Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
    • Sovereignty
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
Google warns of imminent security risks with quantum wake-up call
  • Information Security
March 29, 2026
1 minute read
Why AI Agents are easier to hack than you think
  • EU AI Act
  • Hacks
March 23, 2026
1 minute read
How are AI and robots reshaping jobs?
  • Cybersecurity
  • EU AI Act
March 15, 2026
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • weakness
  • wallet
  • vulnerablity
  • Cybersecurity
  • Dataleaks
  • Phishing

Microsoft 365 exploited in wild through CVSS 9.8 pre-auth RCE bug

A critical vulnerability in the ubiquitous Microsoft Outlook/365 applications suite is being actively abused in the wild and…
March 18, 2023
Lees meer
  • Compliance and Legislation
  • Uncategorized
  • Privacy

The privacy loophole in your doorbell

Did you know that your Ring doorbell video footage could be part of police surveillance? Ring saw search…
March 17, 2023
Lees meer
  • Cybersecurity
  • Information Security
  • Privacy

Cybersecurity of AI and standardization

The European Union Agency for Cybersecurity (ENISA) believed that commonly used standards (such as ISO 27001/27002 and ISO…
March 16, 2023
Lees meer
  • Phishing
  • Privacy

Already thousands of AI impersonation scams

In 2022 so-called impostor scams were the most frequent type of fraud reported in the United States and…
March 9, 2023
Lees meer
  • Phishing
  • Privacy

FTC: 75% increase in job-related and business scams in 2022

Language programs such as OpenAI’s ChatGPT are another potential tool for scammers to to create profile photos that…
March 8, 2023
Lees meer
  • Cybersecurity
  • Dataleaks
  • Information Security

Nearly half of websites vulnerable to cyber attack

Cyber security given low priority by businesses Almost half of websites are vulnerable to attacks, yet this is…
March 7, 2023
Lees meer
  • Information Security
  • Password Management

LastPass: Keylogger on home PC led to cracked corporate password vault

How did the crooks get in given that the needed access credentials of 4 developers at LastPass were…
March 2, 2023
Lees meer
  • Cybersecurity
  • Dataleaks
  • Privacy

LastPass: Keylogger on home PC led to cracked corporate password vault

How did the crooks get in given that the needed access credentials of 4 developers at LastPass were…
February 28, 2023
Lees meer
  • Cybersecurity
  • Information Security
  • Uncategorized

German government: many webshops unsafe

The Bundesamt für Sicherheit in der Informationstechnik (BSI), part of the German Ministry of Internal Affairs, has investigated…
February 27, 2023
Lees meer
  • Cloud
  • Uncategorized

Why you should not trust an AI Search Engine?

AI language models are notorious bullshitters, often presenting falsehoods as facts. They are excellent at predicting the next word…
February 20, 2023
Lees meer
Featured Posts
  • Google warns of imminent security risks with quantum wake-up call

    March 29, 2026
  • Why AI Agents are easier to hack than you think

    March 23, 2026
  • How are AI and robots reshaping jobs?

    March 15, 2026
  • OpenClaw AI security flaws expose systems to data theft

    March 15, 2026
  • LeakBase cybercrime forum shut down

    March 15, 2026
Categories
  • Awareness (8)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (24)
  • Data Sharing (1)
  • Dataleaks (31)
  • EIDAS (6)
  • EU AI Act (26)
  • Fraud (2)
  • GDPR (17)
  • Hacks (9)
  • Information Security (11)
  • Malware (5)
  • MFA (1)
  • Password Management (2)
  • Personal Data (5)
  • Phishing (13)
  • Privacy (41)
  • Ransomware (5)
  • Sovereignty (1)
  • Uncategorized (9)
  • Vulnerabilities (5)
Dataleaks
Copyright DataLeaks © 2025