Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
When privacy becomes training data
  • EU AI Act
  • Privacy
August 17, 2025
1 minute read
Clorox blames IT Firm for $380M hack after “Password Over the Phone” slip
  • Dataleaks
  • Hacks
July 24, 2025
1 minute read
Is the CISO role the job nobody wants?
  • Information Security
July 11, 2025
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • WeTransfer
  • webshop
  • wallet
  • vulnerablity
  • vulnerability
  • vs
  • MFA

FBI warns critical Infrastructure of ‘push bombing’ and password attacks

The FBI, NSA, and other global authorities are warning vital infrastructure organizations about the rise of password spraying…
October 17, 2024
Lees meer
  • Privacy

FTC sounds alarm on social media’s massive user surveillance

The FTC revealed that major social media and streaming platforms, like Facebook, YouTube, and TikTok, engage in large-scale…
September 22, 2024
Lees meer
  • Dataleaks
  • GDPR
  • Hacks

Psychotherapy data breach victims demand higher compensation

Victims of Finland’s largest psychotherapy data breach are seeking higher compensation. In 2020, a hacker stole sensitive information…
September 16, 2024
Lees meer
  • EU AI Act
  • Privacy

Clearview AI fined €30 million for illegal facial scraping

The Dutch Data Protection Authority (AP) has fined Clearview AI over €30 million for illegally scraping facial images…
September 3, 2024
Lees meer
  • Personal Data
  • Privacy

Russian links in Musk’s Twitter acquisition unveiled

Elon Musk’s $44 billion Twitter acquisition in 2022 not only involved major financial institutions but also had indirect…
September 2, 2024
Lees meer
  • Uncategorized

Snowden: The arrest of Durov is an attack on the fundamental human rights of freedom of expression and association.

The arrest of Telegram founder Pavel Durov by French authorities is an attack on the fundamental human rights…
August 27, 2024
Lees meer
  • EU AI Act

Even the best AI Chatbots often hallucinate

Even the best AI chatbots often hallucinate, demonstrating that their output cannot yet be fully trusted, according to…
August 15, 2024
Lees meer
  • EIDAS

Apple is opening NFC to third-party wallets

Apple’s decision to allow third-party wallets access to its NFC and Secure Element (SE) technology is a game-changer.…
August 15, 2024
Lees meer
  • EU AI Act

Hackers can exploit Microsoft Copilot

Beveiligingsonderzoeker Michael Bargury heeft tijdens Black Hat USA belangrijke kwetsbaarheden in Microsoft Copilot onthuld. Hij liet zien hoe…
August 14, 2024
Lees meer
  • Uncategorized

X’s AI ambitions under fire

Twitter (now “X”) is accused of using personal data from over 60 million EU users to train its…
August 12, 2024
Lees meer
Featured Posts
  • When privacy becomes training data

    August 17, 2025
  • Clorox blames IT Firm for $380M hack after “Password Over the Phone” slip

    July 24, 2025
  • Is the CISO role the job nobody wants?

    July 11, 2025
  • 40% of agentic AI projects will fail

    July 2, 2025
  • Account security with new plain English guide

    June 18, 2025
Categories
  • Awareness (6)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (22)
  • Data Sharing (1)
  • Dataleaks (29)
  • EIDAS (3)
  • EU AI Act (17)
  • Fraud (2)
  • GDPR (16)
  • Hacks (5)
  • Information Security (10)
  • Malware (4)
  • MFA (1)
  • Password Management (2)
  • Personal Data (4)
  • Phishing (13)
  • Privacy (38)
  • Ransomware (4)
  • Uncategorized (9)
  • Vulnerabilities (4)
Dataleaks
Copyright DataLeaks © 2025