<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.it-daily.net/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://www.it-daily.net/shortnews/betrugsanzeigen-meta-google-tiktok</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T15:08:16+00:00</news:publication_date>
			<news:title><![CDATA[Betrugsanzeigen: Meta, Google und TikTok löschen kaum]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/mode-ki-verkuerzt-designprozess</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T14:01:13+00:00</news:publication_date>
			<news:title><![CDATA[Mode in Rekordzeit: KI verkürzt Designprozess auf 6 Wochen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cyberangriff-patientendaten-uniklinik-dusseldorf</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T13:30:11+00:00</news:publication_date>
			<news:title><![CDATA[Cyberangriff auf Patientendaten der Uniklinik Düsseldorf]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/vivaldi-8-0-ohne-ki-funktionen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T13:03:35+00:00</news:publication_date>
			<news:title><![CDATA[Vivaldi 8.0 bringt grundlegendes Redesign ohne KI-Funktionen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/konkurrenz-palantir-bei-polizei</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T12:35:51+00:00</news:publication_date>
			<news:title><![CDATA[Konkurrenz für Palantir bei der Polizei in NRW]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/deepfake-frist-meta-google-tiktok</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T12:14:53+00:00</news:publication_date>
			<news:title><![CDATA[Deepfake-Frist für Meta, Google und TikTok binnen 48 Stunden]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cisa-kev-katalog-neu</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T11:24:00+00:00</news:publication_date>
			<news:title><![CDATA[CISA führt neues Online-Formular für KEV-Katalog ein]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/digitalisierung/video-hosting-alltag</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T10:44:06+00:00</news:publication_date>
			<news:title><![CDATA[Produktvideos, Schulungen und Webinare: Drei typische Einsatzfälle für Video-Hosting im IT-Alltag]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/sechs-ki-prognosen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T09:54:20+00:00</news:publication_date>
			<news:title><![CDATA[Workslop, Voice-Agenten und Skalierung: Sechs KI-Prognosen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/angebliche-starbucks-daten-loesegeld</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T09:24:03+00:00</news:publication_date>
			<news:title><![CDATA[Angebliche Starbucks-Daten: Hacker fordern Lösegeld]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/airbnb-app-ki-loesungen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T08:58:36+00:00</news:publication_date>
			<news:title><![CDATA[Airbnb setzt bei App auf personalisierte KI-Lösungen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/digitalisierung/big-tech-deutschland-im-griff-hat</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T08:12:24+00:00</news:publication_date>
			<news:title><![CDATA[Wie Big Tech Deutschland im Griff hat]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/hackerbande-the-gentlemen-datenleck</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T07:46:33+00:00</news:publication_date>
			<news:title><![CDATA[Hackerbande The Gentlemen: Datenleck analysiert]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/gemini-loescht-30-000-zeilen-code</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T07:08:32+00:00</news:publication_date>
			<news:title><![CDATA[Gemini löscht 30.000 Zeilen Produktivcode]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/kriminelles-netzwerk-first-vpn</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T06:34:03+00:00</news:publication_date>
			<news:title><![CDATA[Kriminelles Netzwerk First VPN von Europol zerschlagen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/dirtydecrypt-exploit-linux-systeme</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T06:07:46+00:00</news:publication_date>
			<news:title><![CDATA[Alarm im Kernel: DirtyDecrypt-Exploit gefährdet Linux-Systeme]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/samsung-mitarbeiter-boni-bekommen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T05:58:52+00:00</news:publication_date>
			<news:title><![CDATA[Samsung-Mitarbeiter sollen Boni bekommen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/angebliche-nato-datenbank-darknet</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T05:47:00+00:00</news:publication_date>
			<news:title><![CDATA[Angebliche NATO-Datenbank im Darknet aufgetaucht]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/china-ki-tokens-wie-mobilfunkdaten</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T05:26:00+00:00</news:publication_date>
			<news:title><![CDATA[China verkauft KI-Tokens wie Mobilfunkdaten]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/waymo-robotaxis-ueberflutete-strasse</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T04:42:50+00:00</news:publication_date>
			<news:title><![CDATA[Waymo-Robotaxis bleiben auf überfluteten Straßen stecken]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/deepl-chef-gruender-des-jahres</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T04:36:44+00:00</news:publication_date>
