<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.it-daily.net/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://www.it-daily.net/shortnews/russland-hinter-signal-attacke</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T15:00:00+00:00</news:publication_date>
			<news:title><![CDATA[Bundesregierung vermutet Russland hinter Signal-Attacke]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/loesungen-gnss-jamming-und-spoofing</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T14:32:13+00:00</news:publication_date>
			<news:title><![CDATA[IT-Systeme schützen: Lösungen gegen GNSS-Jamming und Spoofing]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/cybersecurity-fuhrungskrafte</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T13:28:00+00:00</news:publication_date>
			<news:title><![CDATA[Warum Cybersecurity keine reine IT-Frage mehr ist – und was Führungskräfte jetzt tun müssen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/bsi-massstaebe-cloud-souveraenitaet</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T12:35:00+00:00</news:publication_date>
			<news:title><![CDATA[BSI setzt neue Maßstäbe für Cloud-Souveränität]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/microsoft-windows-insider-programm</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T11:46:04+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft strukturiert Windows Insider Programm um]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/china-verhindert-ki-vorstoss-von-meta</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T10:55:00+00:00</news:publication_date>
			<news:title><![CDATA[China verhindert KI-Vorstoß von Meta]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/dora-und-nis-2</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T10:31:00+00:00</news:publication_date>
			<news:title><![CDATA[DORA und NIS-2: Warum die Zeit für den Finanzsektor und kritische Infrastrukturen jetzt drängt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cyberangriffe-108-tage-unentdeckt</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T10:30:00+00:00</news:publication_date>
			<news:title><![CDATA[Cyberangriffe bleiben im Schnitt 108 Tage unentdeckt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/digitale-zwillinge-klinische-studien</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T09:39:25+00:00</news:publication_date>
			<news:title><![CDATA[Digitale Zwillinge: Klinische Studien ohne Menschen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cisco-firewalls-malware-firestarter</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T08:36:37+00:00</news:publication_date>
			<news:title><![CDATA[Cisco-Firewalls: Malware FIRESTARTER]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/krise-samsung-mx-2026-erster-verlust</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T08:16:49+00:00</news:publication_date>
			<news:title><![CDATA[Krise bei Samsung MX: Droht 2026 der erste operative Verlust?]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/unternehmen-kaempfen-ki-experten</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T07:35:17+00:00</news:publication_date>
			<news:title><![CDATA[Unternehmen kämpfen um die wenigen KI-Experten]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/microsoft-copilot-aus-per-knopfdruck</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T07:18:00+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft Copilot-Aus per Knopfdruck: Deinstallation möglich]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/telekom-kuendigt-eigene-epa-an</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T06:40:14+00:00</news:publication_date>
			<news:title><![CDATA[Telekom kündigt eigene ePA an]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/kyber-ransomware</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T06:02:14+00:00</news:publication_date>
			<news:title><![CDATA[Kyber Ransomware: Post-Quanten-Kryptografie]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/industrie-geldwaesche</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T05:16:00+00:00</news:publication_date>
			<news:title><![CDATA[Industrialisierte Geldwäsche: „Mule-Account-Fabriken“]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/cloud-computing/ransomware-3-0-strong-consistency</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T04:25:33+00:00</news:publication_date>
			<news:title><![CDATA[Ransomware 3.0: "Strong Consistency" als Überlebensstrategie]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/multi-actor-intrusion</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T03:32:00+00:00</news:publication_date>
			<news:title><![CDATA[Multi-Actor Intrusion: Wenn nicht einer, sondern zwei Angreifer im Netzwerk wirken]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/thought-leadership/ki-produktivitaet-workslop</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-27T03:07:00+00:00</news:publication_date>
			<news:title><![CDATA[KI-Produktivität: Workslop bremst Effizienz von Unternehmen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/hackerangriff-auf-bitwarden</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T16:20:00+00:00</news:publication_date>
			<news:title><![CDATA[Hackerangriff auf Bitwarden: Supply-Chain-Malware]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/europas-ki-markt-im-wandel</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T14:19:54+00:00</news:publication_date>
			<news:title><![CDATA[Europas KI-Markt im Wandel]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/mcdonalds-als-chatgpt-alternative</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T10:40:00+00:00</news:publication_date>
			<news:title><![CDATA[McDonald's als kostenlose ChatGPT-Alternative?]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/ki-trading-gpt-5-2-grok-scheitern</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T09:54:30+00:00</news:publication_date>
			<news:title><![CDATA[KI-Trading-Hype entlarvt: Warum GPT-5.2 und Grok scheitern]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/immer-mehr-apps-im-alltag</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T07:53:30+00:00</news:publication_date>
			<news:title><![CDATA[Immer mehr Apps im Alltag: Smartphone-Nutzung nimmt weiter zu]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/tiktok-downloader-ausspionieren</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T06:03:00+00:00</news:publication_date>
			<news:title><![CDATA[Wie vermeintliche TikTok-Downloader 130.000 Nutzer ausspionieren]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/mythos-veraendert-alles</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T04:00:00+00:00</news:publication_date>
			<news:title><![CDATA[Mythos verändert alles - Warum Angriffsflächen von Firmen bedroht sind]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/datenschutz-grc/google-meta-microsoft-datenschutz</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T03:21:00+00:00</news:publication_date>
			<news:title><![CDATA[Warum Google, Meta und Microsoft Ihren Datenschutz-Wunsch ignorieren]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->