Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
Zero-Day breach hits Logitech with data stolen across multiple groups
  • Hacks
  • Personal Data
  • Ransomware
November 16, 2025
1 minute read
Trust is on the line in America through disinformation
  • Awareness
  • EU AI Act
October 19, 2025
1 minute read
Starmer bets big on Digital ID revolution
  • EIDAS
September 21, 2025
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • wallet
  • vulnerablity
  • vulnerability
  • Dataleaks
  • Hacks

British voter data breach exposes 40 million

The UK’s Electoral Commission leaked personal details of 40 million voters due to unpatched vulnerabilities in their Microsoft…
July 30, 2024
Lees meer
  • EU AI Act

Europe’s AI Act: Bridging Innovation and Regulation

Andreas Cleve, CEO of Corti, expresses concerns that the EU’s new AI Act could impose hefty compliance costs,…
July 29, 2024
Lees meer
  • Cloud

Targeted credential theft hits cloud Snowflake customers

Snowflake revealed a “limited number” of its customers are being targeted in a credential theft campaign. The company…
June 5, 2024
Lees meer
  • Privacy

Google leak reveals thousands of privacy Incidents

Google has accidentally collected children’s voice data, leaked the trips and home addresses of carpool users, and made…
June 4, 2024
Lees meer
  • EU AI Act

Google unveils new image and video crawlers

Google has launched two new web crawlers, GoogleOther-Image and GoogleOther-Video, designed specifically for scraping image and video content…
May 21, 2024
Lees meer
  • Fraud

Arup falls prey to £20m deepfake scam

British engineering firm Arup fell victim to a deepfake scam, resulting in a £20m loss after an employee…
May 20, 2024
Lees meer
  • Dataleaks

Helsinki’s data breach crisis caused by unpatched remote access server

Helsinki’s education division uncovered a significant data breach in late April 2024, affecting tens of thousands of students,…
May 15, 2024
Lees meer
  • Business Continuity

Google Cloud provisioning misconfiguration leads to UniSuper’s business disruption for a week

Google Cloud mistakenly deletes UniSuper’s private cloud account, causing a week-long outage for over half a million members.…
May 11, 2024
Lees meer
  • Dataleaks

Dell databreach with 49 million customer and employee data records?

Dell Technologies experienced a breach involving a portal containing customer information, including names, addresses, and order details, but…
May 10, 2024
Lees meer
  • EU AI Act

The Augmented Reality revolution will initiate farewell to smartphones

Chief AI Scientist Yann LeCun of Meta predicts that smartphones will become obsolete within 10-15 years, replaced by…
May 2, 2024
Lees meer
Featured Posts
  • Zero-Day breach hits Logitech with data stolen across multiple groups

    November 16, 2025
  • Trust is on the line in America through disinformation

    October 19, 2025
  • Starmer bets big on Digital ID revolution

    September 21, 2025
  • How Russia shapes minds with the Playbook of Deception

    September 21, 2025
  • How LLMs leak your data while prompting

    September 3, 2025
Categories
  • Awareness (8)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (23)
  • Data Sharing (1)
  • Dataleaks (30)
  • EIDAS (4)
  • EU AI Act (20)
  • Fraud (2)
  • GDPR (17)
  • Hacks (7)
  • Information Security (10)
  • Malware (4)
  • MFA (1)
  • Password Management (2)
  • Personal Data (5)
  • Phishing (13)
  • Privacy (40)
  • Ransomware (5)
  • Uncategorized (9)
  • Vulnerabilities (4)
Dataleaks
Copyright DataLeaks © 2025