Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
    • Sovereignty
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
Google warns of imminent security risks with quantum wake-up call
  • Information Security
March 29, 2026
1 minute read
Why AI Agents are easier to hack than you think
  • EU AI Act
  • Hacks
March 23, 2026
1 minute read
How are AI and robots reshaping jobs?
  • Cybersecurity
  • EU AI Act
March 15, 2026
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • weakness
  • wallet
  • vulnerablity
  • Dataleaks

Massive ad fraud scheme impacted roughly 11 million devices

Researchers have shut down an ad fraud scheme that spoofed more than 1,700 applications from 120 publishers and…
January 24, 2023
Lees meer
  • Dataleaks

37 million accounts T-Mobile stolen

T-Mobile said a “bad actor” abused an application programming interface (API) to hoover up data on roughly 37…
January 21, 2023
Lees meer
  • Cloud
  • Cybersecurity

EPDB: How to comply as a public body with a cloud to the GDPR?

Public bodies should take into account the possible sensitive nature and large amounts of data processed by public…
January 21, 2023
Lees meer
  • Dataleaks

NortonLifeLock warns customers about online password manager intrusion

Security company NortonLifeLock has warned an unknown number of customers that criminals have broken into their Norton Password…
January 15, 2023
Lees meer
  • Dataleaks

Zero-day vulnerablity in FortiOS SSL VPN

A zero-day vulnerability in FortiOS SSL VPN that Fortinet addressed last month was exploited by unknown actors in…
January 14, 2023
Lees meer
  • Compliance and Legislation

Data Subject Access Request with identity of recipient

Every person has the right to know to whom his or her personal data have been disclosed. A…
January 14, 2023
Lees meer
  • Privacy

€390M GDPR fine for Meta with data-fueled business model without legal basis

Meta was fined with €390M (210 million and €180 million fines for Facebook and Instagram) and accused the…
January 6, 2023
Lees meer
  • GDPR

US direct access to Europeans’ biometric data for visa-free travel?

The US government demands direct access to databases of European police services containing biometric data of European citizens.…
December 30, 2022
Lees meer
  • Dataleaks

Meta pays $725 million for allowing 3rd parties access to personal data

Meta has agreed to pay $725 million to resolve a class-action lawsuit accusing the social media giant of…
December 23, 2022
Lees meer
  • Dataleaks

LastPass users: time to change passwords, settings and ….

The hacker copied information from backup that contained basic customer account information and related metadata, including company names,…
December 23, 2022
Lees meer
Featured Posts
  • Google warns of imminent security risks with quantum wake-up call

    March 29, 2026
  • Why AI Agents are easier to hack than you think

    March 23, 2026
  • How are AI and robots reshaping jobs?

    March 15, 2026
  • OpenClaw AI security flaws expose systems to data theft

    March 15, 2026
  • LeakBase cybercrime forum shut down

    March 15, 2026
Categories
  • Awareness (8)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (24)
  • Data Sharing (1)
  • Dataleaks (31)
  • EIDAS (6)
  • EU AI Act (26)
  • Fraud (2)
  • GDPR (17)
  • Hacks (9)
  • Information Security (11)
  • Malware (5)
  • MFA (1)
  • Password Management (2)
  • Personal Data (5)
  • Phishing (13)
  • Privacy (41)
  • Ransomware (5)
  • Sovereignty (1)
  • Uncategorized (9)
  • Vulnerabilities (5)
Dataleaks
Copyright DataLeaks © 2025