<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.it-daily.net/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://www.it-daily.net/shortnews/ki-missbrauch-deepfakes-eu-verbot</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T05:00:00+00:00</news:publication_date>
			<news:title><![CDATA[KI für Missbrauch-Deepfakes: EU einigt sich auf Verbot]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/deepfakes-gesichter-ermittler</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T04:50:00+00:00</news:publication_date>
			<news:title><![CDATA[Deepfakes stehlen Gesichter: Wie gehen Ermittler vor?]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/elon-musk-anthropic-rechenleistung</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T04:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Elon Musk gewährt Rivale Anthropic Rechenleistung]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/digital-ranking-hamburg-siegt</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T04:29:23+00:00</news:publication_date>
			<news:title><![CDATA[Digital-Ranking: Hamburg siegt, Saarland überrascht]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/identity-access-management/iam-im-health-sector</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T03:22:47+00:00</news:publication_date>
			<news:title><![CDATA[Wie IAM Effizienz und Compliance im Health Sector vereint]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/it-teams-unter-compliance-druck</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-07T03:03:00+00:00</news:publication_date>
			<news:title><![CDATA[IT-Teams unter Compliance-Druck: 39 Prozent für Regulierung gebunden]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/pimeyes-noyb-verklagt-datenschuetzer</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T18:36:34+00:00</news:publication_date>
			<news:title><![CDATA[PimEyes: noyb verklagt Hamburger Datenschützer]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/hochgeschwindigkeitszuege-gehackt</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T17:27:58+00:00</news:publication_date>
			<news:title><![CDATA[Hochgeschwindigkeitszüge von Student gehackt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/digitale-zwillinge-datenmangel-bremst</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T14:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Digitale Zwillinge: Datenmangel bremst Durchbruch]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cisa-leitfaden-agentische-ki</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T13:02:15+00:00</news:publication_date>
			<news:title><![CDATA[CISA veröffentlicht Leitfaden für agentische KI]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/phishing-plattform-massen-smishing</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T12:44:00+00:00</news:publication_date>
			<news:title><![CDATA[Globale Phishing-Plattform für Massen-Smishing enttarnt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/teampcp-bitwarden-tool</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T11:23:00+00:00</news:publication_date>
			<news:title><![CDATA[TeamPCP spielt falsches Spiel mit "offiziellem" Bitwarden-Tool]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/bitformer-holt-ralph-doerfler</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T10:23:00+00:00</news:publication_date>
			<news:title><![CDATA[bitformer holt Security-Experten Ralph Dörfler als Head of IT-Security]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/erp-sap/das-sap-is-h-ende</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T09:26:03+00:00</news:publication_date>
			<news:title><![CDATA[Das eigentliche Problem ist nicht das SAP IS-H Ende...]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/moveit-sicherheitsluecke-login</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T08:38:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische MOVEit-Sicherheitslücke: Login-Umgehung]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/vibe-coding-ohne-informatikkenntnisse-geht-es-auch-mit-ki-nicht</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T08:18:00+00:00</news:publication_date>
			<news:title><![CDATA[Vibe Coding: Ohne Informatikkenntnisse geht es auch mit KI nicht]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/zero-day-pan-os-palo-alto-firewalls</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T07:16:00+00:00</news:publication_date>
			<news:title><![CDATA[Zero-Day in PAN-OS: Angreifer kapern Palo-Alto-Firewalls]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/vimeo-datenleck-daten-im-darknet</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T07:05:00+00:00</news:publication_date>
			<news:title><![CDATA[Nach Vimeo-Datenleck: Daten von 119.000 Nutzern im Darknet]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/uae-plant-ki-regierung-bis-2028</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T06:03:00+00:00</news:publication_date>
			<news:title><![CDATA[UAE plant KI-Regierung bis 2028]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/daemon-tools-malware</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T05:26:50+00:00</news:publication_date>
			<news:title><![CDATA[Offizielle Daemon Tools-Downloads werden zur Malware-Falle]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/passwoerter-unsicher-was-schuetzt</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T04:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Passwörter sind im Alltag oft unsicher: Was wirklich schützt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/openai-50-milliarden-dollar-fuer-ki</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T04:45:00+00:00</news:publication_date>
			<news:title><![CDATA[OpenAI: Kosten von 50 Milliarden Dollar für Rechenleistung]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/de-domains-nicht-erreichbar-stoerung</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T04:32:00+00:00</news:publication_date>
			<news:title><![CDATA[Historische Störung: Massenweise de-Domains nicht erreichbar]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/verzoegerte-ki-siri-apple</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T04:25:00+00:00</news:publication_date>
