<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.it-daily.net/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/neue-sparkcat-malware</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-03T13:27:25+00:00</news:publication_date>
			<news:title><![CDATA[Neue SparkCat-Malware in Google Play und App Store]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/stryker-cyberangriff-betriebsfaehig</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-03T10:38:50+00:00</news:publication_date>
			<news:title><![CDATA[Stryker nach Cyberangriff wieder voll betriebsfähig]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/sap-und-telekom-buerger-app</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-03T10:25:22+00:00</news:publication_date>
			<news:title><![CDATA[SAP und Telekom sollen Bürger-App für den Bund bauen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/business-software/updates-fashion</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-03T09:50:09+00:00</news:publication_date>
			<news:title><![CDATA[Fast Updates statt Fast Fashion]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/deepfakes-justizministerin</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-03T08:43:00+00:00</news:publication_date>
			<news:title><![CDATA[Debatte um Deepfakes: Justizministerin fordert «klare Kante»]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/warum-verdeckte-ki-nutzung-zum-fuehrungsproblem-wird</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-03T03:49:27+00:00</news:publication_date>
			<news:title><![CDATA[Warum verdeckte KI-Nutzung zum Führungsproblem wird]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/business-software/software-allein-transformiert-nichts</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-03T03:26:22+00:00</news:publication_date>
			<news:title><![CDATA[Software allein transformiert nichts – aber ohne Software bleibt Transformation folgenlos]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/warum-schwachstellenmanagement</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-02T13:30:06+00:00</news:publication_date>
			<news:title><![CDATA[Warum klassisches Schwachstellenmanagement nicht mehr ausreicht]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/arzttermine-epa</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-02T12:17:37+00:00</news:publication_date>
			<news:title><![CDATA[Arzttermine per App buchen: ePA bekommt neue Funktionen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/rosenberger-osi-mmc-stecker</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-02T10:36:34+00:00</news:publication_date>
			<news:title><![CDATA[Rosenberger OSI setzt auf MMC-Stecker]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/gartner-ki-mit-entscheidungsgewalt</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-02T09:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Gartner: KI mit Entscheidungsgewalt löst Copiloten ab]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/bka-zerschlaegt-aisuru-und-kimwolf-doch-die-naechste-hydra-waechst-bereits</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-02T08:37:00+00:00</news:publication_date>
			<news:title><![CDATA[BKA zerschlägt Aisuru und Kimwolf – doch die nächste Hydra wächst bereits]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ki-fuer-genehmigungsverfahren</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-02T08:11:00+00:00</news:publication_date>
			<news:title><![CDATA[Bund macht KI für Genehmigungsverfahren frei verfügbar]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/projekt-personal/produktivitaet-anwesenheit-it</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-02T07:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Produktivität vs. Anwesenheit in der IT]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/deutsche-uneins-ki</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-02T07:05:54+00:00</news:publication_date>
			<news:title><![CDATA[Deutsche uneins über Chancen und Risiken von KI]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/iran-krieg-aws-rechenzentrum</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-02T05:54:00+00:00</news:publication_date>
			<news:title><![CDATA[Iran-Krieg: Amazons AWS-Rechenzentrum in Bahrain beschädigt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/datendieb-crystalx-rat</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-02T05:13:35+00:00</news:publication_date>
			<news:title><![CDATA[Datendieb CrystalX RAT: Die Malware, die Streiche spielt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/hasbro-hackerangriff</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-02T04:32:00+00:00</news:publication_date>
			<news:title><![CDATA[Hasbro nach Hackerangriff wochenlang eingeschränkt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/spacex-stellt-offenbar-vertraulichen-antrag-fuer-boersengang</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-02T04:26:00+00:00</news:publication_date>
			<news:title><![CDATA[SpaceX stellt offenbar vertraulichen Antrag für Börsengang]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/trueconf-schwachstelle</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-02T03:42:48+00:00</news:publication_date>
			<news:title><![CDATA[TrueConf: Schwachstelle schleust Malware in Behörden ein]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/big-data-analytics/datensouveraenitaet-wissen-nicht-ausreicht</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-02T03:06:42+00:00</news:publication_date>
			<news:title><![CDATA[Datensouveränität unter Druck: Warum Wissen allein nicht mehr ausreicht]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->