<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 1, 2026 at 6:37 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Fri, 01 May 2026 17:40:41 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/scenes-from-the-great-data-center-revolt/]]></guid>
			<link><![CDATA[https://fxtechnology.org/scenes-from-the-great-data-center-revolt/]]></link>
			<title>Scenes from the great data center revolt</title>
			<pubDate><![CDATA[Fri, 01 May 2026 17:40:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/supply-chain-attacks-ai-security-and-major-breaches-define-this-week-in-cybersecurity-in-may-2026/]]></guid>
			<link><![CDATA[https://fxtechnology.org/supply-chain-attacks-ai-security-and-major-breaches-define-this-week-in-cybersecurity-in-may-2026/]]></link>
			<title>Supply Chain Attacks, AI Security, and Major Breaches Define This Week in Cybersecurity in May 2026</title>
			<pubDate><![CDATA[Fri, 01 May 2026 17:19:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/enterprise-spotlight-transforming-software-development-with-ai/]]></guid>
			<link><![CDATA[https://fxtechnology.org/enterprise-spotlight-transforming-software-development-with-ai/]]></link>
			<title>Enterprise Spotlight: Transforming software development with AI</title>
			<pubDate><![CDATA[Fri, 01 May 2026 16:40:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/as-email-phishing-evolves-malicious-attachments-decline-and-qr-codes-surge/]]></guid>
			<link><![CDATA[https://fxtechnology.org/as-email-phishing-evolves-malicious-attachments-decline-and-qr-codes-surge/]]></link>
			<title>As email phishing evolves, malicious attachments decline and QR codes surge</title>
			<pubDate><![CDATA[Fri, 01 May 2026 16:18:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cybercrime-groups-using-vishing-and-sso-abuse-in-rapid-saas-extortion-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cybercrime-groups-using-vishing-and-sso-abuse-in-rapid-saas-extortion-attacks/]]></link>
			<title>Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks</title>
			<pubDate><![CDATA[Fri, 01 May 2026 14:43:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/china-linked-hackers-target-asian-governments-nato-state-journalists-and-activists/]]></guid>
			<link><![CDATA[https://fxtechnology.org/china-linked-hackers-target-asian-governments-nato-state-journalists-and-activists/]]></link>
			<title>China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists</title>
			<pubDate><![CDATA[Fri, 01 May 2026 14:07:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-breaks-records-admits-it-cant-make-macs-fast-enough-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-breaks-records-admits-it-cant-make-macs-fast-enough-computerworld/]]></link>
			<title>Apple breaks records, admits it can’t make Macs fast enough – Computerworld</title>
			<pubDate><![CDATA[Fri, 01 May 2026 13:46:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/spotlight-report-transforming-software-development-with-ai/]]></guid>
			<link><![CDATA[https://fxtechnology.org/spotlight-report-transforming-software-development-with-ai/]]></link>
			<title>Spotlight report: Transforming software development with AI</title>
			<pubDate><![CDATA[Fri, 01 May 2026 12:17:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/utah-becomes-first-us-state-to-require-age-verification-for-vpn-use/]]></guid>
			<link><![CDATA[https://fxtechnology.org/utah-becomes-first-us-state-to-require-age-verification-for-vpn-use/]]></link>
			<title>Utah becomes first US state to require age verification for VPN use</title>
			<pubDate><![CDATA[Fri, 01 May 2026 12:13:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/poisoned-ruby-gems-and-go-modules-exploit-ci-pipelines-for-credential-theft/]]></guid>
			<link><![CDATA[https://fxtechnology.org/poisoned-ruby-gems-and-go-modules-exploit-ci-pipelines-for-credential-theft/]]></link>
			<title>Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft</title>
			<pubDate><![CDATA[Fri, 01 May 2026 12:04:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cybersecurity-breaches-ai-risks-2026/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cybersecurity-breaches-ai-risks-2026/]]></link>
			<title>Cybersecurity Breaches &#038; AI Risks 2026</title>
			<pubDate><![CDATA[Fri, 01 May 2026 11:12:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/25-great-uses-for-an-old-android-device-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/25-great-uses-for-an-old-android-device-computerworld/]]></link>
			<title>25 great uses for an old Android device – Computerworld</title>