			<news:title><![CDATA[DeepL-Chef: Gründer des Jahres trotz Stellenabbau]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/de-mail-steht-vor-dem-aus</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T04:31:32+00:00</news:publication_date>
			<news:title><![CDATA[De-Mail steht vor dem Aus]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ki-mathematischer-durchbruch</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T04:25:27+00:00</news:publication_date>
			<news:title><![CDATA[KI widerlegt Erdös-Vermutung: Mathematischer Durchbruch]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-security-en/cloud-security-en/us-europaeische-cloud-souveraenitaet</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T03:41:55+00:00</news:publication_date>
			<news:title><![CDATA[US-Prozessoren hebeln europäische Cloud-Souveränität aus]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/digitalisierung/downtime-ungeplante-it-ausfaelle-teurer</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-22T03:09:57+00:00</news:publication_date>
			<news:title><![CDATA[Downtime: Ungeplante IT-Ausfälle werden für Unternehmen immer teurer]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/traffic-bleibt-loest-sich-von-google</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T15:43:21+00:00</news:publication_date>
			<news:title><![CDATA[Der Traffic bleibt — aber er löst sich von Google]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/fuhrungszeugnis-wird-digital</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T15:02:33+00:00</news:publication_date>
			<news:title><![CDATA[Führungszeugnis wird digital]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/bund-ki-grossauftrag-telekom-sap</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T14:44:27+00:00</news:publication_date>
			<news:title><![CDATA[Bund vergibt KI-Großauftrag an Telekom und SAP]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/business-software/zoom-ki-notizassistenten-smartphones</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T14:38:11+00:00</news:publication_date>
			<news:title><![CDATA[Zoom erweitert KI-Notizassistenten auf Smartphones]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/uniklinik-patienten-hackerangriff</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T14:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Tausende Uniklinik-Patienten von Hackerangriff betroffen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/neun-jahre-alte-linux-schwachstelle</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T13:53:53+00:00</news:publication_date>
			<news:title><![CDATA[Neun Jahre alte Linux-Schwachstelle ermöglicht Root-Zugriff]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/mshta-binary-cyberangriffe</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T13:11:49+00:00</news:publication_date>
			<news:title><![CDATA[MSHTA-Binary befeuert Welle von Cyberangriffen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/kritische-cisco-schwachstelle</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T12:59:22+00:00</news:publication_date>
			<news:title><![CDATA[Kritische Cisco-Schwachstelle bricht Mandantengrenzen auf]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/software-schwachstellen-passwort</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T12:23:00+00:00</news:publication_date>
			<news:title><![CDATA[Software-Schwachstellen hängen Passwort-Diebstahl ab]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cloudflare-warnt-vor-cyber-ki-mythos</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T11:39:14+00:00</news:publication_date>
			<news:title><![CDATA[Cyber-KI Mythos: Cloudflare warnt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/big-data-analytics/ineffiziente-datenanalyse-bremst-ermittlungen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T11:00:54+00:00</news:publication_date>
			<news:title><![CDATA[Ineffiziente Datenanalyse-Tools bremsen Ermittlungen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/windows-defender-warnung-zero-day</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T10:47:00+00:00</news:publication_date>
			<news:title><![CDATA[Windows Defender: Akute Warnung vor Zero-Day-Angriffen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/discord-ende-verschluesselung</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T10:23:00+00:00</news:publication_date>
			<news:title><![CDATA[Discord führt Ende-zu-Ende-Verschlüsselung für Sprachkanäle ein]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/sap-snowflake-unternehmensdaten-ki-anwendungen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T10:06:23+00:00</news:publication_date>
			<news:title><![CDATA[SAP und Snowflake bringen Unternehmensdaten in KI-Anwendungen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/mozilla-firefox-151-datenschutz</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T09:41:00+00:00</news:publication_date>
			<news:title><![CDATA[Mozilla veröffentlicht Firefox 151 mit erweitertem Datenschutz]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cohesity-und-hpe-bauen-kooperation-aus</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T09:03:32+00:00</news:publication_date>
			<news:title><![CDATA[Cohesity und HPE bauen Kooperation aus]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/vorwuerfe-google-co-finanzwerbung</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T08:32:17+00:00</news:publication_date>
