<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 14, 2026 at 2:49 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://fxtechnology.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>FxTechnology</title>
		<link><![CDATA[https://fxtechnology.org]]></link>
		<description><![CDATA[FxTechnology]]></description>
		<lastBuildDate><![CDATA[Tue, 14 Apr 2026 14:48:44 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://fxtechnology.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://fxtechnology.org/goldman-sachs-hyperaware-of-ai-risks-working-with-anthropic-on-mythos/]]></guid>
			<link><![CDATA[https://fxtechnology.org/goldman-sachs-hyperaware-of-ai-risks-working-with-anthropic-on-mythos/]]></link>
			<title>Goldman Sachs &#8216;Hyperaware&#8217; Of AI Risks; Working With Anthropic On Mythos</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 14:48:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/google-adds-rust-based-dns-parser-into-pixel-10-modem-to-enhance-security/]]></guid>
			<link><![CDATA[https://fxtechnology.org/google-adds-rust-based-dns-parser-into-pixel-10-modem-to-enhance-security/]]></link>
			<title>Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 14:39:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-knowbe4-agent-risk-manager-addresses-pervasive-ai-agent-risk/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-knowbe4-agent-risk-manager-addresses-pervasive-ai-agent-risk/]]></link>
			<title>New KnowBe4 Agent Risk Manager Addresses Pervasive AI Agent Risk</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 13:47:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/mirax-android-rat-turns-devices-into-socks5-proxies-reaching-220000-via-meta-ads/]]></guid>
			<link><![CDATA[https://fxtechnology.org/mirax-android-rat-turns-devices-into-socks5-proxies-reaching-220000-via-meta-ads/]]></link>
			<title>Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:40:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/dns-security-is-often-inadequate-and-network-engineers-should-get-more-involved/]]></guid>
			<link><![CDATA[https://fxtechnology.org/dns-security-is-often-inadequate-and-network-engineers-should-get-more-involved/]]></link>
			<title>DNS security is often inadequate, and network engineers should get more involved</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:06:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/108-chrome-extensions-caught-stealing-user-data-and-hijacking-sessions/]]></guid>
			<link><![CDATA[https://fxtechnology.org/108-chrome-extensions-caught-stealing-user-data-and-hijacking-sessions/]]></link>
			<title>108 Chrome extensions caught stealing user data and hijacking sessions</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 10:44:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/analysis-of-216m-security-findings-shows-a-4x-increase-in-critical-risk-2026-report/]]></guid>
			<link><![CDATA[https://fxtechnology.org/analysis-of-216m-security-findings-shows-a-4x-increase-in-critical-risk-2026-report/]]></link>
			<title>Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 10:34:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/australia-social-media-ban-fails-to-stop-under-16-access/]]></guid>
			<link><![CDATA[https://fxtechnology.org/australia-social-media-ban-fails-to-stop-under-16-access/]]></link>
			<title>Australia Social Media Ban Fails To Stop Under-16 Access</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 09:43:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/quantum-developments-put-focus-on-authentication/]]></guid>
			<link><![CDATA[https://fxtechnology.org/quantum-developments-put-focus-on-authentication/]]></link>
			<title>Quantum developments put focus on authentication</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 08:10:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/12-quantum-training-courses-from-isc2-ibm-aws-and-more/]]></guid>
			<link><![CDATA[https://fxtechnology.org/12-quantum-training-courses-from-isc2-ibm-aws-and-more/]]></link>
			<title>12 quantum training courses from ISC2, IBM, AWS and more</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 08:03:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/a-wild-ride-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/a-wild-ride-computerworld/]]></link>
			<title>‘A wild ride’ – Computerworld</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 07:20:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/surfshark-unveils-new-dausos-vpn-protocol-with-dedicated-user-tunnels/]]></guid>
			<link><![CDATA[https://fxtechnology.org/surfshark-unveils-new-dausos-vpn-protocol-with-dedicated-user-tunnels/]]></link>
			<title>Surfshark unveils new Dausos VPN protocol with dedicated user tunnels</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 06:40:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/showdoc-rce-flaw-cve-2025-0520-actively-exploited-on-unpatched-servers/]]></guid>
			<link><![CDATA[https://fxtechnology.org/showdoc-rce-flaw-cve-2025-0520-actively-exploited-on-unpatched-servers/]]></link>
			<title>ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 06:29:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/basic-fit-data-breach-exposes-member-data-across-europe/]]></guid>
			<link><![CDATA[https://fxtechnology.org/basic-fit-data-breach-exposes-member-data-across-europe/]]></link>
			<title>Basic-Fit Data Breach Exposes Member Data Across Europe</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 05:39:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/rockstar-games-confirms-data-breach-as-shinyhunters-leaks-78-million-records/]]></guid>
			<link><![CDATA[https://fxtechnology.org/rockstar-games-confirms-data-breach-as-shinyhunters-leaks-78-million-records/]]></link>
			<title>Rockstar Games confirms data breach as ShinyHunters leaks 78 million records</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 02:36:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/linux-7-0-debuts-with-some-big-changes-for-networking/]]></guid>
