Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
When privacy becomes training data
  • EU AI Act
  • Privacy
August 17, 2025
1 minute read
Clorox blames IT Firm for $380M hack after “Password Over the Phone” slip
  • Dataleaks
  • Hacks
July 24, 2025
1 minute read
Is the CISO role the job nobody wants?
  • Information Security
July 11, 2025
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • WeTransfer
  • webshop
  • wallet
  • vulnerablity
  • vulnerability
  • vs
  • EIDAS

The eIDAS2 Digital ID race with winners and stragglers

Germany, Italy, Estonia, and Poland are leading the charge in implementing digital IDs under eIDAS2, with well-developed pilot…
March 21, 2025
Lees meer
  • Phishing
  • Vulnerabilities

Phishing and data leaks are the top digital threats for consumers

Phishing and data leaks were last year’s biggest digital threats, according to Germany’s BSI. Cybercriminals now impersonate brands…
March 18, 2025
Lees meer
  • Privacy

FTC notifies 3.7 million Avast customers about compensation

The U.S. Federal Trade Commission (FTC) is emailing 3.7 million Avast customers, informing them they may be eligible…
February 25, 2025
Lees meer
  • Cloud
  • Personal Data
  • Privacy

Apple halts encrypted iCloud backups in the UK

Apple has stopped offering end-to-end encrypted iCloud backups in the UK due to government demands. UK authorities issued…
February 23, 2025
Lees meer
  • Uncategorized

DeepSeek database leak exposes AI security risks

Wiz Research uncovered a publicly accessible ClickHouse database belonging to DeepSeek, a Chinese AI startup. The database exposed…
January 30, 2025
Lees meer
  • EU AI Act
  • Privacy
  • Privacy

Italy probes DeepSeek data risks

Italy’s Privacy Guarantor has requested information from DeepSeek AI providers in China about their data collection practices. Authorities…
January 29, 2025
Lees meer
  • Dataleaks
  • GDPR

Hotel management platform Otelier leaks data of Marriott, Hilton, and Hyatt guests

Otelier, a platform used by hotel chains worldwide for managing reservations, transactions, and billing, has fallen victim to…
January 20, 2025
Lees meer
  • EU AI Act

Generative AI is shaping the future of work

Generative AI (gen AI), like ChatGPT and image-generating tools, is revolutionizing job markets, particularly in writing, coding, and…
November 20, 2024
Lees meer
  • Privacy

Australian Bunnings faces backlash for privacy violations with facial recognition

Bunnings, Australia’s largest hardware chain, has been accused of violating the privacy of hundreds of thousands of customers…
November 19, 2024
Lees meer
  • Vulnerabilities

Okta bug allows logins with any password for long usernames

A vulnerability in Okta’s authentication service recently allowed users with usernames of 52 characters or more to log…
November 3, 2024
Lees meer
Featured Posts
  • When privacy becomes training data

    August 17, 2025
  • Clorox blames IT Firm for $380M hack after “Password Over the Phone” slip

    July 24, 2025
  • Is the CISO role the job nobody wants?

    July 11, 2025
  • 40% of agentic AI projects will fail

    July 2, 2025
  • Account security with new plain English guide

    June 18, 2025
Categories
  • Awareness (6)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (22)
  • Data Sharing (1)
  • Dataleaks (29)
  • EIDAS (3)
  • EU AI Act (17)
  • Fraud (2)
  • GDPR (16)
  • Hacks (5)
  • Information Security (10)
  • Malware (4)
  • MFA (1)
  • Password Management (2)
  • Personal Data (4)
  • Phishing (13)
  • Privacy (38)
  • Ransomware (4)
  • Uncategorized (9)
  • Vulnerabilities (4)
Dataleaks
Copyright DataLeaks © 2025