Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
Starmer bets big on Digital ID revolution
  • EIDAS
September 21, 2025
1 minute read
How Russia shapes minds with the Playbook of Deception
  • Awareness
  • Cybersecurity
  • Hacks
September 21, 2025
1 minute read
How LLMs leak your data while prompting
  • Dataleaks
  • EU AI Act
  • Privacy
September 3, 2025
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • wallet
  • vulnerablity
  • vulnerability
  • GDPR

Bank fined 300,000 euros for automatic rejection credit card application

A Berlin-based bank has been fined 300,000 euros by the Berlin data protection commissioner. The fine was imposed…
June 9, 2023
Lees meer
  • Dataleaks
  • Phishing

Verizon DBIR: Use of stolen credentials in 44% of the cases

2023 Data Breach Investigations Report of which the dataset currentlycontains 953,894 incidents, of which 254,968 are confirmed breaches…
June 7, 2023
Lees meer
  • Cybersecurity
  • EU AI Act
  • Privacy

Risks of Large Language Models such as ChatGPT

Large language models (LLMs), such as ChatGPT, have gained immense popularity and are being rapidly deployed by various…
June 1, 2023
Lees meer
  • Data Sharing
  • Personal Data
  • Privacy

NHS data breach: trusts shared patient details with Facebook without consent

An investigation by The Observer reveals that 20 NHS trusts in the UK have been sharing private details…
May 31, 2023
Lees meer
  • Awareness
  • Privacy

How personal does your car get with you?

Did you ever wonder what your car processes for data related to you? Event Data Recorders (EDRs) are…
May 29, 2023
Lees meer
  • Malware
  • Phishing

A click on a .ZIP file could lead to a phishing domain

Phishers are using a new technique called “file archiver in the browser” to trick victims. They create a…
May 29, 2023
Lees meer
  • Dataleaks

Safety Complaints of Tesla’s Autopilot self-driving and assistance feature in huge leak

German newspaper Handelsbatt received 100GB of data from informants at Tesla. The data contains information on thousands of…
May 28, 2023
Lees meer
  • Dataleaks
  • Privacy

Toyota exposed location data of 2.3 million customers for over a decade

Toyota has exposed the location data of 2.3 million customers for over a decade. The information was accessible…
May 14, 2023
Lees meer
  • Awareness
  • Cybersecurity

Keep it Real Online

A New Zealand government advertising campaign aimed at promoting online safety for under 18s sells it with humor.
May 4, 2023
Lees meer
  • GDPR
  • Privacy

Android phone chip provider was secretly collecting user data

Security researchers discovered that a chip present in some Android phones manufactured by Qualcomm is collecting sensitive user…
May 3, 2023
Lees meer
Featured Posts
  • Starmer bets big on Digital ID revolution

    September 21, 2025
  • How Russia shapes minds with the Playbook of Deception

    September 21, 2025
  • How LLMs leak your data while prompting

    September 3, 2025
  • Austria deals blow to “Pay or Okay” consent model

    August 20, 2025
  • When privacy becomes training data

    August 17, 2025
Categories
  • Awareness (7)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (23)
  • Data Sharing (1)
  • Dataleaks (30)
  • EIDAS (4)
  • EU AI Act (19)
  • Fraud (2)
  • GDPR (17)
  • Hacks (6)
  • Information Security (10)
  • Malware (4)
  • MFA (1)
  • Password Management (2)
  • Personal Data (4)
  • Phishing (13)
  • Privacy (40)
  • Ransomware (4)
  • Uncategorized (9)
  • Vulnerabilities (4)
Dataleaks
Copyright DataLeaks © 2025