Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
    • Sovereignty
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
When Palantir-AI becomes a sovereignty risk
  • EU AI Act
  • Sovereignty
December 14, 2025
1 minute read
The Wallet that ends the weakest “password” link
  • EIDAS
  • EU AI Act
December 7, 2025
1 minute read
Zero-Day breach hits Logitech with data stolen across multiple groups
  • Hacks
  • Personal Data
  • Ransomware
November 16, 2025
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • wallet
  • vulnerablity
  • vulnerability
  • EU AI Act
  • Sovereignty

When Palantir-AI becomes a sovereignty risk

Switzerland rejected Palantir after a technical review found data leakage cannot be reliably prevented—an architectural, not legal, flaw.…
December 14, 2025
Lees meer
  • EIDAS
  • EU AI Act

The Wallet that ends the weakest “password” link

Europe’s EUDI Wallet can technically replace passwords today with cryptographic, verifiable, privacy-preserving login. Passwords persist only because institutions…
December 7, 2025
Lees meer
  • Hacks
  • Personal Data
  • Ransomware

Zero-Day breach hits Logitech with data stolen across multiple groups

Logitech reports attackers stole data likely belonging to customers, employees, and suppliers. The breach stemmed from a zero-day…
November 16, 2025
Lees meer
  • Awareness
  • EU AI Act

Trust is on the line in America through disinformation

One in five top public concerns in the U.S. now involves information manipulation. About 70% of Americans see…
October 19, 2025
Lees meer
  • EIDAS

Starmer bets big on Digital ID revolution

UK PM Keir Starmer is preparing to unveil a nationwide digital ID scheme at the Labour Party conference.…
September 21, 2025
Lees meer
  • Awareness
  • Cybersecurity
  • Hacks

How Russia shapes minds with the Playbook of Deception

A richly illustrated guide exposes the mechanisms behind Russian disinformation from bots and deepfakes to agenda-setting and polarization.…
September 21, 2025
Lees meer
  • Dataleaks
  • EU AI Act
  • Privacy

How LLMs leak your data while prompting

Simple prompt injections can trick LLM agents into exposing sensitive personal data. Even with safeguards, attackers extract details…
September 3, 2025
Lees meer
  • EU AI Act
  • GDPR
  • Privacy

Austria deals blow to “Pay or Okay” consent model

The Austrian Federal Administrative Court confirmed that DerStandard’s “Pay or Okay” model breaches the GDPR. Users had to…
August 20, 2025
Lees meer
  • EU AI Act
  • Privacy

When privacy becomes training data

Researchers found millions of passports, credit cards, résumés, and faces in DataComp CommonPool, a massive AI training dataset…
August 17, 2025
Lees meer
  • Dataleaks
  • Hacks

Clorox blames IT Firm for $380M hack after “Password Over the Phone” slip

Clorox is suing IT provider Cognizant after a 2023 ransomware attack cost the company $380 million. The lawsuit…
July 24, 2025
Lees meer
Featured Posts
  • When Palantir-AI becomes a sovereignty risk

    December 14, 2025
  • The Wallet that ends the weakest “password” link

    December 7, 2025
  • Zero-Day breach hits Logitech with data stolen across multiple groups

    November 16, 2025
  • Trust is on the line in America through disinformation

    October 19, 2025
  • Starmer bets big on Digital ID revolution

    September 21, 2025
Categories
  • Awareness (8)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (23)
  • Data Sharing (1)
  • Dataleaks (30)
  • EIDAS (5)
  • EU AI Act (22)
  • Fraud (2)
  • GDPR (17)
  • Hacks (7)
  • Information Security (10)
  • Malware (4)
  • MFA (1)
  • Password Management (2)
  • Personal Data (5)
  • Phishing (13)
  • Privacy (40)
  • Ransomware (5)
  • Sovereignty (1)
  • Uncategorized (9)
  • Vulnerabilities (4)
Dataleaks
Copyright DataLeaks © 2025