Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
    • Sovereignty
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
Global privacy alarm raised for AI without consent
  • EU AI Act
  • Privacy
February 23, 2026
1 minute read
The future of legally binding digital signing in Europe
  • EIDAS
February 18, 2026
1 minute read
When Palantir-AI becomes a sovereignty risk
  • EU AI Act
  • Sovereignty
December 14, 2025
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • wallet
  • vulnerablity
  • vulnerability
  • EU AI Act
  • Privacy

When privacy becomes training data

Researchers found millions of passports, credit cards, résumés, and faces in DataComp CommonPool, a massive AI training dataset…
August 17, 2025
Lees meer
  • Dataleaks
  • Hacks

Clorox blames IT Firm for $380M hack after “Password Over the Phone” slip

Clorox is suing IT provider Cognizant after a 2023 ransomware attack cost the company $380 million. The lawsuit…
July 24, 2025
Lees meer
  • Information Security

Is the CISO role the job nobody wants?

Once seen as a prestigious tech leadership role, the CISO position is now plagued by burnout, overwhelming stress,…
July 11, 2025
Lees meer
  • EU AI Act

40% of agentic AI projects will fail

Gartner predicts over 40% of agentic AI projects will be canceled by 2027 due to cost, unclear ROI,…
July 2, 2025
Lees meer
  • Cybersecurity

Account security with new plain English guide

The National Cyber Security Centre (NCSC-IE) and the National Adult Literacy Agency (NALA) have launched a user-friendly, plain…
June 18, 2025
Lees meer
  • Ransomware

Anubis ransomware doubles down with encryption and total data wipe

The new Anubis ransomware not only encrypts files but can also permanently erase them, making recovery impossible—even if…
June 17, 2025
Lees meer
  • Cybersecurity
  • Phishing
  • Ransomware

Small businesses face cybersecurity breaking point

Smaller organizations are nearing collapse under rising cyber threats, tight budgets, and a growing skills gap. WEF reports…
June 13, 2025
Lees meer
  • EU AI Act

AI in focus with a global pulse on trust, use and impact

Trust Gap: 54% of people remain skeptical of AI, especially in advanced economies, despite recognizing its technical capabilities.…
April 29, 2025
Lees meer
  • Malware
  • Phishing

SMS scams cost Americans $470M

SMS scams robbed Americans of $470 million in 2024, up from $373 million the year before. According to…
April 21, 2025
Lees meer
  • EIDAS

Digital ID drama between government and businesses

The UK’s digital ID debate has shifted from public distrust to a rift between government and businesses. Private…
April 21, 2025
Lees meer
Featured Posts
  • Global privacy alarm raised for AI without consent

    February 23, 2026
  • The future of legally binding digital signing in Europe

    February 18, 2026
  • When Palantir-AI becomes a sovereignty risk

    December 14, 2025
  • The Wallet that ends the weakest “password” link

    December 7, 2025
  • Zero-Day breach hits Logitech with data stolen across multiple groups

    November 16, 2025
Categories
  • Awareness (8)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (23)
  • Data Sharing (1)
  • Dataleaks (30)
  • EIDAS (6)
  • EU AI Act (23)
  • Fraud (2)
  • GDPR (17)
  • Hacks (7)
  • Information Security (10)
  • Malware (4)
  • MFA (1)
  • Password Management (2)
  • Personal Data (5)
  • Phishing (13)
  • Privacy (41)
  • Ransomware (5)
  • Sovereignty (1)
  • Uncategorized (9)
  • Vulnerabilities (4)
Dataleaks
Copyright DataLeaks © 2025