Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
Zero-Day breach hits Logitech with data stolen across multiple groups
  • Hacks
  • Personal Data
  • Ransomware
November 16, 2025
1 minute read
Trust is on the line in America through disinformation
  • Awareness
  • EU AI Act
October 19, 2025
1 minute read
Starmer bets big on Digital ID revolution
  • EIDAS
September 21, 2025
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • wallet
  • vulnerablity
  • vulnerability
  • Personal Data
  • Privacy

Russian links in Musk’s Twitter acquisition unveiled

Elon Musk’s $44 billion Twitter acquisition in 2022 not only involved major financial institutions but also had indirect…
September 2, 2024
Lees meer
  • Uncategorized

Snowden: The arrest of Durov is an attack on the fundamental human rights of freedom of expression and association.

The arrest of Telegram founder Pavel Durov by French authorities is an attack on the fundamental human rights…
August 27, 2024
Lees meer
  • EU AI Act

Even the best AI Chatbots often hallucinate

Even the best AI chatbots often hallucinate, demonstrating that their output cannot yet be fully trusted, according to…
August 15, 2024
Lees meer
  • EIDAS

Apple is opening NFC to third-party wallets

Apple’s decision to allow third-party wallets access to its NFC and Secure Element (SE) technology is a game-changer.…
August 15, 2024
Lees meer
  • EU AI Act

Hackers can exploit Microsoft Copilot

Beveiligingsonderzoeker Michael Bargury heeft tijdens Black Hat USA belangrijke kwetsbaarheden in Microsoft Copilot onthuld. Hij liet zien hoe…
August 14, 2024
Lees meer
  • Uncategorized

X’s AI ambitions under fire

Twitter (now “X”) is accused of using personal data from over 60 million EU users to train its…
August 12, 2024
Lees meer
  • Cybersecurity

Draft United Nations Convention Against Cybercrime

This is the definitive text, accompanied by the proposed UNGA resolution and interpretative note, which will be submitted…
August 8, 2024
Lees meer
  • Cybersecurity

FBI urges prioritizing security in software suppliers

The FBI, along with CISA, advises businesses and organizations to choose software suppliers that prioritize security from the…
August 7, 2024
Lees meer
  • Ransomware

UK IT supplier faces £6 Million fine after ransomware attack

The UK IT supplier Advanced may face a £6 million fine from the Information Commissioner’s Office (ICO) for…
August 7, 2024
Lees meer
  • Uncategorized

Stolen GenAI credentials flood Dark Web

Approximately 400 stolen GenAI account credentials are listed daily on dark web platforms, posing a significant threat to…
July 31, 2024
Lees meer
Featured Posts
  • Zero-Day breach hits Logitech with data stolen across multiple groups

    November 16, 2025
  • Trust is on the line in America through disinformation

    October 19, 2025
  • Starmer bets big on Digital ID revolution

    September 21, 2025
  • How Russia shapes minds with the Playbook of Deception

    September 21, 2025
  • How LLMs leak your data while prompting

    September 3, 2025
Categories
  • Awareness (8)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (23)
  • Data Sharing (1)
  • Dataleaks (30)
  • EIDAS (4)
  • EU AI Act (20)
  • Fraud (2)
  • GDPR (17)
  • Hacks (7)
  • Information Security (10)
  • Malware (4)
  • MFA (1)
  • Password Management (2)
  • Personal Data (5)
  • Phishing (13)
  • Privacy (40)
  • Ransomware (5)
  • Uncategorized (9)
  • Vulnerabilities (4)
Dataleaks
Copyright DataLeaks © 2025