<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 13, 2026 at 9:56 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Sat, 11 Apr 2026 07:21:53 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/hwmonitor-and-cpu-z-downloads-hijacked-to-deliver-malware-to-users/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hwmonitor-and-cpu-z-downloads-hijacked-to-deliver-malware-to-users/]]></link>
			<title>HWMonitor and CPU-Z downloads hijacked to deliver malware to users</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 07:21:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-french-government-eyes-alternatives-to-windows/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-french-government-eyes-alternatives-to-windows/]]></link>
			<title>The French government eyes alternatives to Windows</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 20:32:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/booking-com-data-breach-exposed-users-reservation-details/]]></guid>
			<link><![CDATA[https://fxtechnology.org/booking-com-data-breach-exposed-users-reservation-details/]]></link>
			<title>Booking.com data breach exposed users’ reservation details</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 20:28:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/zero-days-data-breaches-and-ai-risks-define-this-weeks-cybersecurity-landscape-in-2026/]]></guid>
			<link><![CDATA[https://fxtechnology.org/zero-days-data-breaches-and-ai-risks-define-this-weeks-cybersecurity-landscape-in-2026/]]></link>
			<title>Zero-Days, Data Breaches, and AI Risks Define This Week’s Cybersecurity Landscape in 2026</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 06:20:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisos-see-gaps-in-their-incident-response-playbooks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisos-see-gaps-in-their-incident-response-playbooks/]]></link>
			<title>CISOs see gaps in their incident response playbooks</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 19:28:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/chipsoft-ransomware-incident-hits-dutch-healthcare-systems/]]></guid>
			<link><![CDATA[https://fxtechnology.org/chipsoft-ransomware-incident-hits-dutch-healthcare-systems/]]></link>
			<title>ChipSoft Ransomware Incident Hits Dutch Healthcare Systems</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 18:26:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/janelarat-malware-targets-latin-american-banks-with-14739-attacks-in-brazil-in-2025/]]></guid>
			<link><![CDATA[https://fxtechnology.org/janelarat-malware-targets-latin-american-banks-with-14739-attacks-in-brazil-in-2025/]]></link>
			<title>JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 18:19:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/totalrecall-breaks-recall-security-via-aixhost-gap/]]></guid>
			<link><![CDATA[https://fxtechnology.org/totalrecall-breaks-recall-security-via-aixhost-gap/]]></link>
			<title>TotalRecall Breaks Recall Security Via AIXHost Gap</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 05:19:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-phishing-kit-streamlines-clickfix-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-phishing-kit-streamlines-clickfix-attacks/]]></link>
			<title>New Phishing Kit Streamlines ClickFix Attacks</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 17:25:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-preps-for-the-face-race-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-preps-for-the-face-race-computerworld/]]></link>
			<title>Apple preps for the face race – Computerworld</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 16:03:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fbi-and-indonesian-police-dismantle-w3ll-phishing-network-behind-20m-fraud-attempts/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fbi-and-indonesian-police-dismantle-w3ll-phishing-network-behind-20m-fraud-attempts/]]></link>
			<title>FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:52:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/standard-fiber-optic-cables-can-be-turned-into-remote-microphones/]]></guid>
			<link><![CDATA[https://fxtechnology.org/standard-fiber-optic-cables-can-be-turned-into-remote-microphones/]]></link>
			<title>Standard fiber optic cables can be turned into remote microphones</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:22:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/session-says-funding-will-last-until-july-pauses-development/]]></guid>
			<link><![CDATA[https://fxtechnology.org/session-says-funding-will-last-until-july-pauses-development/]]></link>
			<title>Session says funding will last until July, pauses development</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 02:16:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cyber-fraud-threatens-cybersecurity-in-zimbabwe-systems/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cyber-fraud-threatens-cybersecurity-in-zimbabwe-systems/]]></link>
			<title>Cyber Fraud Threatens Cybersecurity In Zimbabwe Systems</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 13:21:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads/]]></link>
			<title>CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 06:37:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621/]]></guid>
			<link><![CDATA[https://fxtechnology.org/adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621/]]></link>
			<title>Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 04:28:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/digital-asset-cybersecurity-initiative-announced-by-treasury/]]></guid>
			<link><![CDATA[https://fxtechnology.org/digital-asset-cybersecurity-initiative-announced-by-treasury/]]></link>
			<title>Digital Asset Cybersecurity Initiative Announced By Treasury</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 15:30:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/bitcoin-depot-reports-3-6-million-loss-in-cybersecurity-incident/]]></guid>
