Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
    • Sovereignty
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
Google warns of imminent security risks with quantum wake-up call
  • Information Security
March 29, 2026
1 minute read
Why AI Agents are easier to hack than you think
  • EU AI Act
  • Hacks
March 23, 2026
1 minute read
How are AI and robots reshaping jobs?
  • Cybersecurity
  • EU AI Act
March 15, 2026
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • weakness
  • wallet
  • vulnerablity
  • Information Security

Google warns of imminent security risks with quantum wake-up call

Google warns quantum computing could soon break today’s encryption, threatening global digital security. Quantum machines aren’t powerful enough…
March 29, 2026
Lees meer
  • EU AI Act
  • Hacks

Why AI Agents are easier to hack than you think

Indirect prompt injection is the most widespread and serious vulnerability in AI agents today, not just a theoretical…
March 23, 2026
Lees meer
  • Cybersecurity
  • EU AI Act

How are AI and robots reshaping jobs?

The Future Jobs: Robots, Artificial Intelligence, and Digital Platforms in East Asia and Pacific by the World Bank…
March 15, 2026
Lees meer
  • EU AI Act
  • Malware
  • Vulnerabilities

OpenClaw AI security flaws expose systems to data theft

China’s National Computer Network Emergency Response Technical Team warned that the open-source AI agent OpenClaw has weak default…
March 15, 2026
Lees meer
  • Dataleaks

LeakBase cybercrime forum shut down

An international operation led by Europol dismantled LeakBase, a major online forum trading stolen databases and login credentials.…
March 15, 2026
Lees meer
  • Hacks

Leaked iPhone Spy Toolkit now used by Russian hackers

Security researchers uncovered “Coruna,” a powerful iPhone exploit toolkit containing 23 exploits and five attack chains that can…
March 10, 2026
Lees meer
  • EU AI Act
  • Privacy

Global privacy alarm raised for AI without consent

On 23 February 2026, a coalition led by the Global Privacy Assembly warned about AI systems generating realistic…
February 23, 2026
Lees meer
  • EIDAS

The future of legally binding digital signing in Europe

The EU Digital Identity Wallet (EUDI Wallet) will allow citizens to create Electronic Signatures legally equivalent to handwritten…
February 18, 2026
Lees meer
  • EU AI Act
  • Sovereignty

When Palantir-AI becomes a sovereignty risk

Switzerland rejected Palantir after a technical review found data leakage cannot be reliably prevented—an architectural, not legal, flaw.…
December 14, 2025
Lees meer
  • EIDAS
  • EU AI Act

The Wallet that ends the weakest “password” link

Europe’s EUDI Wallet can technically replace passwords today with cryptographic, verifiable, privacy-preserving login. Passwords persist only because institutions…
December 7, 2025
Lees meer
Featured Posts
  • Google warns of imminent security risks with quantum wake-up call

    March 29, 2026
  • Why AI Agents are easier to hack than you think

    March 23, 2026
  • How are AI and robots reshaping jobs?

    March 15, 2026
  • OpenClaw AI security flaws expose systems to data theft

    March 15, 2026
  • LeakBase cybercrime forum shut down

    March 15, 2026
Categories
  • Awareness (8)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (24)
  • Data Sharing (1)
  • Dataleaks (31)
  • EIDAS (6)
  • EU AI Act (26)
  • Fraud (2)
  • GDPR (17)
  • Hacks (9)
  • Information Security (11)
  • Malware (5)
  • MFA (1)
  • Password Management (2)
  • Personal Data (5)
  • Phishing (13)
  • Privacy (41)
  • Ransomware (5)
  • Sovereignty (1)
  • Uncategorized (9)
  • Vulnerabilities (5)
Dataleaks
Copyright DataLeaks © 2025