Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
    • Sovereignty
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
Google warns of imminent security risks with quantum wake-up call
  • Information Security
March 29, 2026
1 minute read
Why AI Agents are easier to hack than you think
  • EU AI Act
  • Hacks
March 23, 2026
1 minute read
How are AI and robots reshaping jobs?
  • Cybersecurity
  • EU AI Act
March 15, 2026
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • weakness
  • wallet
  • vulnerablity
  • Personal Data
  • Privacy

Russian links in Musk’s Twitter acquisition unveiled

Elon Musk’s $44 billion Twitter acquisition in 2022 not only involved major financial institutions but also had indirect…
September 2, 2024
Lees meer
  • Uncategorized

Snowden: The arrest of Durov is an attack on the fundamental human rights of freedom of expression and association.

The arrest of Telegram founder Pavel Durov by French authorities is an attack on the fundamental human rights…
August 27, 2024
Lees meer
  • EU AI Act

Even the best AI Chatbots often hallucinate

Even the best AI chatbots often hallucinate, demonstrating that their output cannot yet be fully trusted, according to…
August 15, 2024
Lees meer
  • EIDAS

Apple is opening NFC to third-party wallets

Apple’s decision to allow third-party wallets access to its NFC and Secure Element (SE) technology is a game-changer.…
August 15, 2024
Lees meer
  • EU AI Act

Hackers can exploit Microsoft Copilot

Beveiligingsonderzoeker Michael Bargury heeft tijdens Black Hat USA belangrijke kwetsbaarheden in Microsoft Copilot onthuld. Hij liet zien hoe…
August 14, 2024
Lees meer
  • Uncategorized

X’s AI ambitions under fire

Twitter (now “X”) is accused of using personal data from over 60 million EU users to train its…
August 12, 2024
Lees meer
  • Cybersecurity

Draft United Nations Convention Against Cybercrime

This is the definitive text, accompanied by the proposed UNGA resolution and interpretative note, which will be submitted…
August 8, 2024
Lees meer
  • Cybersecurity

FBI urges prioritizing security in software suppliers

The FBI, along with CISA, advises businesses and organizations to choose software suppliers that prioritize security from the…
August 7, 2024
Lees meer
  • Ransomware

UK IT supplier faces £6 Million fine after ransomware attack

The UK IT supplier Advanced may face a £6 million fine from the Information Commissioner’s Office (ICO) for…
August 7, 2024
Lees meer
  • Uncategorized

Stolen GenAI credentials flood Dark Web

Approximately 400 stolen GenAI account credentials are listed daily on dark web platforms, posing a significant threat to…
July 31, 2024
Lees meer
Featured Posts
  • Google warns of imminent security risks with quantum wake-up call

    March 29, 2026
  • Why AI Agents are easier to hack than you think

    March 23, 2026
  • How are AI and robots reshaping jobs?

    March 15, 2026
  • OpenClaw AI security flaws expose systems to data theft

    March 15, 2026
  • LeakBase cybercrime forum shut down

    March 15, 2026
Categories
  • Awareness (8)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (24)
  • Data Sharing (1)
  • Dataleaks (31)
  • EIDAS (6)
  • EU AI Act (26)
  • Fraud (2)
  • GDPR (17)
  • Hacks (9)
  • Information Security (11)
  • Malware (5)
  • MFA (1)
  • Password Management (2)
  • Personal Data (5)
  • Phishing (13)
  • Privacy (41)
  • Ransomware (5)
  • Sovereignty (1)
  • Uncategorized (9)
  • Vulnerabilities (5)
Dataleaks
Copyright DataLeaks © 2025