			<link><![CDATA[https://fxtechnology.org/bitcoin-depot-reports-3-6-million-loss-in-cybersecurity-incident/]]></link>
			<title>Bitcoin Depot reports $3.6 million loss in cybersecurity incident</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 12:26:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/alleged-10-petabyte-data-theft-from-chinas-tianjin-supercomputing-hub/]]></guid>
			<link><![CDATA[https://fxtechnology.org/alleged-10-petabyte-data-theft-from-chinas-tianjin-supercomputing-hub/]]></link>
			<title>Alleged 10 Petabyte Data Theft From China’s Tianjin Supercomputing Hub</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 11:25:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/stricter-kyc-rules-for-robocalls-proposed-by-fcc/]]></guid>
			<link><![CDATA[https://fxtechnology.org/stricter-kyc-rules-for-robocalls-proposed-by-fcc/]]></link>
			<title>Stricter KYC Rules For Robocalls Proposed By FCC</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 10:24:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs/]]></guid>
			<link><![CDATA[https://fxtechnology.org/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs/]]></link>
			<title>EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallet Installs</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 09:09:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fiber-optic-spying-windows-rootkit-ai-vulnerability-hunting-and-more/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fiber-optic-spying-windows-rootkit-ai-vulnerability-hunting-and-more/]]></link>
			<title>Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 13:10:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-to-build-your-own-ai-agents-with-google-workspace-studio-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-to-build-your-own-ai-agents-with-google-workspace-studio-computerworld/]]></link>
			<title>How to build your own AI agents with Google Workspace Studio – Computerworld</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 11:24:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/north-koreas-apt37-uses-facebook-social-engineering-to-deliver-rokrat-malware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/north-koreas-apt37-uses-facebook-social-engineering-to-deliver-rokrat-malware/]]></link>
			<title>North Korea&#8217;s APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 11:11:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/janelarat-targeting-online-banking-users-in-latin-america/]]></guid>
			<link><![CDATA[https://fxtechnology.org/janelarat-targeting-online-banking-users-in-latin-america/]]></link>
			<title>JanelaRAT targeting online banking users in Latin America</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:26:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/nearly-4k-industrial-control-devices-vulnerable-to-iran-linked-hacking-campaign/]]></guid>
			<link><![CDATA[https://fxtechnology.org/nearly-4k-industrial-control-devices-vulnerable-to-iran-linked-hacking-campaign/]]></link>
			<title>Nearly 4K industrial control devices vulnerable to Iran-linked hacking campaign</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 00:14:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-adobe-hopes-to-redesign-marketing-and-creativity-with-ai-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-adobe-hopes-to-redesign-marketing-and-creativity-with-ai-computerworld/]]></link>
			<title>How Adobe hopes to redesign marketing and creativity with AI – Computerworld</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:22:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/marimo-rce-flaw-exploited-within-hours-of-disclosure/]]></guid>
			<link><![CDATA[https://fxtechnology.org/marimo-rce-flaw-exploited-within-hours-of-disclosure/]]></link>
			<title>Marimo RCE Flaw Exploited Within Hours of Disclosure</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:17:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/authorities-dismantle-w3ll-phishing-empire/]]></guid>
			<link><![CDATA[https://fxtechnology.org/authorities-dismantle-w3ll-phishing-empire/]]></link>
			<title>Authorities Dismantle ‘W3LL’ Phishing Empire</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 08:15:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/heres-how-to-avoid-a-second-strike/]]></guid>
			<link><![CDATA[https://fxtechnology.org/heres-how-to-avoid-a-second-strike/]]></link>
			<title>Here’s how to avoid a ‘second strike’</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 04:00:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/anthropics-project-glasswing-signals-potential-ai-driven-shift-in-cybersecurity/]]></guid>
			<link><![CDATA[https://fxtechnology.org/anthropics-project-glasswing-signals-potential-ai-driven-shift-in-cybersecurity/]]></link>
			<title>Anthropic’s Project Glasswing Signals Potential AI-Driven Shift in Cybersecurity</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 01:15:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/ai-demand-is-so-high-aws-customers-are-trying-to-buy-out-its-entire-capacity/]]></guid>
			<link><![CDATA[https://fxtechnology.org/ai-demand-is-so-high-aws-customers-are-trying-to-buy-out-its-entire-capacity/]]></link>
			<title>AI demand is so high, AWS customers are trying to buy out its entire capacity</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 00:37:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident/]]></guid>
			<link><![CDATA[https://fxtechnology.org/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident/]]></link>
			<title>OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 07:07:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/iran-crisis-gulf-cybersecurity-middle-east-shift/]]></guid>
			<link><![CDATA[https://fxtechnology.org/iran-crisis-gulf-cybersecurity-middle-east-shift/]]></link>
