<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 16, 2026 at 9:49 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Thu, 16 Apr 2026 18:58:11 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/cios-fret-over-rising-security-concerns-amid-ai-adoption/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cios-fret-over-rising-security-concerns-amid-ai-adoption/]]></link>
			<title>CIOs fret over rising security concerns amid AI adoption</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 18:58:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ukraine-warns-of-cyberattacks-on-healthcare-by-uac-0247/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ukraine-warns-of-cyberattacks-on-healthcare-by-uac-0247/]]></link>
			<title>Ukraine Warns Of Cyberattacks On Healthcare By UAC-0247</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 23:31:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic/]]></guid>
			<link><![CDATA[https://fxtechnology.org/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic/]]></link>
			<title>Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 18:55:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/in-nepal-and-sri-lanka-ai-boom-brings-hope-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/in-nepal-and-sri-lanka-ai-boom-brings-hope-computerworld/]]></link>
			<title>In Nepal and Sri Lanka, AI boom brings hope – Computerworld</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 17:58:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/education-authority-cyberattack-confirms-data-access/]]></guid>
			<link><![CDATA[https://fxtechnology.org/education-authority-cyberattack-confirms-data-access/]]></link>
			<title>Education Authority Cyberattack Confirms Data Access</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 17:57:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/quantum-safe-encrypted-cloud-storage-tuta-drive-debuts-in-closed-beta/]]></guid>
			<link><![CDATA[https://fxtechnology.org/quantum-safe-encrypted-cloud-storage-tuta-drive-debuts-in-closed-beta/]]></link>
			<title>Quantum-safe encrypted cloud storage Tuta Drive debuts in closed beta</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 14:52:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ibm-unveils-security-services-for-thwarting-agentic-attacks-automating-threat-assessment/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ibm-unveils-security-services-for-thwarting-agentic-attacks-automating-threat-assessment/]]></link>
			<title>IBM unveils security services for thwarting agentic attacks, automating threat assessment</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 14:06:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/north-korea-it-worker-scheme-two-sentenced-in-us/]]></guid>
			<link><![CDATA[https://fxtechnology.org/north-korea-it-worker-scheme-two-sentenced-in-us/]]></link>
			<title>North Korea IT Worker Scheme: Two Sentenced In US</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 13:51:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/]]></guid>
			<link><![CDATA[https://fxtechnology.org/defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/]]></link>
			<title>Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 13:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/openai-pulls-out-of-a-second-stargate-data-center-deal/]]></guid>
			<link><![CDATA[https://fxtechnology.org/openai-pulls-out-of-a-second-stargate-data-center-deal/]]></link>
			<title>OpenAI pulls out of a second Stargate data center deal</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 23:02:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsofts-windows-recall-still-allows-silent-data-extraction-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsofts-windows-recall-still-allows-silent-data-extraction-computerworld/]]></link>
			<title>Microsoft’s Windows Recall still allows silent data extraction – Computerworld</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 12:50:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/]]></link>
			<title>Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:43:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/]]></link>
			<title>Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:40:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-to-get-started-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-to-get-started-computerworld/]]></link>
			<title>How to get started – Computerworld</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:30:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/mcgraw-hill-data-breach-incident-exposed-13-5-million-accounts/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mcgraw-hill-data-breach-incident-exposed-13-5-million-accounts/]]></link>
			<title>McGraw Hill data breach incident exposed 13.5 million accounts</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 10:46:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hacker-matthew-lane-sentenced-in-powerschool-breach/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hacker-matthew-lane-sentenced-in-powerschool-breach/]]></link>
			<title>Hacker Matthew Lane Sentenced In PowerSchool Breach</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 09:45:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign/]]></guid>
			<link><![CDATA[https://fxtechnology.org/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign/]]></link>
			<title>UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 07:37:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-patch-tuesday-april-2026-fixes-167-bugs/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-patch-tuesday-april-2026-fixes-167-bugs/]]></link>