			<pubDate><![CDATA[Fri, 01 May 2026 10:16:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/two-cybersecurity-professionals-get-4-year-sentences-in-blackcat-ransomware-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/two-cybersecurity-professionals-get-4-year-sentences-in-blackcat-ransomware-attacks/]]></link>
			<title>Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks</title>
			<pubDate><![CDATA[Fri, 01 May 2026 10:02:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-chatbots-need-deception-mode-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-chatbots-need-deception-mode-computerworld/]]></link>
			<title>AI chatbots need ‘deception mode’ – Computerworld</title>
			<pubDate><![CDATA[Fri, 01 May 2026 07:13:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisco-introduces-model-provenance-kit-to-strengthen-ai-supply-chain-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisco-introduces-model-provenance-kit-to-strengthen-ai-supply-chain-security/]]></link>
			<title>Cisco Introduces Model Provenance Kit to Strengthen AI Supply Chain Security</title>
			<pubDate><![CDATA[Fri, 01 May 2026 07:08:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-agent-deleted-production-database-in-9-secs-then-confessed-every-rule-it-broke/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-agent-deleted-production-database-in-9-secs-then-confessed-every-rule-it-broke/]]></link>
			<title>AI Agent Deleted Production Database In 9 Secs; Then Confessed Every Rule It Broke</title>
			<pubDate><![CDATA[Fri, 01 May 2026 06:07:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/copy-fail-gives-root-access-to-all-linux-systems-via-732-byte-exploit/]]></guid>
			<link><![CDATA[https://fxtechnology.org/copy-fail-gives-root-access-to-all-linux-systems-via-732-byte-exploit/]]></link>
			<title>“Copy Fail” gives root access to all Linux systems via 732-byte exploit</title>
			<pubDate><![CDATA[Fri, 01 May 2026 03:04:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/when-170000-people-show-up-network-refresh-readies-churchill-downs-for-kentucky-derby/]]></guid>
			<link><![CDATA[https://fxtechnology.org/when-170000-people-show-up-network-refresh-readies-churchill-downs-for-kentucky-derby/]]></link>
			<title>When 170,000 people show up: Network refresh readies Churchill Downs for Kentucky Derby</title>
			<pubDate><![CDATA[Fri, 01 May 2026 02:25:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/are-we-ready-to-give-ai-agents-the-keys-to-the-cloud-cloudflare-thinks-so-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/are-we-ready-to-give-ai-agents-the-keys-to-the-cloud-cloudflare-thinks-so-computerworld/]]></link>
			<title>Are we ready to give AI agents the keys to the cloud? Cloudflare thinks so – Computerworld</title>
			<pubDate><![CDATA[Fri, 01 May 2026 02:08:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/sap-npm-supply-chain-attack-targets-developer-credentials/]]></guid>
			<link><![CDATA[https://fxtechnology.org/sap-npm-supply-chain-attack-targets-developer-credentials/]]></link>
			<title>SAP npm Supply Chain Attack Targets Developer Credentials </title>
			<pubDate><![CDATA[Fri, 01 May 2026 02:03:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/this-month-in-security-with-tony-anscombe-april-2026-edition/]]></guid>
			<link><![CDATA[https://fxtechnology.org/this-month-in-security-with-tony-anscombe-april-2026-edition/]]></link>
			<title>This month in security with Tony Anscombe – April 2026 edition</title>
			<pubDate><![CDATA[Fri, 01 May 2026 01:14:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/us-agencies-promote-zero-trust-practices-for-operational-technology-networks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/us-agencies-promote-zero-trust-practices-for-operational-technology-networks/]]></link>
			<title>US agencies promote zero-trust practices for operational technology networks</title>
			<pubDate><![CDATA[Fri, 01 May 2026 01:02:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/276-arrested-in-operation-tri-force-sentinel-global-bust/]]></guid>
			<link><![CDATA[https://fxtechnology.org/276-arrested-in-operation-tri-force-sentinel-global-bust/]]></link>
			<title>276 Arrested In Operation Tri-Force Sentinel Global Bust</title>
			<pubDate><![CDATA[Fri, 01 May 2026 00:00:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/why-your-email-security-needs-a-global-human-network-to-close-the-detection-gap/]]></guid>
			<link><![CDATA[https://fxtechnology.org/why-your-email-security-needs-a-global-human-network-to-close-the-detection-gap/]]></link>
			<title>Why Your Email Security Needs a Global Human Network to Close the Detection Gap</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 22:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/anti-ddos-firm-heaped-attacks-on-brazilian-isps-krebs-on-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/anti-ddos-firm-heaped-attacks-on-brazilian-isps-krebs-on-security/]]></link>
