<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.it-daily.net/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://www.it-daily.net/shortnews/canvas-hackerangriff</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T13:18:00+00:00</news:publication_date>
			<news:title><![CDATA[Canvas-Hackerangriff: Millionen Schülerdaten entwendet]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cpanel-luecke-40-000-server</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T13:08:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische cPanel-Lücke: Über 40.000 Server kompromittiert]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cyberangriff-datenschutzbeauftragte</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T13:05:00+00:00</news:publication_date>
			<news:title><![CDATA[Nach Cyberangriff: Datenschutzbeauftragte rügt BVG]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/physical-ai-maschinen-realitaet</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T12:29:00+00:00</news:publication_date>
			<news:title><![CDATA[Physical AI: Maschinen begreifen jetzt die Realität]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/sap-eine-milliarde-euro-ki-firma</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T12:10:00+00:00</news:publication_date>
			<news:title><![CDATA[Nach Übernahme: SAP steckt eine Milliarde Euro in KI-Firma]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/telekom-glasfaser-eine-million</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T11:20:00+00:00</news:publication_date>
			<news:title><![CDATA[Berlin: Telekom-Glasfaser liegt bei einer Million Wohnungen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/voyage-prive-datenleck</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T11:10:00+00:00</news:publication_date>
			<news:title><![CDATA[Voyage Privé Datenleck: Reisepass- und Buchungsdaten kompromittiert]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/videokameras-datenschutzbeschwerden</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T11:10:00+00:00</news:publication_date>
			<news:title><![CDATA[Mehr Datenschutzbeschwerden bei Videokameras in Brandenburg]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ask-com-stellt-betrieb-ein</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T10:27:30+00:00</news:publication_date>
			<news:title><![CDATA[Ask.com stellt Betrieb nach 29 Jahren ein]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ki-boom-in-deutschland</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T10:05:00+00:00</news:publication_date>
			<news:title><![CDATA[KI-Boom in Deutschland]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/google-suche-bevorzugte-quellen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T09:42:00+00:00</news:publication_date>
			<news:title><![CDATA[Google Suche führt neue Funktion „Bevorzugte Quellen“ ein]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cisa-drei-tage-frist-patches</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T08:33:00+00:00</news:publication_date>
			<news:title><![CDATA[CISA plant Drei-Tage-Frist für Sicherheits-Patches]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/agentische-ki-neue-amazon-quick</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T08:02:00+00:00</news:publication_date>
			<news:title><![CDATA[Das neue Amazon Quick: Agentische KI am Desktop]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/spezial/weekend-special-storage/project-silica-microsoft</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T07:27:00+00:00</news:publication_date>
			<news:title><![CDATA[Project Silica von Microsoft: Glasspeicher für 10.000 Jahre]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/claude-security-anthropic</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T07:13:00+00:00</news:publication_date>
			<news:title><![CDATA[Claude Security: Anthropic startet defensive KI-Plattform]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/iran-krieg-aws-rechenzentren-fallen-fuer-monate-aus</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T06:27:47+00:00</news:publication_date>
			<news:title><![CDATA[Iran-Krieg: AWS-Rechenzentren fallen für Monate aus]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ki-agenten-97-firmen-ohne-schutz</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T06:06:10+00:00</news:publication_date>
			<news:title><![CDATA[KI-Agenten außer Kontrolle: 97 % der Firmen ohne Schutz]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/industrie-anlagen-ohne-passwort</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T05:20:00+00:00</news:publication_date>
			<news:title><![CDATA[Hunderte Industrie-Anlagen ohne Passwort im Internet]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/apple-hoehere-kosten-speicherchips</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T04:35:00+00:00</news:publication_date>
			<news:title><![CDATA[Apple: Deutlich höhere Kosten für Speicherchips]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/elon-musk-openai-ki-firma-genutzt</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T04:25:00+00:00</news:publication_date>
			<news:title><![CDATA[Elon Musk: Modelle von OpenAI für KI-Firma genutzt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/cloud-computing/souveraenitaet-heisst-wahlfreiheit</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T04:13:46+00:00</news:publication_date>
			<news:title><![CDATA[Souveränität heißt Wahlfreiheit]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/digitale-souveraenitaet-cloud</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T03:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Digitale Souveränität: Wer kontrolliert die Cloud?]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/uem-als-werkzeug</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T03:41:00+00:00</news:publication_date>
			<news:title><![CDATA[UEM als Werkzeug]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/data-center/ki-workloads-stellen-rz-weichen-neu</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T03:09:02+00:00</news:publication_date>
			<news:title><![CDATA[KI-Workloads stellen RZ-Weichen neu]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/kitkat-huelle-blockiert-handysignale</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T09:17:56+00:00</news:publication_date>
			<news:title><![CDATA[KitKat-Hülle blockiert Handysignale für echte Pausen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/data-center/was-tun-mit-ausgedienten-rechenzentren</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T08:13:00+00:00</news:publication_date>
			<news:title><![CDATA[Was tun mit ausgedienten Rechenzentren?]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/netflix-tools-spionage</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T06:54:00+00:00</news:publication_date>
			<news:title><![CDATA[Verräterische Netflix-Tools: Legale Spionage durch Adblocker]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/ki-nutzung-jeder-dritte-woechentlich</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T06:46:41+00:00</news:publication_date>
			<news:title><![CDATA[KI-Nutzung: Jeder Dritte nutzt Algorithmen wöchentlich]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/memory-tagging-arbeitsspeicher</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T05:29:00+00:00</news:publication_date>
			<news:title><![CDATA[Memory Tagging und der Kampf um sichere Arbeitsspeicher]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/projekt-personal/ki-unternehmen-technik-produktivitaet</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T03:45:43+00:00</news:publication_date>
			<news:title><![CDATA[KI im Unternehmen: Warum Technik allein keine Produktivität schafft]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ki-fehler-schwarzmarkt-kreditkarten</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-02T16:52:36+00:00</news:publication_date>
			<news:title><![CDATA[KI-Fehler entlarvt Millionen-Schwarzmarkt Kreditkarten]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/quanten-ki-deutschlands-weg</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-02T13:56:27+00:00</news:publication_date>
			<news:title><![CDATA[Quanten-KI: Deutschlands Weg]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->