Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • AI
  • Awareness
  • Business Continuity
  • Chips
  • Cloud
  • Cybersecurity
  • Cyberwarfare
  • Data Breaches
  • Data Sharing
  • Data Subject
  • EIDAS
  • Encryption
  • Ethics
  • Fraud
  • GDPR
  • Hack
  • Information Security
  • Laws
  • Malware
  • Multifactor Authentication
  • Password Management
  • Phishing
  • Privacy
  • Ransomware
  • Smishing
  • Spyware
  • Surveillance
  • Uncategorized
  • Vulnerability
  • Zero Day
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
AI in focus with a global pulse on trust, use and impact
  • AI
April 29, 2025
1 minute read
SMS scams cost Americans $470M
  • Malware
  • Smishing
April 21, 2025
1 minute read
Digital ID drama between government and businesses
  • EIDAS
April 21, 2025
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • whatsapp
  • webshop
  • wallet
  • vulnerablity
  • vulnerability
  • vs
  • voters
  • vmware vulnerablity ransomware hacking
  • AI

AI in focus with a global pulse on trust, use and impact

Trust Gap: 54% of people remain skeptical of AI, especially in advanced economies, despite recognizing its technical capabilities.…
April 29, 2025
Lees meer
  • Malware
  • Smishing

SMS scams cost Americans $470M

SMS scams robbed Americans of $470 million in 2024, up from $373 million the year before. According to…
April 21, 2025
Lees meer
  • EIDAS

Digital ID drama between government and businesses

The UK’s digital ID debate has shifted from public distrust to a rift between government and businesses. Private…
April 21, 2025
Lees meer
  • EIDAS

The eIDAS2 Digital ID race with winners and stragglers

Germany, Italy, Estonia, and Poland are leading the charge in implementing digital IDs under eIDAS2, with well-developed pilot…
March 21, 2025
Lees meer
  • Phishing
  • Vulnerability

Phishing and data leaks are the top digital threats for consumers

Phishing and data leaks were last year’s biggest digital threats, according to Germany’s BSI. Cybercriminals now impersonate brands…
March 18, 2025
Lees meer
  • Privacy

FTC notifies 3.7 million Avast customers about compensation

The U.S. Federal Trade Commission (FTC) is emailing 3.7 million Avast customers, informing them they may be eligible…
February 25, 2025
Lees meer
  • Encryption
  • Privacy

Apple halts encrypted iCloud backups in the UK

Apple has stopped offering end-to-end encrypted iCloud backups in the UK due to government demands. UK authorities issued…
February 23, 2025
Lees meer
  • Uncategorized

DeepSeek database leak exposes AI security risks

Wiz Research uncovered a publicly accessible ClickHouse database belonging to DeepSeek, a Chinese AI startup. The database exposed…
January 30, 2025
Lees meer
  • AI
  • Privacy
  • Privacy

Italy probes DeepSeek data risks

Italy’s Privacy Guarantor has requested information from DeepSeek AI providers in China about their data collection practices. Authorities…
January 29, 2025
Lees meer
  • Data Breaches
  • GDPR

Hotel management platform Otelier leaks data of Marriott, Hilton, and Hyatt guests

Otelier, a platform used by hotel chains worldwide for managing reservations, transactions, and billing, has fallen victim to…
January 20, 2025
Lees meer
Featured Posts
  • AI in focus with a global pulse on trust, use and impact

    April 29, 2025
  • SMS scams cost Americans $470M

    April 21, 2025
  • Digital ID drama between government and businesses

    April 21, 2025
  • The eIDAS2 Digital ID race with winners and stragglers

    March 21, 2025
  • Phishing and data leaks are the top digital threats for consumers

    March 18, 2025
Categories
  • AI (15)
  • Awareness (5)
  • Business Continuity (2)
  • Chips (1)
  • Cloud (6)
  • Cybersecurity (20)
  • Cyberwarfare (1)
  • Data Breaches (28)
  • Data Sharing (1)
  • Data Subject (2)
  • EIDAS (3)
  • Encryption (1)
  • Ethics (3)
  • Fraud (2)
  • GDPR (14)
  • Hack (3)
  • Information Security (9)
  • Laws (6)
  • Malware (3)
  • Multifactor Authentication (1)
  • Password Management (2)
  • Phishing (11)
  • Privacy (36)
  • Ransomware (2)
  • Smishing (1)
  • Spyware (2)
  • Surveillance (3)
  • Uncategorized (9)
  • Vulnerability (4)
  • Zero Day (1)
Dataleaks
Copyright DataLeaks © 2023