Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
    • Sovereignty
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
    • Nederlands (Dutch)
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
Google warns of imminent security risks with quantum wake-up call
  • Information Security
March 29, 2026
1 minute read
Why AI Agents are easier to hack than you think
  • EU AI Act
  • Hacks
March 23, 2026
1 minute read
How are AI and robots reshaping jobs?
  • Cybersecurity
  • EU AI Act
March 15, 2026
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • weakness
  • wallet
  • vulnerablity
  • Awareness
  • Cybersecurity

Keep it Real Online

A New Zealand government advertising campaign aimed at promoting online safety for under 18s sells it with humor.
May 4, 2023
Lees meer
  • GDPR
  • Privacy

Android phone chip provider was secretly collecting user data

Security researchers discovered that a chip present in some Android phones manufactured by Qualcomm is collecting sensitive user…
May 3, 2023
Lees meer
  • EU AI Act

OS of Human Civilisation hacked by AI?

Yuval Noah Harari, a renowned historian and author, argues that AI has hacked the operating system of human…
April 30, 2023
Lees meer
  • Awareness
  • Malware

FBI: Stop using free public charging ports

The FBI has warned people to avoid free public charging ports, f.e. at airports and coffee shops. Hackers…
April 12, 2023
Lees meer
  • Hacks
  • Malware

iPhone hacked via invisible calendar invite with Spyware

Microsoft and Citizen Lab discovered commercial spyware made by an Israel-based company QuaDream used to compromise the iPhones…
April 12, 2023
Lees meer
  • EU AI Act
  • Uncategorized
  • Privacy

ChatGPT-4 biased, deceptive, and a risk to privacy and public safety?

GPT-4 is considered to be ten times more intelligent than GPT-3. GPT-4 was able to pass the most…
March 31, 2023
Lees meer
  • Dataleaks
  • Hacks

A view under the hood in Russian cyberwarfare tactics

Thousands of pages of secret documents reveal how Vulkan’s engineers have worked for Russian military and intelligence agencies…
March 31, 2023
Lees meer
  • EU AI Act
  • Privacy

Italian DPA: ChatGPT illegally collects personal data and lacks age verification

The Italian Data Protection Authority has ordered, with immediate effect, the temporary restriction of the processing of Italian…
March 31, 2023
Lees meer
  • GDPR
  • Privacy

Your fertility, your data, or your body our data?

Unfair, unsafe – and also often unclear to women using fertility apps, just what is really going on…
March 22, 2023
Lees meer
  • Cloud
  • Cybersecurity

How to prevent insider threats in your Active Directory?

Active Directory (AD) is a powerful authentication and directory service used by organizations worldwide. With this ubiquity and…
March 22, 2023
Lees meer
Featured Posts
  • Google warns of imminent security risks with quantum wake-up call

    March 29, 2026
  • Why AI Agents are easier to hack than you think

    March 23, 2026
  • How are AI and robots reshaping jobs?

    March 15, 2026
  • OpenClaw AI security flaws expose systems to data theft

    March 15, 2026
  • LeakBase cybercrime forum shut down

    March 15, 2026
Categories
  • Awareness (8)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (24)
  • Data Sharing (1)
  • Dataleaks (31)
  • EIDAS (6)
  • EU AI Act (26)
  • Fraud (2)
  • GDPR (17)
  • Hacks (9)
  • Information Security (11)
  • Malware (5)
  • MFA (1)
  • Password Management (2)
  • Personal Data (5)
  • Phishing (13)
  • Privacy (41)
  • Ransomware (5)
  • Sovereignty (1)
  • Uncategorized (9)
  • Vulnerabilities (5)
Dataleaks
Copyright DataLeaks © 2025