Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
    • Sovereignty
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
When Palantir-AI becomes a sovereignty risk
  • EU AI Act
  • Sovereignty
December 14, 2025
1 minute read
The Wallet that ends the weakest “password” link
  • EIDAS
  • EU AI Act
December 7, 2025
1 minute read
Zero-Day breach hits Logitech with data stolen across multiple groups
  • Hacks
  • Personal Data
  • Ransomware
November 16, 2025
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • wallet
  • vulnerablity
  • vulnerability
  • Information Security

Is the CISO role the job nobody wants?

Once seen as a prestigious tech leadership role, the CISO position is now plagued by burnout, overwhelming stress,…
July 11, 2025
Lees meer
  • EU AI Act

40% of agentic AI projects will fail

Gartner predicts over 40% of agentic AI projects will be canceled by 2027 due to cost, unclear ROI,…
July 2, 2025
Lees meer
  • Cybersecurity

Account security with new plain English guide

The National Cyber Security Centre (NCSC-IE) and the National Adult Literacy Agency (NALA) have launched a user-friendly, plain…
June 18, 2025
Lees meer
  • Ransomware

Anubis ransomware doubles down with encryption and total data wipe

The new Anubis ransomware not only encrypts files but can also permanently erase them, making recovery impossible—even if…
June 17, 2025
Lees meer
  • Cybersecurity
  • Phishing
  • Ransomware

Small businesses face cybersecurity breaking point

Smaller organizations are nearing collapse under rising cyber threats, tight budgets, and a growing skills gap. WEF reports…
June 13, 2025
Lees meer
  • EU AI Act

AI in focus with a global pulse on trust, use and impact

Trust Gap: 54% of people remain skeptical of AI, especially in advanced economies, despite recognizing its technical capabilities.…
April 29, 2025
Lees meer
  • Malware
  • Phishing

SMS scams cost Americans $470M

SMS scams robbed Americans of $470 million in 2024, up from $373 million the year before. According to…
April 21, 2025
Lees meer
  • EIDAS

Digital ID drama between government and businesses

The UK’s digital ID debate has shifted from public distrust to a rift between government and businesses. Private…
April 21, 2025
Lees meer
  • EIDAS

The eIDAS2 Digital ID race with winners and stragglers

Germany, Italy, Estonia, and Poland are leading the charge in implementing digital IDs under eIDAS2, with well-developed pilot…
March 21, 2025
Lees meer
  • Phishing
  • Vulnerabilities

Phishing and data leaks are the top digital threats for consumers

Phishing and data leaks were last year’s biggest digital threats, according to Germany’s BSI. Cybercriminals now impersonate brands…
March 18, 2025
Lees meer
Featured Posts
  • When Palantir-AI becomes a sovereignty risk

    December 14, 2025
  • The Wallet that ends the weakest “password” link

    December 7, 2025
  • Zero-Day breach hits Logitech with data stolen across multiple groups

    November 16, 2025
  • Trust is on the line in America through disinformation

    October 19, 2025
  • Starmer bets big on Digital ID revolution

    September 21, 2025
Categories
  • Awareness (8)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (23)
  • Data Sharing (1)
  • Dataleaks (30)
  • EIDAS (5)
  • EU AI Act (22)
  • Fraud (2)
  • GDPR (17)
  • Hacks (7)
  • Information Security (10)
  • Malware (4)
  • MFA (1)
  • Password Management (2)
  • Personal Data (5)
  • Phishing (13)
  • Privacy (40)
  • Ransomware (5)
  • Sovereignty (1)
  • Uncategorized (9)
  • Vulnerabilities (4)
Dataleaks
Copyright DataLeaks © 2025