			<link><![CDATA[https://fxtechnology.org/linux-7-0-debuts-with-some-big-changes-for-networking/]]></link>
			<title>Linux 7.0 debuts with some big changes for networking</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 01:57:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/us-indonesia-shut-down-sophisticated-phishing-kit/]]></guid>
			<link><![CDATA[https://fxtechnology.org/us-indonesia-shut-down-sophisticated-phishing-kit/]]></link>
			<title>US, Indonesia shut down ‘sophisticated’ phishing kit</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 01:34:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/gta-5-dev-faces-data-threat/]]></guid>
			<link><![CDATA[https://fxtechnology.org/gta-5-dev-faces-data-threat/]]></link>
			<title>GTA 5 Dev Faces Data Threat</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 00:33:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/why-the-human-layer-matters-more-not-less/]]></guid>
			<link><![CDATA[https://fxtechnology.org/why-the-human-layer-matters-more-not-less/]]></link>
			<title>Why the Human Layer Matters More, Not Less</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 23:32:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads/]]></link>
			<title>CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 06:37:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621/]]></guid>
			<link><![CDATA[https://fxtechnology.org/adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621/]]></link>
			<title>Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 04:28:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/the-french-government-eyes-alternatives-to-windows/]]></guid>
			<link><![CDATA[https://fxtechnology.org/the-french-government-eyes-alternatives-to-windows/]]></link>
			<title>The French government eyes alternatives to Windows</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 20:32:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cisos-see-gaps-in-their-incident-response-playbooks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cisos-see-gaps-in-their-incident-response-playbooks/]]></link>
			<title>CISOs see gaps in their incident response playbooks</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 19:28:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/janelarat-malware-targets-latin-american-banks-with-14739-attacks-in-brazil-in-2025/]]></guid>
			<link><![CDATA[https://fxtechnology.org/janelarat-malware-targets-latin-american-banks-with-14739-attacks-in-brazil-in-2025/]]></link>
			<title>JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 18:19:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fbi-and-indonesian-police-dismantle-w3ll-phishing-network-behind-20m-fraud-attempts/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fbi-and-indonesian-police-dismantle-w3ll-phishing-network-behind-20m-fraud-attempts/]]></link>
			<title>FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:52:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/standard-fiber-optic-cables-can-be-turned-into-remote-microphones/]]></guid>
			<link><![CDATA[https://fxtechnology.org/standard-fiber-optic-cables-can-be-turned-into-remote-microphones/]]></link>
			<title>Standard fiber optic cables can be turned into remote microphones</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 14:22:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/cyber-fraud-threatens-cybersecurity-in-zimbabwe-systems/]]></guid>
			<link><![CDATA[https://fxtechnology.org/cyber-fraud-threatens-cybersecurity-in-zimbabwe-systems/]]></link>
			<title>Cyber Fraud Threatens Cybersecurity In Zimbabwe Systems</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 13:21:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/fiber-optic-spying-windows-rootkit-ai-vulnerability-hunting-and-more/]]></guid>
			<link><![CDATA[https://fxtechnology.org/fiber-optic-spying-windows-rootkit-ai-vulnerability-hunting-and-more/]]></link>
			<title>Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 13:10:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-to-build-your-own-ai-agents-with-google-workspace-studio-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-to-build-your-own-ai-agents-with-google-workspace-studio-computerworld/]]></link>
			<title>How to build your own AI agents with Google Workspace Studio – Computerworld</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 11:24:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/north-koreas-apt37-uses-facebook-social-engineering-to-deliver-rokrat-malware/]]></guid>
			<link><![CDATA[https://fxtechnology.org/north-koreas-apt37-uses-facebook-social-engineering-to-deliver-rokrat-malware/]]></link>
			<title>North Korea&#8217;s APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 11:11:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/janelarat-targeting-online-banking-users-in-latin-america/]]></guid>
			<link><![CDATA[https://fxtechnology.org/janelarat-targeting-online-banking-users-in-latin-america/]]></link>
			<title>JanelaRAT targeting online banking users in Latin America</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:26:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/how-adobe-hopes-to-redesign-marketing-and-creativity-with-ai-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/how-adobe-hopes-to-redesign-marketing-and-creativity-with-ai-computerworld/]]></link>
			<title>How Adobe hopes to redesign marketing and creativity with AI – Computerworld</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:22:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/marimo-rce-flaw-exploited-within-hours-of-disclosure/]]></guid>
			<link><![CDATA[https://fxtechnology.org/marimo-rce-flaw-exploited-within-hours-of-disclosure/]]></link>
			<title>Marimo RCE Flaw Exploited Within Hours of Disclosure</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:17:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/authorities-dismantle-w3ll-phishing-empire/]]></guid>
