Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
    • Sovereignty
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
Google warns of imminent security risks with quantum wake-up call
  • Information Security
March 29, 2026
1 minute read
Why AI Agents are easier to hack than you think
  • EU AI Act
  • Hacks
March 23, 2026
1 minute read
How are AI and robots reshaping jobs?
  • Cybersecurity
  • EU AI Act
March 15, 2026
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • weakness
  • wallet
  • vulnerablity
  • Dataleaks
  • Hacks

British voter data breach exposes 40 million

The UK’s Electoral Commission leaked personal details of 40 million voters due to unpatched vulnerabilities in their Microsoft…
July 30, 2024
Lees meer
  • EU AI Act

Europe’s AI Act: Bridging Innovation and Regulation

Andreas Cleve, CEO of Corti, expresses concerns that the EU’s new AI Act could impose hefty compliance costs,…
July 29, 2024
Lees meer
  • Cloud

Targeted credential theft hits cloud Snowflake customers

Snowflake revealed a “limited number” of its customers are being targeted in a credential theft campaign. The company…
June 5, 2024
Lees meer
  • Privacy

Google leak reveals thousands of privacy Incidents

Google has accidentally collected children’s voice data, leaked the trips and home addresses of carpool users, and made…
June 4, 2024
Lees meer
  • EU AI Act

Google unveils new image and video crawlers

Google has launched two new web crawlers, GoogleOther-Image and GoogleOther-Video, designed specifically for scraping image and video content…
May 21, 2024
Lees meer
  • Fraud

Arup falls prey to £20m deepfake scam

British engineering firm Arup fell victim to a deepfake scam, resulting in a £20m loss after an employee…
May 20, 2024
Lees meer
  • Dataleaks

Helsinki’s data breach crisis caused by unpatched remote access server

Helsinki’s education division uncovered a significant data breach in late April 2024, affecting tens of thousands of students,…
May 15, 2024
Lees meer
  • Business Continuity

Google Cloud provisioning misconfiguration leads to UniSuper’s business disruption for a week

Google Cloud mistakenly deletes UniSuper’s private cloud account, causing a week-long outage for over half a million members.…
May 11, 2024
Lees meer
  • Dataleaks

Dell databreach with 49 million customer and employee data records?

Dell Technologies experienced a breach involving a portal containing customer information, including names, addresses, and order details, but…
May 10, 2024
Lees meer
  • EU AI Act

The Augmented Reality revolution will initiate farewell to smartphones

Chief AI Scientist Yann LeCun of Meta predicts that smartphones will become obsolete within 10-15 years, replaced by…
May 2, 2024
Lees meer
Featured Posts
  • Google warns of imminent security risks with quantum wake-up call

    March 29, 2026
  • Why AI Agents are easier to hack than you think

    March 23, 2026
  • How are AI and robots reshaping jobs?

    March 15, 2026
  • OpenClaw AI security flaws expose systems to data theft

    March 15, 2026
  • LeakBase cybercrime forum shut down

    March 15, 2026
Categories
  • Awareness (8)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (24)
  • Data Sharing (1)
  • Dataleaks (31)
  • EIDAS (6)
  • EU AI Act (26)
  • Fraud (2)
  • GDPR (17)
  • Hacks (9)
  • Information Security (11)
  • Malware (5)
  • MFA (1)
  • Password Management (2)
  • Personal Data (5)
  • Phishing (13)
  • Privacy (41)
  • Ransomware (5)
  • Sovereignty (1)
  • Uncategorized (9)
  • Vulnerabilities (5)
Dataleaks
Copyright DataLeaks © 2025