			<news:title><![CDATA[Verzögerte KI-Siri: Apple will 250 Millionen Dollar zahlen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cisco-uebernimmt-astrix-security</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T04:24:36+00:00</news:publication_date>
			<news:title><![CDATA[Cisco übernimmt Astrix Security]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/digitalisierung/cloud-als-produktivitaetsfaktor</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T03:28:40+00:00</news:publication_date>
			<news:title><![CDATA[Wie die Cloud zum Produktivitätsfaktor wird]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/erp-sap/sap-s-4hana-migration-2</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T03:04:00+00:00</news:publication_date>
			<news:title><![CDATA[SAP S/4HANA Migration: Ein strategischer Leitfaden]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/e-commerce-verdraengungswettbewerb</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T16:49:17+00:00</news:publication_date>
			<news:title><![CDATA[E-Commerce: Verdrängungswettbewerb trifft kleine Online-Shops]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/cisco-model-provenance-kit</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T14:51:45+00:00</news:publication_date>
			<news:title><![CDATA[Cisco veröffentlicht Model Provenance Kit]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/sap-aufsichtsrat-rene-obermann</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T12:45:00+00:00</news:publication_date>
			<news:title><![CDATA[SAP-Aufsichtsrat: René Obermann wird Vorsitzender]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/openai-erstes-ki-agent-handy-2027</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T12:34:00+00:00</news:publication_date>
			<news:title><![CDATA[OpenAI forciert Smartphone-Pläne: Erstes KI-Agent-Handy kommt 2027]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ncsc-patch-welle-ki-angriffe</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T11:51:00+00:00</news:publication_date>
			<news:title><![CDATA[NCSC warnt vor Patch-Welle durch KI-gestützte Angriffe]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/huawei-aus-eu-kommission-konsequenz</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T10:33:08+00:00</news:publication_date>
			<news:title><![CDATA[Huawei vor dem Aus? EU-Kommission zieht Konsequenzen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/daten-von-15-jaehrigen-ausgespaeht</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T10:25:00+00:00</news:publication_date>
			<news:title><![CDATA[Daten von Online-Kunden von 15-Jährigen ausgespäht]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ki-chance-comeback-digitalminister</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T10:20:00+00:00</news:publication_date>
			<news:title><![CDATA[KI ist eine Chance für ein Comeback laut Digitalminister]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ki-nutzung-unternehmen-verfuenffacht</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T10:10:00+00:00</news:publication_date>
			<news:title><![CDATA[KI-Nutzung in Unternehmen hat sich verfünffacht]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/trellix-quellcode-repository</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T09:32:00+00:00</news:publication_date>
			<news:title><![CDATA[Trellix bestätigt Einbruch in Quellcode-Repository]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/ki-probabilistisches-denken</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T09:15:57+00:00</news:publication_date>
			<news:title><![CDATA[KI: Warum probabilistisches Denken entscheidend ist]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/digital-super-gau-nicht-vorbereitet</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T08:35:00+00:00</news:publication_date>
			<news:title><![CDATA[Welt auf digitalen Super-GAU nicht vorbereitet laut UN-Bericht]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/cybersecurity-keine-reine-it-frage</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T08:30:00+00:00</news:publication_date>
			<news:title><![CDATA[Warum Cybersecurity keine reine IT-Frage mehr ist]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/anthropic-openai-joint-venture</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T07:42:00+00:00</news:publication_date>
			<news:title><![CDATA[Anthropic und OpenAI gründen Joint Venture für Enterprise-KI]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/bundesbank-mythos-banken-in-der-eu</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T07:34:32+00:00</news:publication_date>
			<news:title><![CDATA[Bundesbank will Mythos-Zugang für EU-Banken]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/linux-system-root-rechte</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T07:20:00+00:00</news:publication_date>
			<news:title><![CDATA[Linux: 732 Bytes Programmcode reichen für Root-Rechte]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/smartphone-vortaeuschen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T06:34:17+00:00</news:publication_date>
			<news:title><![CDATA[Warum Ihr Smartphone einen Neustart nur vortäuschen könnte]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ev-zertifikate-gestohlen-digicert-support-per-chat-ausgetrickst</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T06:23:20+00:00</news:publication_date>
			<news:title><![CDATA[EV-Zertifikate gestohlen: DigiCert-Support per Chat ausgetrickst]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/amazon-ses-phishing</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T06:04:22+00:00</news:publication_date>
			<news:title><![CDATA[Amazon SES Phishing: Angriffe über geleakte AWS-Zugangsdaten]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/reddit-it-security</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T05:48:00+00:00</news:publication_date>
			<news:title><![CDATA[Reddit-Debatte: Verborgene Hürden im IT-Security-Alltag]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->