			<title>Microsoft Patch Tuesday April 2026 Fixes 167 Bugs</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 05:38:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/mcgraw-hill-confirms-data-exposure-tied-to-salesforce-issue/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mcgraw-hill-confirms-data-exposure-tied-to-salesforce-issue/]]></link>
			<title>McGraw-Hill Confirms Data Exposure Tied to Salesforce Issue </title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 01:33:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/medium-severity-flaw-in-microsoft-sharepoint-exploited/]]></guid>
			<link><![CDATA[https://fxtechnology.org/medium-severity-flaw-in-microsoft-sharepoint-exploited/]]></link>
			<title>Medium-severity flaw in Microsoft SharePoint exploited</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 00:32:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/google-to-penalize-back-button-hijacking-starting-june-2026/]]></guid>
			<link><![CDATA[https://fxtechnology.org/google-to-penalize-back-button-hijacking-starting-june-2026/]]></link>
			<title>Google to penalize “back button hijacking” starting June 2026</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 20:28:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fcc-exempts-netgear-from-foreign-router-ban/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fcc-exempts-netgear-from-foreign-router-ban/]]></link>
			<title>FCC exempts Netgear from foreign router ban</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 19:27:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/janaware-ransomware-hits-turkish-users-in-phishing-attack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/janaware-ransomware-hits-turkish-users-in-phishing-attack/]]></link>
			<title>JanaWare Ransomware Hits Turkish Users In Phishing Attack</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 18:26:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/n8n-webhooks-abused-since-october-2025-to-deliver-malware-via-phishing-emails/]]></guid>
			<link><![CDATA[https://fxtechnology.org/n8n-webhooks-abused-since-october-2025-to-deliver-malware-via-phishing-emails/]]></link>
			<title>n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 17:21:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-to-cut-windows-365-price-for-smbs-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-to-cut-windows-365-price-for-smbs-computerworld/]]></link>
			<title>Microsoft to cut Windows 365 price for SMBs – Computerworld</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 16:25:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/blancco-confirms-mac-adoption-is-accelerating-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/blancco-confirms-mac-adoption-is-accelerating-computerworld/]]></link>
			<title>Blancco confirms Mac adoption is accelerating – Computerworld</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 16:05:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/eff-urges-state-probe-into-google-over-undisclosed-data-sharing-with-ice/]]></guid>
			<link><![CDATA[https://fxtechnology.org/eff-urges-state-probe-into-google-over-undisclosed-data-sharing-with-ice/]]></link>
			<title>EFF urges state probe into Google over undisclosed data sharing with ICE</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 15:23:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/trusted-access-for-cyber-program-scales-up-at-openai/]]></guid>
			<link><![CDATA[https://fxtechnology.org/trusted-access-for-cyber-program-scales-up-at-openai/]]></link>
			<title>Trusted Access For Cyber Program Scales Up At OpenAI</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 14:22:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover/]]></guid>
			<link><![CDATA[https://fxtechnology.org/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover/]]></link>
			<title>Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 13:11:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/maine-to-put-brakes-on-big-data-centers-as-ai-expansion-collides-with-power-limits/]]></guid>
			<link><![CDATA[https://fxtechnology.org/maine-to-put-brakes-on-big-data-centers-as-ai-expansion-collides-with-power-limits/]]></link>
			<title>Maine to put brakes on big data centers as AI expansion collides with power limits</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 13:01:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more/]]></guid>
			<link><![CDATA[https://fxtechnology.org/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more/]]></link>
			<title>April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 12:53:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/industrial-threat-report-for-q4-2025/]]></guid>
			<link><![CDATA[https://fxtechnology.org/industrial-threat-report-for-q4-2025/]]></link>
			<title>Industrial threat report for Q4 2025</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 12:49:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fiverr-exposes-sensitive-data-via-public-urls-indexed-by-google/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fiverr-exposes-sensitive-data-via-public-urls-indexed-by-google/]]></link>
			<title>Fiverr exposes sensitive data via public URLs indexed by Google</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 11:15:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/itsm-vulnerabilities-in-ivanti-enable-session-persistence/]]></guid>
			<link><![CDATA[https://fxtechnology.org/itsm-vulnerabilities-in-ivanti-enable-session-persistence/]]></link>
			<title>ITSM Vulnerabilities In Ivanti Enable Session Persistence</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 10:13:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-to-create-your-own-custom-android-air-gesture-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-to-create-your-own-custom-android-air-gesture-computerworld/]]></link>
