Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
How LLMs leak your data while prompting
  • Dataleaks
  • EU AI Act
  • Privacy
September 3, 2025
1 minute read
Austria deals blow to “Pay or Okay” consent model
  • EU AI Act
  • GDPR
  • Privacy
August 20, 2025
1 minute read
When privacy becomes training data
  • EU AI Act
  • Privacy
August 17, 2025
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • WeTransfer
  • webshop
  • wallet
  • vulnerablity
  • vulnerability
  • vs
Browsing Tag

controller

1 post
1 min
  • Compliance and Legislation
  • Cybersecurity
  • GDPR

Controller based on the choice of purpose and “essential” means

The EDPS – European Data Protection Supervisor states in an opinion that in order to act as a…
February 13, 2023
Lees meer
Featured Posts
  • How LLMs leak your data while prompting

    September 3, 2025
  • Austria deals blow to “Pay or Okay” consent model

    August 20, 2025
  • When privacy becomes training data

    August 17, 2025
  • Clorox blames IT Firm for $380M hack after “Password Over the Phone” slip

    July 24, 2025
  • Is the CISO role the job nobody wants?

    July 11, 2025
Categories
  • Awareness (6)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (22)
  • Data Sharing (1)
  • Dataleaks (30)
  • EIDAS (3)
  • EU AI Act (19)
  • Fraud (2)
  • GDPR (17)
  • Hacks (5)
  • Information Security (10)
  • Malware (4)
  • MFA (1)
  • Password Management (2)
  • Personal Data (4)
  • Phishing (13)
  • Privacy (40)
  • Ransomware (4)
  • Uncategorized (9)
  • Vulnerabilities (4)
Dataleaks
Copyright DataLeaks © 2025