<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.it-daily.net/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://www.it-daily.net/shortnews/ki-nutzung-unternehmen-verfuenffacht</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T10:10:00+00:00</news:publication_date>
			<news:title><![CDATA[KI-Nutzung in Unternehmen hat sich verfünffacht]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/trellix-quellcode-repository</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T09:32:00+00:00</news:publication_date>
			<news:title><![CDATA[Trellix bestätigt Einbruch in Quellcode-Repository]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/ki-probabilistisches-denken</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T09:15:57+00:00</news:publication_date>
			<news:title><![CDATA[KI: Warum probabilistisches Denken entscheidend ist]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/digital-super-gau-nicht-vorbereitet</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T08:35:00+00:00</news:publication_date>
			<news:title><![CDATA[Welt auf digitalen Super-GAU nicht vorbereitet laut UN-Bericht]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/cybersecurity-keine-reine-it-frage</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T08:30:00+00:00</news:publication_date>
			<news:title><![CDATA[Warum Cybersecurity keine reine IT-Frage mehr ist]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/anthropic-openai-joint-venture</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T07:42:00+00:00</news:publication_date>
			<news:title><![CDATA[Anthropic und OpenAI gründen Joint Venture für Enterprise-KI]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/bundesbank-mythos-banken-in-der-eu</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T07:34:32+00:00</news:publication_date>
			<news:title><![CDATA[Bundesbank will Mythos-Zugang für EU-Banken]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/linux-system-root-rechte</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T07:20:00+00:00</news:publication_date>
			<news:title><![CDATA[Linux: 732 Bytes Programmcode reichen für Root-Rechte]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/smartphone-vortaeuschen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T06:34:17+00:00</news:publication_date>
			<news:title><![CDATA[Warum Ihr Smartphone einen Neustart nur vortäuschen könnte]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ev-zertifikate-gestohlen-digicert-support-per-chat-ausgetrickst</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T06:23:20+00:00</news:publication_date>
			<news:title><![CDATA[EV-Zertifikate gestohlen: DigiCert-Support per Chat ausgetrickst]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/amazon-ses-phishing</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T06:04:22+00:00</news:publication_date>
			<news:title><![CDATA[Amazon SES Phishing: Angriffe über geleakte AWS-Zugangsdaten]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/reddit-it-security</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T05:48:00+00:00</news:publication_date>
			<news:title><![CDATA[Reddit-Debatte: Verborgene Hürden im IT-Security-Alltag]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/thought-leadership/brain-fry-ki-nutzung-burnout</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T05:12:00+00:00</news:publication_date>
			<news:title><![CDATA[Brain Fry: Warum KI-Nutzung zum Burnout-Risiko wird]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/roboter-personalmangel-am-bau</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T04:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Kollege Roboter hilft gegen Personalmangel am Bau]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/palantir-85-prozent-umsatzplus</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T04:45:00+00:00</news:publication_date>
			<news:title><![CDATA[Daten-Firma Palantir erzielt 85 Prozent Umsatzplus]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/elon-musk-vergleich-klage-twitter</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T04:35:00+00:00</news:publication_date>
			<news:title><![CDATA[Elon Musk will Vergleich bei Klage zu Twitter-Übernahme]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/google-gemini-illusion-wahlfreiheit</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T04:04:40+00:00</news:publication_date>
			<news:title><![CDATA[Google Gemini: Die Illusion der Wahlfreiheit]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/sicherheitsluecke-github</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T03:36:48+00:00</news:publication_date>
			<news:title><![CDATA[Die Sicherheitslücke, die GitHub erschütterte]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/digitalisierung/wie-hybride-meetings-besser-gelingen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T03:04:20+00:00</news:publication_date>
			<news:title><![CDATA[Wie hybride Meetings besser gelingen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ob-smartphone-oder-smartwatch</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T15:13:03+00:00</news:publication_date>
			<news:title><![CDATA[Ob Smartphone oder Smartwatch: Zwei Drittel der Deutschen zahlen mobil]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/canvas-hackerangriff</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T13:18:00+00:00</news:publication_date>
			<news:title><![CDATA[Canvas-Hackerangriff: Millionen Schülerdaten entwendet]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cpanel-luecke-40-000-server</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T13:08:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische cPanel-Lücke: Über 40.000 Server kompromittiert]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cyberangriff-datenschutzbeauftragte</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T13:05:00+00:00</news:publication_date>
