Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
Starmer bets big on Digital ID revolution
  • EIDAS
September 21, 2025
1 minute read
How Russia shapes minds with the Playbook of Deception
  • Awareness
  • Cybersecurity
  • Hacks
September 21, 2025
1 minute read
How LLMs leak your data while prompting
  • Dataleaks
  • EU AI Act
  • Privacy
September 3, 2025
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • wallet
  • vulnerablity
  • vulnerability
  • Cybersecurity
  • Phishing
  • Ransomware

Small businesses face cybersecurity breaking point

Smaller organizations are nearing collapse under rising cyber threats, tight budgets, and a growing skills gap. WEF reports…
June 13, 2025
Lees meer
  • EU AI Act

AI in focus with a global pulse on trust, use and impact

Trust Gap: 54% of people remain skeptical of AI, especially in advanced economies, despite recognizing its technical capabilities.…
April 29, 2025
Lees meer
  • Malware
  • Phishing

SMS scams cost Americans $470M

SMS scams robbed Americans of $470 million in 2024, up from $373 million the year before. According to…
April 21, 2025
Lees meer
  • EIDAS

Digital ID drama between government and businesses

The UK’s digital ID debate has shifted from public distrust to a rift between government and businesses. Private…
April 21, 2025
Lees meer
  • EIDAS

The eIDAS2 Digital ID race with winners and stragglers

Germany, Italy, Estonia, and Poland are leading the charge in implementing digital IDs under eIDAS2, with well-developed pilot…
March 21, 2025
Lees meer
  • Phishing
  • Vulnerabilities

Phishing and data leaks are the top digital threats for consumers

Phishing and data leaks were last year’s biggest digital threats, according to Germany’s BSI. Cybercriminals now impersonate brands…
March 18, 2025
Lees meer
  • Privacy

FTC notifies 3.7 million Avast customers about compensation

The U.S. Federal Trade Commission (FTC) is emailing 3.7 million Avast customers, informing them they may be eligible…
February 25, 2025
Lees meer
  • Cloud
  • Personal Data
  • Privacy

Apple halts encrypted iCloud backups in the UK

Apple has stopped offering end-to-end encrypted iCloud backups in the UK due to government demands. UK authorities issued…
February 23, 2025
Lees meer
  • Uncategorized

DeepSeek database leak exposes AI security risks

Wiz Research uncovered a publicly accessible ClickHouse database belonging to DeepSeek, a Chinese AI startup. The database exposed…
January 30, 2025
Lees meer
  • EU AI Act
  • Privacy
  • Privacy

Italy probes DeepSeek data risks

Italy’s Privacy Guarantor has requested information from DeepSeek AI providers in China about their data collection practices. Authorities…
January 29, 2025
Lees meer
Featured Posts
  • Starmer bets big on Digital ID revolution

    September 21, 2025
  • How Russia shapes minds with the Playbook of Deception

    September 21, 2025
  • How LLMs leak your data while prompting

    September 3, 2025
  • Austria deals blow to “Pay or Okay” consent model

    August 20, 2025
  • When privacy becomes training data

    August 17, 2025
Categories
  • Awareness (7)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (23)
  • Data Sharing (1)
  • Dataleaks (30)
  • EIDAS (4)
  • EU AI Act (19)
  • Fraud (2)
  • GDPR (17)
  • Hacks (6)
  • Information Security (10)
  • Malware (4)
  • MFA (1)
  • Password Management (2)
  • Personal Data (4)
  • Phishing (13)
  • Privacy (40)
  • Ransomware (4)
  • Uncategorized (9)
  • Vulnerabilities (4)
Dataleaks
Copyright DataLeaks © 2025