<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.it-daily.net/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://www.it-daily.net/shortnews/claude-agents-lernen-das-traeumen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T12:37:00+00:00</news:publication_date>
			<news:title><![CDATA[Claude Agents lernen jetzt das „Träumen“]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/ki-struktur-statt-chaos</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T12:31:35+00:00</news:publication_date>
			<news:title><![CDATA[KI als Gamechanger: Struktur statt Chaos]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/de-domain-verifizierungsaufforderungen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T11:53:51+00:00</news:publication_date>
			<news:title><![CDATA[DENIC verschickt Verifizierungsaufforderungen an .de-Domaininhaber]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/bsi-chefin-zieht-bilanz</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T11:25:32+00:00</news:publication_date>
			<news:title><![CDATA[BSI-Chefin zieht Bilanz: Cyberdome, NIS2 und viel Zuversicht]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/digitalisierung/digitalisierung-vergabewesen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T10:53:00+00:00</news:publication_date>
			<news:title><![CDATA[Digitalisierung im Vergabewesen: Wie öffentliche Ausschreibungen effizienter werden]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/spam-anrufe-nummern</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T10:05:00+00:00</news:publication_date>
			<news:title><![CDATA[Checkliste für Spam-Anrufe: Diese Nummern sind Abzocke]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/projekt-personal/hr-software-alltag</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T10:01:00+00:00</news:publication_date>
			<news:title><![CDATA[HR-Software im Alltag: Warum Integrationen oft wichtiger sind als neue Funktionen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/microsoft-aitm-phishing-kampagne</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T09:26:07+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft entdeckt großangelegte AiTM-Phishing-Kampagne]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/google-chrome-4gb-gemini-ki</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T08:33:33+00:00</news:publication_date>
			<news:title><![CDATA[Google Chrome: Heimliche Installation von 4GB Gemini-KI]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/projekt-personal/wie-ki-fuehrungsalltag-veraendert</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T08:33:00+00:00</news:publication_date>
			<news:title><![CDATA[Mehr Zeit für Entscheidungen: Wie KI den Führungsalltag verändert]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/amazon-alexa-in-deutsche-wohnzimmer</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T08:20:00+00:00</news:publication_date>
			<news:title><![CDATA[Amazon bringt Alexa+ in deutsche Wohnzimmer]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/saiga-2fa-gefaehrliches-phishing-kit</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T08:14:00+00:00</news:publication_date>
			<news:title><![CDATA[Saiga 2FA: Gefährliches Phishing-Kit kehrt mit neuer Tarntechnik zurück]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/microsoft-edge-sicherheitsrisiko</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T08:07:27+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft Edge: Sicherheitsrisiko im RAM]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/kuenstlicher-intelligenz-gft</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T07:40:00+00:00</news:publication_date>
			<news:title><![CDATA[GFT: Wachstumskurs dank Künstlicher Intelligenz]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/quasar-linux-malware</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T07:12:07+00:00</news:publication_date>
			<news:title><![CDATA[Quasar Linux: Neue Malware infiltriert Entwickler-Systeme]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cushman-wakefield-salesforce-daten</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T06:02:07+00:00</news:publication_date>
			<news:title><![CDATA[Cushman &amp; Wakefield: 500.000 Salesforce-Datensätze im Visier]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ki-missbrauch-deepfakes-eu-verbot</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T05:00:00+00:00</news:publication_date>
			<news:title><![CDATA[KI für Missbrauch-Deepfakes: EU einigt sich auf Verbot]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/deepfakes-gesichter-ermittler</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T04:50:00+00:00</news:publication_date>
			<news:title><![CDATA[Deepfakes stehlen Gesichter: Wie gehen Ermittler vor?]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/elon-musk-anthropic-rechenleistung</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T04:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Elon Musk gewährt Rivale Anthropic Rechenleistung]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/digital-ranking-hamburg-siegt</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T04:29:23+00:00</news:publication_date>
			<news:title><![CDATA[Digital-Ranking: Hamburg siegt, Saarland überrascht]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/identity-access-management/iam-im-health-sector</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T03:22:47+00:00</news:publication_date>
			<news:title><![CDATA[Wie IAM Effizienz und Compliance im Health Sector vereint]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/it-teams-unter-compliance-druck</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T03:03:00+00:00</news:publication_date>
			<news:title><![CDATA[IT-Teams unter Compliance-Druck: 39 Prozent für Regulierung gebunden]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/pimeyes-noyb-verklagt-datenschuetzer</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T18:36:34+00:00</news:publication_date>