			<news:title><![CDATA[Neue Vorwürfe gegen Google &amp; Co. wegen Finanzwerbung]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/identity-access-management/ki-risiken-digitale-identitaeten</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T08:24:33+00:00</news:publication_date>
			<news:title><![CDATA[KI-Risiken: Unternehmen verlieren den Überblick über digitale Identitäten]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/google-versehentlich-exploit-code</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T08:09:00+00:00</news:publication_date>
			<news:title><![CDATA[Google veröffentlicht versehentlich Exploit-Code für Browser-Lücke]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/open-source-streit-klage-vizio-linux</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T07:52:00+00:00</news:publication_date>
			<news:title><![CDATA[Open-Source-Streit: Klage gegen Vizio wegen Linux-Code]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/datenleck-verdacht-telekom-dementiert</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T07:47:37+00:00</news:publication_date>
			<news:title><![CDATA[Nach Datenleck-Verdacht: Telekom dementiert Vorwürfe]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/commonwealth-short-story-prize-ki</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T07:32:00+00:00</news:publication_date>
			<news:title><![CDATA[Commonwealth Short Story Prize: KI-Verdacht bei Gewinnern]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/projekt-personal/software-entwickler-wissenverlust-ki</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T07:14:45+00:00</news:publication_date>
			<news:title><![CDATA[Software-Entwickler beklagen Wissensverlust durch KI]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/google-cloud-sperrt-railway</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T07:10:00+00:00</news:publication_date>
			<news:title><![CDATA[Google Cloud sperrt fälschlicherweise Großkunden Railway]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cyberspionage-webworm-discord</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T06:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Cyberspionage: Webworm nutzt Discord und Microsoft Graph API]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/sonicwall-hacker-vpn-appliances</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T06:21:00+00:00</news:publication_date>
			<news:title><![CDATA[SonicWall: Hacker unterwandern VPN-Appliances]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/aktionsrat-bildung-altersgrenze-social-media</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T06:09:03+00:00</news:publication_date>
			<news:title><![CDATA[Aktionsrat Bildung: Empfehlung von Altersgrenzen für Social Media]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/millionen-betrug-play-store-gestoppt</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T06:05:38+00:00</news:publication_date>
			<news:title><![CDATA[Millionen-Betrug im Play Store gestoppt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/spacex-boersengang-milliardenverluste</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T06:03:18+00:00</news:publication_date>
			<news:title><![CDATA[SpaceX plant Börsengang trotz Milliardenverlusten]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/sicherheitsrisiko-ki-plattform-dify</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T05:45:00+00:00</news:publication_date>
			<news:title><![CDATA[KI-Plattform Dify: Sicherheitsrisiko]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/alibaba-neuer-ki-chip-zhenwu-m890</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T05:38:56+00:00</news:publication_date>
			<news:title><![CDATA[Alibaba fordert Nvidia heraus: Neuer KI-Chip Zhenwu M890]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/sicherheitsluecke-claude-code</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T05:32:00+00:00</news:publication_date>
			<news:title><![CDATA[Claude Code: Anthropic behebt Sicherheitslücke Sandbox-Bypass]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/unternehmen-personalmangel-team</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T05:03:25+00:00</news:publication_date>
			<news:title><![CDATA[Viele Unternehmen klagen über Personalmangel im eigenen Team]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/nvidia-85-prozent-umsatzwachstum</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T04:40:58+00:00</news:publication_date>
			<news:title><![CDATA[Nvidia legt massiv zu: 85 Prozent Umsatzwachstum]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/datenschutz-bedenken-nutzer-zu-gmx</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T04:36:31+00:00</news:publication_date>
			<news:title><![CDATA[Datenschutz-Bedenken treiben Nutzer zu GMX]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/chatgpt-zugriff-auf-bankkonten</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T04:24:35+00:00</news:publication_date>
			<news:title><![CDATA[ChatGPT erhält Zugriff auf Bankkonten]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/skalierbare-ki-systeme-unternehmen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T03:46:00+00:00</news:publication_date>
			<news:title><![CDATA[Skalierbare KI-Systeme für den Unternehmenseinsatz entwickeln]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/quantenangriffe-storage-verteidigungslinie</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-21T03:04:00+00:00</news:publication_date>
			<news:title><![CDATA[Quantenangriffe: Storage als letzte Verteidigungslinie]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->