			<news:title><![CDATA[Nach Cyberangriff: Datenschutzbeauftragte rügt BVG]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/physical-ai-maschinen-realitaet</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T12:29:00+00:00</news:publication_date>
			<news:title><![CDATA[Physical AI: Maschinen begreifen jetzt die Realität]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/sap-eine-milliarde-euro-ki-firma</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T12:10:00+00:00</news:publication_date>
			<news:title><![CDATA[Nach Übernahme: SAP steckt eine Milliarde Euro in KI-Firma]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/telekom-glasfaser-eine-million</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T11:20:00+00:00</news:publication_date>
			<news:title><![CDATA[Berlin: Telekom-Glasfaser liegt bei einer Million Wohnungen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/voyage-prive-datenleck</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T11:10:00+00:00</news:publication_date>
			<news:title><![CDATA[Voyage Privé Datenleck: Reisepass- und Buchungsdaten kompromittiert]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/videokameras-datenschutzbeschwerden</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T11:10:00+00:00</news:publication_date>
			<news:title><![CDATA[Mehr Datenschutzbeschwerden bei Videokameras in Brandenburg]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ask-com-stellt-betrieb-ein</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T10:27:30+00:00</news:publication_date>
			<news:title><![CDATA[Ask.com stellt Betrieb nach 29 Jahren ein]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ki-boom-in-deutschland</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T10:05:00+00:00</news:publication_date>
			<news:title><![CDATA[KI-Boom in Deutschland]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/google-suche-bevorzugte-quellen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T09:42:00+00:00</news:publication_date>
			<news:title><![CDATA[Google Suche führt neue Funktion „Bevorzugte Quellen“ ein]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cisa-drei-tage-frist-patches</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T08:33:00+00:00</news:publication_date>
			<news:title><![CDATA[CISA plant Drei-Tage-Frist für Sicherheits-Patches]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/agentische-ki-neue-amazon-quick</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T08:02:00+00:00</news:publication_date>
			<news:title><![CDATA[Das neue Amazon Quick: Agentische KI am Desktop]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/spezial/weekend-special-storage/project-silica-microsoft</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T07:27:00+00:00</news:publication_date>
			<news:title><![CDATA[Project Silica von Microsoft: Glasspeicher für 10.000 Jahre]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/claude-security-anthropic</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T07:13:00+00:00</news:publication_date>
			<news:title><![CDATA[Claude Security: Anthropic startet defensive KI-Plattform]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/iran-krieg-aws-rechenzentren-fallen-fuer-monate-aus</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T06:27:47+00:00</news:publication_date>
			<news:title><![CDATA[Iran-Krieg: AWS-Rechenzentren fallen für Monate aus]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ki-agenten-97-firmen-ohne-schutz</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T06:06:10+00:00</news:publication_date>
			<news:title><![CDATA[KI-Agenten außer Kontrolle: 97 % der Firmen ohne Schutz]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/industrie-anlagen-ohne-passwort</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T05:20:00+00:00</news:publication_date>
			<news:title><![CDATA[Hunderte Industrie-Anlagen ohne Passwort im Internet]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/apple-hoehere-kosten-speicherchips</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T04:35:00+00:00</news:publication_date>
			<news:title><![CDATA[Apple: Deutlich höhere Kosten für Speicherchips]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/elon-musk-openai-ki-firma-genutzt</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T04:25:00+00:00</news:publication_date>
			<news:title><![CDATA[Elon Musk: Modelle von OpenAI für KI-Firma genutzt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/cloud-computing/souveraenitaet-heisst-wahlfreiheit</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T04:13:46+00:00</news:publication_date>
			<news:title><![CDATA[Souveränität heißt Wahlfreiheit]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/digitale-souveraenitaet-cloud</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T03:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Digitale Souveränität: Wer kontrolliert die Cloud?]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/uem-als-werkzeug</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T03:41:00+00:00</news:publication_date>
			<news:title><![CDATA[UEM als Werkzeug]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/data-center/ki-workloads-stellen-rz-weichen-neu</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T03:09:02+00:00</news:publication_date>
			<news:title><![CDATA[KI-Workloads stellen RZ-Weichen neu]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->