Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
    • Sovereignty
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
Google warns of imminent security risks with quantum wake-up call
  • Information Security
March 29, 2026
1 minute read
Why AI Agents are easier to hack than you think
  • EU AI Act
  • Hacks
March 23, 2026
1 minute read
How are AI and robots reshaping jobs?
  • Cybersecurity
  • EU AI Act
March 15, 2026
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • weakness
  • wallet
  • vulnerablity
  • Uncategorized

DeepSeek database leak exposes AI security risks

Wiz Research uncovered a publicly accessible ClickHouse database belonging to DeepSeek, a Chinese AI startup. The database exposed…
January 30, 2025
Lees meer
  • EU AI Act
  • Privacy
  • Privacy

Italy probes DeepSeek data risks

Italy’s Privacy Guarantor has requested information from DeepSeek AI providers in China about their data collection practices. Authorities…
January 29, 2025
Lees meer
  • Dataleaks
  • GDPR

Hotel management platform Otelier leaks data of Marriott, Hilton, and Hyatt guests

Otelier, a platform used by hotel chains worldwide for managing reservations, transactions, and billing, has fallen victim to…
January 20, 2025
Lees meer
  • EU AI Act

Generative AI is shaping the future of work

Generative AI (gen AI), like ChatGPT and image-generating tools, is revolutionizing job markets, particularly in writing, coding, and…
November 20, 2024
Lees meer
  • Privacy

Australian Bunnings faces backlash for privacy violations with facial recognition

Bunnings, Australia’s largest hardware chain, has been accused of violating the privacy of hundreds of thousands of customers…
November 19, 2024
Lees meer
  • Vulnerabilities

Okta bug allows logins with any password for long usernames

A vulnerability in Okta’s authentication service recently allowed users with usernames of 52 characters or more to log…
November 3, 2024
Lees meer
  • MFA

FBI warns critical Infrastructure of ‘push bombing’ and password attacks

The FBI, NSA, and other global authorities are warning vital infrastructure organizations about the rise of password spraying…
October 17, 2024
Lees meer
  • Privacy

FTC sounds alarm on social media’s massive user surveillance

The FTC revealed that major social media and streaming platforms, like Facebook, YouTube, and TikTok, engage in large-scale…
September 22, 2024
Lees meer
  • Dataleaks
  • GDPR
  • Hacks

Psychotherapy data breach victims demand higher compensation

Victims of Finland’s largest psychotherapy data breach are seeking higher compensation. In 2020, a hacker stole sensitive information…
September 16, 2024
Lees meer
  • EU AI Act
  • Privacy

Clearview AI fined €30 million for illegal facial scraping

The Dutch Data Protection Authority (AP) has fined Clearview AI over €30 million for illegally scraping facial images…
September 3, 2024
Lees meer
Featured Posts
  • Google warns of imminent security risks with quantum wake-up call

    March 29, 2026
  • Why AI Agents are easier to hack than you think

    March 23, 2026
  • How are AI and robots reshaping jobs?

    March 15, 2026
  • OpenClaw AI security flaws expose systems to data theft

    March 15, 2026
  • LeakBase cybercrime forum shut down

    March 15, 2026
Categories
  • Awareness (8)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (24)
  • Data Sharing (1)
  • Dataleaks (31)
  • EIDAS (6)
  • EU AI Act (26)
  • Fraud (2)
  • GDPR (17)
  • Hacks (9)
  • Information Security (11)
  • Malware (5)
  • MFA (1)
  • Password Management (2)
  • Personal Data (5)
  • Phishing (13)
  • Privacy (41)
  • Ransomware (5)
  • Sovereignty (1)
  • Uncategorized (9)
  • Vulnerabilities (5)
Dataleaks
Copyright DataLeaks © 2025