			<link><![CDATA[https://fxtechnology.org/authorities-dismantle-w3ll-phishing-empire/]]></link>
			<title>Authorities Dismantle ‘W3LL’ Phishing Empire</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 08:15:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/digital-asset-cybersecurity-initiative-announced-by-treasury/]]></guid>
			<link><![CDATA[https://fxtechnology.org/digital-asset-cybersecurity-initiative-announced-by-treasury/]]></link>
			<title>Digital Asset Cybersecurity Initiative Announced By Treasury</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 15:30:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident/]]></guid>
			<link><![CDATA[https://fxtechnology.org/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident/]]></link>
			<title>OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 07:07:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/bitcoin-depot-reports-3-6-million-loss-in-cybersecurity-incident/]]></guid>
			<link><![CDATA[https://fxtechnology.org/bitcoin-depot-reports-3-6-million-loss-in-cybersecurity-incident/]]></link>
			<title>Bitcoin Depot reports $3.6 million loss in cybersecurity incident</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 12:26:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/booking-com-data-breach-exposed-users-reservation-details/]]></guid>
			<link><![CDATA[https://fxtechnology.org/booking-com-data-breach-exposed-users-reservation-details/]]></link>
			<title>Booking.com data breach exposed users’ reservation details</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 20:28:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/alleged-10-petabyte-data-theft-from-chinas-tianjin-supercomputing-hub/]]></guid>
			<link><![CDATA[https://fxtechnology.org/alleged-10-petabyte-data-theft-from-chinas-tianjin-supercomputing-hub/]]></link>
			<title>Alleged 10 Petabyte Data Theft From China’s Tianjin Supercomputing Hub</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 11:25:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/stricter-kyc-rules-for-robocalls-proposed-by-fcc/]]></guid>
			<link><![CDATA[https://fxtechnology.org/stricter-kyc-rules-for-robocalls-proposed-by-fcc/]]></link>
			<title>Stricter KYC Rules For Robocalls Proposed By FCC</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 10:24:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs/]]></guid>
			<link><![CDATA[https://fxtechnology.org/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs/]]></link>
			<title>EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallet Installs</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 09:09:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/hwmonitor-and-cpu-z-downloads-hijacked-to-deliver-malware-to-users/]]></guid>
			<link><![CDATA[https://fxtechnology.org/hwmonitor-and-cpu-z-downloads-hijacked-to-deliver-malware-to-users/]]></link>
			<title>HWMonitor and CPU-Z downloads hijacked to deliver malware to users</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 07:21:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/zero-days-data-breaches-and-ai-risks-define-this-weeks-cybersecurity-landscape-in-2026/]]></guid>
			<link><![CDATA[https://fxtechnology.org/zero-days-data-breaches-and-ai-risks-define-this-weeks-cybersecurity-landscape-in-2026/]]></link>
			<title>Zero-Days, Data Breaches, and AI Risks Define This Week’s Cybersecurity Landscape in 2026</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 06:20:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/chipsoft-ransomware-incident-hits-dutch-healthcare-systems/]]></guid>
			<link><![CDATA[https://fxtechnology.org/chipsoft-ransomware-incident-hits-dutch-healthcare-systems/]]></link>
			<title>ChipSoft Ransomware Incident Hits Dutch Healthcare Systems</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 18:26:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/totalrecall-breaks-recall-security-via-aixhost-gap/]]></guid>
			<link><![CDATA[https://fxtechnology.org/totalrecall-breaks-recall-security-via-aixhost-gap/]]></link>
			<title>TotalRecall Breaks Recall Security Via AIXHost Gap</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 05:19:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/heres-how-to-avoid-a-second-strike/]]></guid>
			<link><![CDATA[https://fxtechnology.org/heres-how-to-avoid-a-second-strike/]]></link>
			<title>Here’s how to avoid a ‘second strike’</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 04:00:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/new-phishing-kit-streamlines-clickfix-attacks/]]></guid>
			<link><![CDATA[https://fxtechnology.org/new-phishing-kit-streamlines-clickfix-attacks/]]></link>
			<title>New Phishing Kit Streamlines ClickFix Attacks</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 17:25:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/session-says-funding-will-last-until-july-pauses-development/]]></guid>
			<link><![CDATA[https://fxtechnology.org/session-says-funding-will-last-until-july-pauses-development/]]></link>
			<title>Session says funding will last until July, pauses development</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 02:16:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/anthropics-project-glasswing-signals-potential-ai-driven-shift-in-cybersecurity/]]></guid>
			<link><![CDATA[https://fxtechnology.org/anthropics-project-glasswing-signals-potential-ai-driven-shift-in-cybersecurity/]]></link>
			<title>Anthropic’s Project Glasswing Signals Potential AI-Driven Shift in Cybersecurity</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 01:15:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://fxtechnology.org/apple-preps-for-the-face-race-computerworld/]]></guid>
			<link><![CDATA[https://fxtechnology.org/apple-preps-for-the-face-race-computerworld/]]></link>
			<title>Apple preps for the face race – Computerworld</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 16:03:37 +0000]]></pubDate>
		</item>
				</channel>
</rss>