			<title>Anti-DDoS Firm Heaped Attacks on Brazilian ISPs – Krebs on Security</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 20:57:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/france-arrests-15-year-old-hacker-who-stole-data-of-11-7-million-people/]]></guid>
			<link><![CDATA[https://fxtechnology.org/france-arrests-15-year-old-hacker-who-stole-data-of-11-7-million-people/]]></link>
			<title>France arrests 15-year-old hacker who stole data of 11.7 million people</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 19:56:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/it-certification-pay-surges-as-noncertified-skills-slump/]]></guid>
			<link><![CDATA[https://fxtechnology.org/it-certification-pay-surges-as-noncertified-skills-slump/]]></link>
			<title>IT certification pay surges as noncertified skills slump</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 19:15:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/friendlier-chatbots-can-be-less-reliable-study-says-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/friendlier-chatbots-can-be-less-reliable-study-says-computerworld/]]></link>
			<title>Friendlier chatbots can be less reliable, study says – Computerworld</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 19:01:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-adoption-fuels-rise-in-identity-attack-path-risk/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-adoption-fuels-rise-in-identity-attack-path-risk/]]></link>
			<title>AI Adoption Fuels Rise in Identity Attack Path Risk </title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 18:55:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/pwc-partners-with-google-cloud-to-take-on-the-managed-security-market/]]></guid>
			<link><![CDATA[https://fxtechnology.org/pwc-partners-with-google-cloud-to-take-on-the-managed-security-market/]]></link>
			<title>PwC partners with Google Cloud to take on the managed security market</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 17:54:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/gartner-sees-untamed-growth-in-agentic-ai-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/gartner-sees-untamed-growth-in-agentic-ai-computerworld/]]></link>
			<title>Gartner sees untamed growth in agentic AI – Computerworld</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 17:26:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cpanel-cve-2026-41940-auth-bypass-flaw-patch-now-fast/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cpanel-cve-2026-41940-auth-bypass-flaw-patch-now-fast/]]></link>
			<title>CPanel CVE-2026-41940 Auth Bypass Flaw: Patch Now Fast!</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 16:53:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/pytorch-lightning-compromised-in-pypi-supply-chain-attack-to-steal-credentials/]]></guid>
			<link><![CDATA[https://fxtechnology.org/pytorch-lightning-compromised-in-pypi-supply-chain-attack-to-steal-credentials/]]></link>
			<title>PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 16:44:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-to-design-security-for-agentic-ai/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-to-design-security-for-agentic-ai/]]></link>
			<title>How to Design Security for Agentic AI</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 15:52:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/quera-claims-quantum-error-correction-breakthrough-with-2-to-1-qubit-ratio/]]></guid>
			<link><![CDATA[https://fxtechnology.org/quera-claims-quantum-error-correction-breakthrough-with-2-to-1-qubit-ratio/]]></link>
			<title>QuEra claims quantum error correction breakthrough with 2-to-1 qubit ratio</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 15:12:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/etherrat-distribution-spoofing-administrative-tools-via-github-facades/]]></guid>
			<link><![CDATA[https://fxtechnology.org/etherrat-distribution-spoofing-administrative-tools-via-github-facades/]]></link>
			<title>EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 14:41:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/sms-blaster-busts-openemr-flaws-600k-roblox-hacks-and-25-more-stories/]]></guid>
			<link><![CDATA[https://fxtechnology.org/sms-blaster-busts-openemr-flaws-600k-roblox-hacks-and-25-more-stories/]]></link>
			<title>SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 14:33:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hpe-expands-proliant-line-with-rugged-edge-servers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hpe-expands-proliant-line-with-rugged-edge-servers/]]></link>
