw-allowed-rogue-apps-to-access-chat-and-browser-data/]]></link>
			<title>macOS flaw allowed rogue apps to access chat and browser data</title>
			<pubDate><![CDATA[Tue, 19 May 2026 21:37:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/linux-rootkits-router-0-day-ai-intrusions-scam-kits-and-25-new-stories/]]></guid>
			<link><![CDATA[https://fxtechnology.org/linux-rootkits-router-0-day-ai-intrusions-scam-kits-and-25-new-stories/]]></link>
			<title>Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories</title>
			<pubDate><![CDATA[Thu, 21 May 2026 12:10:40 +0000]]></pubDate>
		</item>
				</channel>
</rss>
