Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
    • Sovereignty
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
Google warns of imminent security risks with quantum wake-up call
  • Information Security
March 29, 2026
1 minute read
Why AI Agents are easier to hack than you think
  • EU AI Act
  • Hacks
March 23, 2026
1 minute read
How are AI and robots reshaping jobs?
  • Cybersecurity
  • EU AI Act
March 15, 2026
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • weakness
  • wallet
  • vulnerablity
  • Compliance and Legislation
  • Cybersecurity
  • Information Security
  • Privacy

Proposed EU-US Data privacy framework is too vague…

The European Parliament’s Committee on Civil Liberties, Justice and Home Affairs has recommended states that the executive order…
February 20, 2023
Lees meer
  • Cybersecurity
  • Information Security
  • Privacy

What you put in ChatGPT stays in ChatGPT!

The ChatGPT tool is based on a web crawler which collects every bit of connected data, by which…
February 18, 2023
Lees meer
  • Awareness
  • Phishing

Phishing: what does it imply to your organisation?

This Dataleaks video is meant to briefly highlight the state of affairs regarding phishing and to spread awareness.…
February 16, 2023
Lees meer
  • Cybersecurity
  • Dataleaks

1900 exposures and vulnerabilities per month?

A cybersecurity insurer predicts that a 13% growth to 1,900 CVEs monthly would include 270 high-severity and 155…
February 13, 2023
Lees meer
  • Compliance and Legislation
  • Cybersecurity
  • GDPR

Controller based on the choice of purpose and “essential” means

The EDPS – European Data Protection Supervisor states in an opinion that in order to act as a…
February 13, 2023
Lees meer
  • Uncategorized

Bard AI answers wrong and value of shares drop with $100bn

Google AI was promoted in an advert designed to show off its new AI bot (Bard). Unfortunately Bard…
February 10, 2023
Lees meer
  • Cybersecurity
  • Dataleaks
  • Information Security

Irish university closed for two days due to hacking into IT systems

Irish university MTU Cork has decided to close all four campuses for two days and cancel all classes…
February 10, 2023
Lees meer
  • Compliance and Legislation
  • GDPR
  • Privacy

Italian DPA halts AI Chatbot due to privacy concerns

The Italian privacy regulator has ordered a popular AI chatbot to cease processing data on domestic citizens after…
February 9, 2023
Lees meer
  • Uncategorized

Outlook outage, and then?

Microsoft is investigating and working on addressing an ongoing outage affecting the company’s Outlook webmail service. Users report…
February 7, 2023
Lees meer
  • Privacy

CNIL: digital euro should be as privacy-friendly as cash

The digital euro must be as privacy-friendly as cash, according to the French privacy regulator CNIL. He argues…
February 3, 2023
Lees meer
Featured Posts
  • Google warns of imminent security risks with quantum wake-up call

    March 29, 2026
  • Why AI Agents are easier to hack than you think

    March 23, 2026
  • How are AI and robots reshaping jobs?

    March 15, 2026
  • OpenClaw AI security flaws expose systems to data theft

    March 15, 2026
  • LeakBase cybercrime forum shut down

    March 15, 2026
Categories
  • Awareness (8)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (24)
  • Data Sharing (1)
  • Dataleaks (31)
  • EIDAS (6)
  • EU AI Act (26)
  • Fraud (2)
  • GDPR (17)
  • Hacks (9)
  • Information Security (11)
  • Malware (5)
  • MFA (1)
  • Password Management (2)
  • Personal Data (5)
  • Phishing (13)
  • Privacy (41)
  • Ransomware (5)
  • Sovereignty (1)
  • Uncategorized (9)
  • Vulnerabilities (5)
Dataleaks
Copyright DataLeaks © 2025