			<title>HPE expands ProLiant line with rugged edge servers</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 14:10:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-reportedly-abandons-vision-pro-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-reportedly-abandons-vision-pro-computerworld/]]></link>
			<title>Apple reportedly abandons Vision Pro – Computerworld</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 13:56:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/critical-cpanel-zero-day-auth-bypass-exploited-since-february/]]></guid>
			<link><![CDATA[https://fxtechnology.org/critical-cpanel-zero-day-auth-bypass-exploited-since-february/]]></link>
			<title>Critical cPanel zero-day auth bypass exploited since February</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 12:49:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-python-backdoor-uses-tunneling-service-to-steal-browser-and-cloud-credentials/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-python-backdoor-uses-tunneling-service-to-steal-browser-and-cloud-credentials/]]></link>
			<title>New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 12:39:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/australia-flags-financial-sector-gaps/]]></guid>
			<link><![CDATA[https://fxtechnology.org/australia-flags-financial-sector-gaps/]]></link>
			<title>Australia Flags Financial Sector Gaps</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 11:48:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-venture-funding-to-shoot-up-this-year-as-bubble-looms-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-venture-funding-to-shoot-up-this-year-as-bubble-looms-computerworld/]]></link>
			<title>AI venture funding to shoot up this year as bubble looms – Computerworld</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 11:21:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-linux-copy-fail-vulnerability-enables-root-access-on-major-distributions/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-linux-copy-fail-vulnerability-enables-root-access-on-major-distributions/]]></link>
			<title>New Linux &#8216;Copy Fail&#8217; Vulnerability Enables Root Access on Major Distributions</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:29:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/30000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign/]]></guid>
			<link><![CDATA[https://fxtechnology.org/30000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign/]]></link>
			<title>30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign</title>
			<pubDate><![CDATA[Fri, 01 May 2026 18:10:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/deconstructing-the-data-center-a-massive-and-massively-liberating-project/]]></guid>
			<link><![CDATA[https://fxtechnology.org/deconstructing-the-data-center-a-massive-and-massively-liberating-project/]]></link>
			<title>Deconstructing the data center: A massive (and massively liberating) project</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 09:05:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/chipsoft-cyberattack-patient-data-reportedly-destroyed/]]></guid>
			<link><![CDATA[https://fxtechnology.org/chipsoft-cyberattack-patient-data-reportedly-destroyed/]]></link>
			<title>ChipSoft Cyberattack: Patient Data Reportedly Destroyed</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 07:43:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/google-fixes-cvss-10-gemini-cli-ci-rce-and-cursor-flaws-enable-code-execution/]]></guid>
			<link><![CDATA[https://fxtechnology.org/google-fixes-cvss-10-gemini-cli-ci-rce-and-cursor-flaws-enable-code-execution/]]></link>
			<title>Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 07:26:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/scaling-up-a-tech-startup-in-europe-is-hard-eu-inc-aims-to-help-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/scaling-up-a-tech-startup-in-europe-is-hard-eu-inc-aims-to-help-computerworld/]]></link>
			<title>Scaling up a tech startup in Europe is hard — &#8216;EU Inc.&#8217; aims to help – Computerworld</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 07:15:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/german-mps-advised-to-drop-signal-in-favor-of-wire-over-security-concerns/]]></guid>
			<link><![CDATA[https://fxtechnology.org/german-mps-advised-to-drop-signal-in-favor-of-wire-over-security-concerns/]]></link>
			<title>German MPs advised to drop Signal in favor of Wire over security concerns</title>
			<pubDate><![CDATA[Fri, 01 May 2026 18:20:55 +0000]]></pubDate>
		</item>
				</channel>
</rss>
