<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.it-daily.net/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://www.it-daily.net/it-management/ki/ki-assistenten-im-vergleich-2026</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-01T13:41:56+00:00</news:publication_date>
			<news:title><![CDATA[KI-Assistenten im Vergleich 2026]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/experiment-wenn-ki-den-hacker-spielt</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-01T11:52:56+00:00</news:publication_date>
			<news:title><![CDATA[Sophos Red Team-Experiment: Wenn die KI den Hacker spielt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/fuehrungsteams-handlungsfaehig</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-01T08:18:41+00:00</news:publication_date>
			<news:title><![CDATA[So bleiben Führungsteams im Ernstfall handlungsfähig]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/openai-einbruch-bei-chatgpt-plus</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-01T07:20:53+00:00</news:publication_date>
			<news:title><![CDATA[OpenAI prognostiziert 80 % Einbruch bei ChatGPT Plus]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/sicherheitsluecke-millionen-domains</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-01T06:57:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische Sicherheitslücke ermöglicht Root-Zugriff auf Millionen Domains]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/jede-dritte-neue-website-ist-ki</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-01T06:32:30+00:00</news:publication_date>
			<news:title><![CDATA[Jede dritte neue Website ist KI-generiert]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/projekt-personal/gehalt-gestern-tech-talente-wechseln</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-01T05:28:53+00:00</news:publication_date>
			<news:title><![CDATA[Gehalt war gestern: Warum Tech-Talente wirklich wechseln]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/windows-staats-hacker-schwachstellen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-01T04:32:00+00:00</news:publication_date>
			<news:title><![CDATA[Windows: Staats-Hacker nutzen Schwachstellen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/level-up-meta-abhaengigkeit</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-01T03:16:31+00:00</news:publication_date>
			<news:title><![CDATA[„LevelUp“-Programm von Meta: Strategische Abhängigkeit?]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/verbindung-ki-und-erp</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-05-01T03:14:00+00:00</news:publication_date>
			<news:title><![CDATA[KI und ERP: Tiefgreifende Verbindung von 2 Systemen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/sicherheitsluecke-ki-firmen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T16:15:00+00:00</news:publication_date>
			<news:title><![CDATA[Sicherheitslücke KI: Firmen zweifeln an Schutzmaßnahmen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/industrial-generative-ai</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T14:56:04+00:00</news:publication_date>
			<news:title><![CDATA[Industrial Generative AI: Wenn der Zwilling antwortet]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/ki-agenten-cloud-sicherheit-knacken</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T14:37:00+00:00</news:publication_date>
			<news:title><![CDATA[Wenn KI-Agenten die Cloud-Sicherheit im Alleingang knacken]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/hackerangriff-frankreich-teenager</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T12:15:00+00:00</news:publication_date>
			<news:title><![CDATA[Hackerangriff in Frankreich: Teenager verdächtigt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/sap-pakete-passwoerter-stahlen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T12:14:00+00:00</news:publication_date>
			<news:title><![CDATA[Warum offizielle SAP-Pakete plötzlich Passwörter stahlen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/apple-vision-pro-offenbar-auf-eis-gelegt</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T11:11:00+00:00</news:publication_date>
			<news:title><![CDATA[Apple Vision Pro offenbar auf Eis gelegt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/europa-ki-bundesagentur-investiert</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T10:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Europas KI-Zukunft: Bundesagentur investiert 125 Millionen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/ki-schlechte-stammdaten-verbessern</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T10:30:35+00:00</news:publication_date>
			<news:title><![CDATA[Kann KI schlechte Stammdaten wirklich verbessern? ]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/android-eu-ende-ki-abschottung</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T10:14:53+00:00</news:publication_date>
			<news:title><![CDATA[Android: EU fordert Ende der KI-Abschottung]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/chatgpt-vernarrt-kobolde-goblins</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T09:43:50+00:00</news:publication_date>
			<news:title><![CDATA[Trainingsfehler: ChatGPT war vernarrt in Kobolde und Goblins]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/wordpress-plugin-hintertuer</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T09:10:00+00:00</news:publication_date>
			<news:title><![CDATA[Beliebtes WordPress-Plugin versteckte eine Hintertür]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/gpt-5-4-cyber-mythos-vulnerability</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T08:44:00+00:00</news:publication_date>
			<news:title><![CDATA[GPT-5.4-Cyber, Mythos und die neue Ökonomie der Vulnerability Discovery]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/vect-ransomware-loesegeld</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T07:55:00+00:00</news:publication_date>
			<news:title><![CDATA[VECT Ransomware: Warum Zahlung des Lösegelds zwecklos ist]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/industrie-rpa/digitale-produktpass-fertigung</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T07:01:00+00:00</news:publication_date>
			<news:title><![CDATA[Was der Digitale Produktpass der Fertigung bringt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cybercrime/ki-sicherheitslucken-nvidia-und-meta</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T06:06:00+00:00</news:publication_date>
			<news:title><![CDATA[KI-Sicherheitslücken bei NVIDIA und Meta gefährden Unternehmen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-sicherheit/cloud-security/clickup-datenleck-harter-api-key</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T05:19:03+00:00</news:publication_date>
			<news:title><![CDATA[Harter API-Key gefährdet Kunden: ClickUp-Datenleck]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ki-ranking-deutschland-verliert</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T05:10:00+00:00</news:publication_date>
			<news:title><![CDATA[KI-Ranking: Deutschland verliert Platz an Kanada]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ki-wettruesten-tech-riesen</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T05:05:00+00:00</news:publication_date>
			<news:title><![CDATA[KI-Wettrüsten: Tech-Riesen investieren beispiellos]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/samsung-hoechster-gewinn</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T04:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Samsung: Höchster Gewinn in Unternehmensgeschichte]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/amazon-hoechste-wachstumsrate-2022</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T04:45:00+00:00</news:publication_date>
			<news:title><![CDATA[Amazon: Höchste Wachstumsrate seit 2022]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/google-mutter-wall-street</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T04:35:00+00:00</news:publication_date>
			<news:title><![CDATA[Google-Mutter: Wall-Street-Erwartungen übertroffen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/microsoft-schwachstellen-kritischer</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T04:32:53+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft-Schwachstellen werden seltener, aber kritischer]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/shortnews/ki-investitionen-facebook-meta</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T04:25:00+00:00</news:publication_date>
			<news:title><![CDATA[Facebook-Konzern Meta: KI-Investitionen steigen an]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/ki/promptathon-erfolgreiche-ki-einfuehrung</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T03:35:00+00:00</news:publication_date>
			<news:title><![CDATA[Promptathon: Der Shortcut für die erfolgreiche Einführung von KI ]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://www.it-daily.net/it-management/erp-sap/umfassende-sap-sicherheit</loc>
		<news:news>
			<news:publication>
				<news:name>it-daily.net</news:name>
				<news:language>de</news:language>
			</news:publication>
			<news:publication_date>2026-04-30T03:04:00+00:00</news:publication_date>
			<news:title><![CDATA[Umfassende SAP-Sicherheit: Kritische Aspekte für Unternehmen]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->