			<title>Iran Crisis &#038; Gulf Cybersecurity Middle East Shift</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 23:12:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/google-adds-end-to-end-gmail-encryption-to-android-ios-devices-for-enterprises-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/google-adds-end-to-end-gmail-encryption-to-android-ios-devices-for-enterprises-computerworld/]]></link>
			<title>Google adds end-to-end Gmail encryption to Android, iOS devices for enterprises – Computerworld</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 22:47:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/phishing-campaign-targets-japanese-firms-during-tax-season/]]></guid>
			<link><![CDATA[https://fxtechnology.org/phishing-campaign-targets-japanese-firms-during-tax-season/]]></link>
			<title>Phishing Campaign Targets Japanese Firms During Tax Season</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 22:12:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/intel-secures-google-cloud-and-ai-infrastructure-deal/]]></guid>
			<link><![CDATA[https://fxtechnology.org/intel-secures-google-cloud-and-ai-infrastructure-deal/]]></link>
			<title>Intel secures Google cloud and AI infrastructure deal</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 19:44:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/webloc-surveillance-system-tracks-millions-using-mobile-ad-data/]]></guid>
			<link><![CDATA[https://fxtechnology.org/webloc-surveillance-system-tracks-millions-using-mobile-ad-data/]]></link>
			<title>Webloc surveillance system tracks millions using mobile ad data</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 19:08:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-ai-is-reshaping-cybersecurity-careers-not-replacing-them/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-ai-is-reshaping-cybersecurity-careers-not-replacing-them/]]></link>
			<title>How AI Is Reshaping Cybersecurity Careers — Not Replacing Them</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 18:05:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/stryker-warns-of-earnings-fallout-from-march-cyberattack/]]></guid>
			<link><![CDATA[https://fxtechnology.org/stryker-warns-of-earnings-fallout-from-march-cyberattack/]]></link>
			<title>Stryker warns of earnings fallout from March cyberattack</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 17:05:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/darpa-wants-to-help-ai-agents-to-talk-to-one-another-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/darpa-wants-to-help-ai-agents-to-talk-to-one-another-computerworld/]]></link>
			<title>DARPA wants to help AI agents to talk to one another – Computerworld</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 16:42:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/broadcom-strikes-chip-deals-with-google-anthropic/]]></guid>
			<link><![CDATA[https://fxtechnology.org/broadcom-strikes-chip-deals-with-google-anthropic/]]></link>
			<title>Broadcom strikes chip deals with Google, Anthropic</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 16:32:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/openai-puts-part-of-stargate-project-on-hold-over-runaway-power-costs/]]></guid>
			<link><![CDATA[https://fxtechnology.org/openai-puts-part-of-stargate-project-on-hold-over-runaway-power-costs/]]></link>
			<title>OpenAI puts part of Stargate project on hold over runaway power costs</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 16:30:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/tce-weekly-roundup-global-cybersecurity-threats-update/]]></guid>
			<link><![CDATA[https://fxtechnology.org/tce-weekly-roundup-global-cybersecurity-threats-update/]]></link>
			<title>TCE Weekly Roundup: Global Cybersecurity Threats Update</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 16:03:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-unveiled-a-new-high-end-market-opportunity-this-week-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-unveiled-a-new-high-end-market-opportunity-this-week-computerworld/]]></link>
			<title>Apple unveiled a new high-end market opportunity this week – Computerworld</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 15:40:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/from-audit-fatigue-to-continuous-readiness/]]></guid>
			<link><![CDATA[https://fxtechnology.org/from-audit-fatigue-to-continuous-readiness/]]></link>
			<title>From Audit Fatigue to Continuous Readiness</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 15:03:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides/]]></guid>
			<link><![CDATA[https://fxtechnology.org/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides/]]></link>
			<title>GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 13:53:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hungarian-government-email-passwords-exposed-ahead-of-election-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hungarian-government-email-passwords-exposed-ahead-of-election-computerworld/]]></link>
			<title>Hungarian government email passwords exposed ahead of election – Computerworld</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 13:37:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/meta-moves-fast-toward-a-world-where-ai-builds-the-software-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/meta-moves-fast-toward-a-world-where-ai-builds-the-software-computerworld/]]></link>
			<title>Meta moves fast toward a world where AI builds the software – Computerworld</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 13:03:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/microsoft-adds-hidden-feature-flags-to-windows-insider-builds-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/microsoft-adds-hidden-feature-flags-to-windows-insider-builds-computerworld/]]></link>
			<title>Microsoft adds hidden feature flags to Windows Insider builds – Computerworld</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 12:36:31 +0000]]></pubDate>
		</item>
				</channel>
</rss>
