Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
Starmer bets big on Digital ID revolution
  • EIDAS
September 21, 2025
1 minute read
How Russia shapes minds with the Playbook of Deception
  • Awareness
  • Cybersecurity
  • Hacks
September 21, 2025
1 minute read
How LLMs leak your data while prompting
  • Dataleaks
  • EU AI Act
  • Privacy
September 3, 2025
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • wallet
  • vulnerablity
  • vulnerability
  • EIDAS

Starmer bets big on Digital ID revolution

UK PM Keir Starmer is preparing to unveil a nationwide digital ID scheme at the Labour Party conference.…
September 21, 2025
Lees meer
  • Awareness
  • Cybersecurity
  • Hacks

How Russia shapes minds with the Playbook of Deception

A richly illustrated guide exposes the mechanisms behind Russian disinformation from bots and deepfakes to agenda-setting and polarization.…
September 21, 2025
Lees meer
  • Dataleaks
  • EU AI Act
  • Privacy

How LLMs leak your data while prompting

Simple prompt injections can trick LLM agents into exposing sensitive personal data. Even with safeguards, attackers extract details…
September 3, 2025
Lees meer
  • EU AI Act
  • GDPR
  • Privacy

Austria deals blow to “Pay or Okay” consent model

The Austrian Federal Administrative Court confirmed that DerStandard’s “Pay or Okay” model breaches the GDPR. Users had to…
August 20, 2025
Lees meer
  • EU AI Act
  • Privacy

When privacy becomes training data

Researchers found millions of passports, credit cards, résumés, and faces in DataComp CommonPool, a massive AI training dataset…
August 17, 2025
Lees meer
  • Dataleaks
  • Hacks

Clorox blames IT Firm for $380M hack after “Password Over the Phone” slip

Clorox is suing IT provider Cognizant after a 2023 ransomware attack cost the company $380 million. The lawsuit…
July 24, 2025
Lees meer
  • Information Security

Is the CISO role the job nobody wants?

Once seen as a prestigious tech leadership role, the CISO position is now plagued by burnout, overwhelming stress,…
July 11, 2025
Lees meer
  • EU AI Act

40% of agentic AI projects will fail

Gartner predicts over 40% of agentic AI projects will be canceled by 2027 due to cost, unclear ROI,…
July 2, 2025
Lees meer
  • Cybersecurity

Account security with new plain English guide

The National Cyber Security Centre (NCSC-IE) and the National Adult Literacy Agency (NALA) have launched a user-friendly, plain…
June 18, 2025
Lees meer
  • Ransomware

Anubis ransomware doubles down with encryption and total data wipe

The new Anubis ransomware not only encrypts files but can also permanently erase them, making recovery impossible—even if…
June 17, 2025
Lees meer
Featured Posts
  • Starmer bets big on Digital ID revolution

    September 21, 2025
  • How Russia shapes minds with the Playbook of Deception

    September 21, 2025
  • How LLMs leak your data while prompting

    September 3, 2025
  • Austria deals blow to “Pay or Okay” consent model

    August 20, 2025
  • When privacy becomes training data

    August 17, 2025
Categories
  • Awareness (7)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (23)
  • Data Sharing (1)
  • Dataleaks (30)
  • EIDAS (4)
  • EU AI Act (19)
  • Fraud (2)
  • GDPR (17)
  • Hacks (6)
  • Information Security (10)
  • Malware (4)
  • MFA (1)
  • Password Management (2)
  • Personal Data (4)
  • Phishing (13)
  • Privacy (40)
  • Ransomware (4)
  • Uncategorized (9)
  • Vulnerabilities (4)
Dataleaks
Copyright DataLeaks © 2025