<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.it-daily.net/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://www.it-daily.net/shortnews/new-york-times-bitcoin-erfinder</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T07:06:43+00:00</news:publication_date>
			<news:title><![CDATA[New York Times will Bitcoin-Erfinder enttarnt haben]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/deepfake-terror</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T06:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Deepfake-Terror: Wenn die Stimme des Chefs zur Waffe wird]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/telekom-starlink-internet</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T05:53:00+00:00</news:publication_date>
			<news:title><![CDATA[Telekom verkauft Starlink-Internet an Geschäftskunden]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/ma-cybervorfaelle</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T05:07:00+00:00</news:publication_date>
			<news:title><![CDATA[M&amp;A: Cybervorfälle drücken Deal-Werte bei Firmenübernahmen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/whatsapp-bekommt-benutzernamen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T04:20:00+00:00</news:publication_date>
			<news:title><![CDATA[WhatsApp bekommt Benutzernamen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/ende-apple-sorglosigkeit</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T03:37:00+00:00</news:publication_date>
			<news:title><![CDATA[Das Ende der Apple-Sorglosigkeit]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/eu-ai-act-operativ-steuerbar-machen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T03:02:00+00:00</news:publication_date>
			<news:title><![CDATA[Wie Unternehmen den EU AI Act operativ steuerbar machen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/13-billionen-dollar-halbleitermarkt</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T14:51:00+00:00</news:publication_date>
			<news:title><![CDATA[Die 1,3-Billionen-Dollar-Welle am Halbleitermarkt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/europas-ki-traeume-stossen-an-grenzen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T13:32:00+00:00</news:publication_date>
			<news:title><![CDATA[Stromdilemma: Europas KI-Träume stoßen an Grenzen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/bafin-loesegeldversicherungen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T12:06:00+00:00</news:publication_date>
			<news:title><![CDATA[BaFin regelt Lösegeldversicherungen neu]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/projekt-personal/tools-fuhrung</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T11:09:00+00:00</news:publication_date>
			<news:title><![CDATA[Wenn Tools Führung ersetzen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/2027-griechenland-social-media-verbot</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T10:35:32+00:00</news:publication_date>
			<news:title><![CDATA[Ab 2027: Griechenland verhängt Social-Media-Verbot für Kinder]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/cybervorfalle-sinken</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T09:27:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische Cybervorfälle sinken 2025 weltweit auf Tiefstand]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/openai-empfiehlt-vier-tage-woche</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T08:34:15+00:00</news:publication_date>
			<news:title><![CDATA[OpenAI empfiehlt Unternehmen die Vier-Tage-Woche]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ki-und-drohnen-jena</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T07:47:00+00:00</news:publication_date>
			<news:title><![CDATA[KI und Drohnen – das haben Unternehmen in Jena vor]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/internetrouter-verfassungsschutz-warnt-vor-hackerangriffen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T07:10:13+00:00</news:publication_date>
			<news:title><![CDATA[Internetrouter: Verfassungsschutz warnt vor Hackerangriffen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cloudflare-bis-2029-quantensicher</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T06:33:56+00:00</news:publication_date>
			<news:title><![CDATA[Auch Cloudflare will bis 2029 komplett quantensicher sein]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cyberangriff-auf-intoxalock</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T05:56:00+00:00</news:publication_date>
			<news:title><![CDATA[Cyberangriff auf Intoxalock legt US-Fahrzeuge lahm]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/fake-jobs-nickel-alley</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T05:08:28+00:00</news:publication_date>
			<news:title><![CDATA[Fake-Jobs als Cyber-Falle: So trickst NICKEL ALLEY Entwickler aus]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/iran-krieg-usa-melden-hackerangriff</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T04:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Iran-Krieg: USA melden Hackerangriff auf Infrastruktur]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/claude-schlummernde-schwachstelle</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T04:08:00+00:00</news:publication_date>
			<news:title><![CDATA[Claude Mythos findet seit Jahren schlummernde Schwachstelle]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/unternehmen-bots-stoppen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T03:34:00+00:00</news:publication_date>
			<news:title><![CDATA[Wie Unternehmen Bots stoppen, ohne echte Nutzer zu verlieren]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/warum-ki-projekte-scheitern-3</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T03:05:00+00:00</news:publication_date>
			<news:title><![CDATA[Warum viele KI-Projekte in der IT-Infrastruktur und im Betrieb scheitern]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/internet-blackout-im-iran-kriegsende</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-07T17:34:10+00:00</news:publication_date>
			<news:title><![CDATA[Internet-Blackout im Iran bleibt bis zum Kriegsende]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/smartphone-selfies</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-07T14:04:00+00:00</news:publication_date>
			<news:title><![CDATA[Smartphone-Kauf: Gute Selfies oder kein Deal]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/systemadmin-erpresste-arbeitgeber</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-07T12:03:00+00:00</news:publication_date>
			<news:title><![CDATA[Systemadmin erpresste eigenen Arbeitgeber mit 20 Bitcoin]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/projekt-personal/lucken-wissenstransfer</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-07T11:33:00+00:00</news:publication_date>
			<news:title><![CDATA[Führungskräfte beklagen Lücken beim Wissenstransfer]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/identity-access-management/ransomware-login</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-07T10:38:04+00:00</news:publication_date>
			<news:title><![CDATA[Warum jüngste Ransomware-Angriffe nur einen einzigen Login brauchten]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cyberattacke-auf-die-uffizien</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-07T09:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Cyberattacke auf die Uffizien wirft Fragen auf]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/datenschutz-grc/genai-finanzdaten</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-07T08:45:00+00:00</news:publication_date>
			<news:title><![CDATA[GenAI-Risiken: Finanzdaten im Fokus]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/iran-chatgpt-rechenzentrum-abu-dhabi</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-07T07:28:31+00:00</news:publication_date>
			<news:title><![CDATA[Iran droht ChatGPT-Rechenzentrum in Abu Dhabi anzugreifen]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->