Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
    • Sovereignty
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
Google warns of imminent security risks with quantum wake-up call
  • Information Security
March 29, 2026
1 minute read
Why AI Agents are easier to hack than you think
  • EU AI Act
  • Hacks
March 23, 2026
1 minute read
How are AI and robots reshaping jobs?
  • Cybersecurity
  • EU AI Act
March 15, 2026
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • weakness
  • wallet
  • vulnerablity
  • Dataleaks

Okta source code stolen

Okta, a leading provider of authentication services and Identity and Access Management (IAM) solutions, says that its private…
December 21, 2022
Lees meer
  • Dataleaks
  • Phishing

Crypto exchange Gemini leaks private data of 5.3 million users

The American crypto exchange Gemini has leaked the private data of 5.3 million users, which has subsequently been…
December 19, 2022
Lees meer
  • Cloud
  • Dataleaks

Citrix warns of actively attacked zero-day leak in ADC and Gateway

Software company Citrix is warning organizations of an actively attacked zero-day vulnerability in Citrix ADC and Citrix Gateway…
December 13, 2022
Lees meer
  • Information Security
  • Privacy

How to protect personal data if anonymization can no longer be guaranteed?

What today is a dataset without personal data or with anonymised data, no longer has to be that…
December 13, 2022
Lees meer
  • Dataleaks

500 millon phone numbers leaked of WhatsApp

Someone is allegedly selling up-to-date mobile phone numbers of nearly 500 million WhatsApp users. A data sample investigated…
November 26, 2022
Lees meer
  • Dataleaks

Gambling platform DraftKings theft of $300,000 via credential stuffing

Online gambling platform DraftKings has been hit by a credential stuffing attack in which attackers managed to break…
November 24, 2022
Lees meer
  • Dataleaks

>50 million passwords and data for 4,500 crypto wallets stolen by malware

Worldwide, a total of 890,000 computers were infected and more than fifty million passwords were stolen. This is…
November 24, 2022
Lees meer
  • Cybersecurity

Pro-Russian Groups perform DDos cyberattack on website EU parliament

Pro-Russian group perform large DDoS cyberattack on European Parliament website. It is reportedly unreachable in several countries in…
November 24, 2022
Lees meer
  • Cybersecurity

Microsoft: Bypassing MFA on the rise

Analysts see an uptick in token theft from authenticated users, allowing threat actors to bypass MFA protections. Stealing…
November 23, 2022
Lees meer
  • GDPR

France says no to “Free” Office365 and Google Workspace in schools

Free service offers such as Office365 and Google Workspace are excluded from public procurement according to the French…
November 23, 2022
Lees meer
Featured Posts
  • Google warns of imminent security risks with quantum wake-up call

    March 29, 2026
  • Why AI Agents are easier to hack than you think

    March 23, 2026
  • How are AI and robots reshaping jobs?

    March 15, 2026
  • OpenClaw AI security flaws expose systems to data theft

    March 15, 2026
  • LeakBase cybercrime forum shut down

    March 15, 2026
Categories
  • Awareness (8)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (24)
  • Data Sharing (1)
  • Dataleaks (31)
  • EIDAS (6)
  • EU AI Act (26)
  • Fraud (2)
  • GDPR (17)
  • Hacks (9)
  • Information Security (11)
  • Malware (5)
  • MFA (1)
  • Password Management (2)
  • Personal Data (5)
  • Phishing (13)
  • Privacy (41)
  • Ransomware (5)
  • Sovereignty (1)
  • Uncategorized (9)
  • Vulnerabilities (5)
Dataleaks
Copyright DataLeaks © 2025