			<title>How to create your own custom Android air gesture – Computerworld</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:55:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-issues-patches-for-sharepoint-zero-day-and-168-other-new-vulnerabilities/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-issues-patches-for-sharepoint-zero-day-and-168-other-new-vulnerabilities/]]></link>
			<title>Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:06:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/can-microsoft-really-meet-its-carbon-negative-goal-by-2030-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/can-microsoft-really-meet-its-carbon-negative-goal-by-2030-computerworld/]]></link>
			<title>Can Microsoft really meet its carbon-negative goal by 2030? – Computerworld</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 07:11:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hallmark-data-breach-exposed-information-of-1-7-million-accounts/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hallmark-data-breach-exposed-information-of-1-7-million-accounts/]]></link>
			<title>Hallmark data breach exposed information of 1.7 million accounts</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 07:10:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-devices-satellite-link-is-under-new-ownership-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-devices-satellite-link-is-under-new-ownership-computerworld/]]></link>
			<title>Apple devices’ satellite link is under new ownership – Computerworld</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 05:09:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/openai-launches-gpt-5-4-cyber-with-expanded-access-for-security-teams/]]></guid>
			<link><![CDATA[https://fxtechnology.org/openai-launches-gpt-5-4-cyber-with-expanded-access-for-security-teams/]]></link>
			<title>OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 05:00:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/satellite-backhaul-service-globalstar-has-a-new-rich-owner-amid-challenging-market-conditions/]]></guid>
			<link><![CDATA[https://fxtechnology.org/satellite-backhaul-service-globalstar-has-a-new-rich-owner-amid-challenging-market-conditions/]]></link>
			<title>Satellite backhaul service Globalstar has a new, rich owner amid challenging market conditions</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 04:48:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ibms-government-dei-settlement-could-increase-pressure-to-avoid-tech-hiring-diversity-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ibms-government-dei-settlement-could-increase-pressure-to-avoid-tech-hiring-diversity-computerworld/]]></link>
			<title>IBM’s government DEI settlement could increase pressure to avoid tech hiring diversity – Computerworld</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 04:08:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/curity-looks-to-reinvent-iam-with-runtime-authorization-for-ai-agents-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/curity-looks-to-reinvent-iam-with-runtime-authorization-for-ai-agents-computerworld/]]></link>
			<title>Curity looks to reinvent IAM with runtime authorization for AI agents – Computerworld</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 03:48:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fake-ledger-app-on-the-apple-app-store-steals-9-5-million-from-50-users/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fake-ledger-app-on-the-apple-app-store-steals-9-5-million-from-50-users/]]></link>
			<title>Fake Ledger app on the Apple App Store steals $9.5 million from 50 users</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 03:05:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-shifts-it-roles-from-operator-to-orchestrator/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-shifts-it-roles-from-operator-to-orchestrator/]]></link>
			<title>AI shifts IT roles from operator to orchestrator</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 19:40:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/dark-web-article-contest-offers-10k-for-exploit-articles/]]></guid>
			<link><![CDATA[https://fxtechnology.org/dark-web-article-contest-offers-10k-for-exploit-articles/]]></link>
			<title>Dark Web Article Contest Offers $10K For Exploit Articles</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 02:03:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/patch-tuesday-april-2026-edition-krebs-on-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/patch-tuesday-april-2026-edition-krebs-on-security/]]></link>
			<title>Patch Tuesday, April 2026 Edition – Krebs on Security</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 23:59:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsofts-april-windows-update-fixes-165-flaws-one-exploited-zero-day/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsofts-april-windows-update-fixes-165-flaws-one-exploited-zero-day/]]></link>
			<title>Microsoft’s April Windows update fixes 165 flaws, one exploited zero-day</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 22:55:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fcc-signals-continued-commitment-to-cyber-trust-mark-program/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fcc-signals-continued-commitment-to-cyber-trust-mark-program/]]></link>
			<title>FCC signals continued commitment to Cyber Trust Mark program</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 21:54:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/eus-official-age-verification-app-found-exposing-sensitive-user-data/]]></guid>
			<link><![CDATA[https://fxtechnology.org/eus-official-age-verification-app-found-exposing-sensitive-user-data/]]></link>
			<title>EU’s official age verification app found exposing sensitive user data</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 19:59:45 +0000]]></pubDate>
		</item>
				</channel>
</rss>