			<news:title><![CDATA[PimEyes: noyb verklagt Hamburger Datenschützer]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/hochgeschwindigkeitszuege-gehackt</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T17:27:58+00:00</news:publication_date>
			<news:title><![CDATA[Hochgeschwindigkeitszüge von Student gehackt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/digitale-zwillinge-datenmangel-bremst</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T14:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Digitale Zwillinge: Datenmangel bremst Durchbruch]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cisa-leitfaden-agentische-ki</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T13:02:15+00:00</news:publication_date>
			<news:title><![CDATA[CISA veröffentlicht Leitfaden für agentische KI]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/phishing-plattform-massen-smishing</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T12:44:00+00:00</news:publication_date>
			<news:title><![CDATA[Globale Phishing-Plattform für Massen-Smishing enttarnt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/teampcp-bitwarden-tool</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T11:23:00+00:00</news:publication_date>
			<news:title><![CDATA[TeamPCP spielt falsches Spiel mit "offiziellem" Bitwarden-Tool]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/bitformer-holt-ralph-doerfler</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T10:23:00+00:00</news:publication_date>
			<news:title><![CDATA[bitformer holt Security-Experten Ralph Dörfler als Head of IT-Security]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/erp-sap/das-sap-is-h-ende</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T09:26:03+00:00</news:publication_date>
			<news:title><![CDATA[Das eigentliche Problem ist nicht das SAP IS-H Ende...]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/moveit-sicherheitsluecke-login</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T08:38:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische MOVEit-Sicherheitslücke: Login-Umgehung]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/vibe-coding-ohne-informatikkenntnisse-geht-es-auch-mit-ki-nicht</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T08:18:00+00:00</news:publication_date>
			<news:title><![CDATA[Vibe Coding: Ohne Informatikkenntnisse geht es auch mit KI nicht]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/zero-day-pan-os-palo-alto-firewalls</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T07:16:00+00:00</news:publication_date>
			<news:title><![CDATA[Zero-Day in PAN-OS: Angreifer kapern Palo-Alto-Firewalls]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/vimeo-datenleck-daten-im-darknet</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T07:05:00+00:00</news:publication_date>
			<news:title><![CDATA[Nach Vimeo-Datenleck: Daten von 119.000 Nutzern im Darknet]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/uae-plant-ki-regierung-bis-2028</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T06:03:00+00:00</news:publication_date>
			<news:title><![CDATA[UAE plant KI-Regierung bis 2028]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/daemon-tools-malware</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T05:26:50+00:00</news:publication_date>
			<news:title><![CDATA[Offizielle Daemon Tools-Downloads werden zur Malware-Falle]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/passwoerter-unsicher-was-schuetzt</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T04:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Passwörter sind im Alltag oft unsicher: Was wirklich schützt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/openai-50-milliarden-dollar-fuer-ki</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T04:45:00+00:00</news:publication_date>
			<news:title><![CDATA[OpenAI: Kosten von 50 Milliarden Dollar für Rechenleistung]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/de-domains-nicht-erreichbar-stoerung</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T04:32:00+00:00</news:publication_date>
			<news:title><![CDATA[Historische Störung: Massenweise de-Domains nicht erreichbar]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/verzoegerte-ki-siri-apple</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T04:25:00+00:00</news:publication_date>
			<news:title><![CDATA[Verzögerte KI-Siri: Apple will 250 Millionen Dollar zahlen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cisco-uebernimmt-astrix-security</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T04:24:36+00:00</news:publication_date>
			<news:title><![CDATA[Cisco übernimmt Astrix Security]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/digitalisierung/cloud-als-produktivitaetsfaktor</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T03:28:40+00:00</news:publication_date>
			<news:title><![CDATA[Wie die Cloud zum Produktivitätsfaktor wird]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/erp-sap/sap-s-4hana-migration-2</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T03:04:00+00:00</news:publication_date>
			<news:title><![CDATA[SAP S/4HANA Migration: Ein strategischer Leitfaden]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/e-commerce-verdraengungswettbewerb</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T16:49:17+00:00</news:publication_date>
			<news:title><![CDATA[E-Commerce: Verdrängungswettbewerb trifft kleine Online-Shops]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cisco-model-provenance-kit</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T14:51:45+00:00</news:publication_date>
			<news:title><![CDATA[Cisco veröffentlicht Model Provenance Kit]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->