Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
Zero-Day breach hits Logitech with data stolen across multiple groups
  • Hacks
  • Personal Data
  • Ransomware
November 16, 2025
1 minute read
Trust is on the line in America through disinformation
  • Awareness
  • EU AI Act
October 19, 2025
1 minute read
Starmer bets big on Digital ID revolution
  • EIDAS
September 21, 2025
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • wallet
  • vulnerablity
  • vulnerability
Browsing Tag

controller

1 post
1 min
  • Compliance and Legislation
  • Cybersecurity
  • GDPR

Controller based on the choice of purpose and “essential” means

The EDPS – European Data Protection Supervisor states in an opinion that in order to act as a…
February 13, 2023
Lees meer
Featured Posts
  • Zero-Day breach hits Logitech with data stolen across multiple groups

    November 16, 2025
  • Trust is on the line in America through disinformation

    October 19, 2025
  • Starmer bets big on Digital ID revolution

    September 21, 2025
  • How Russia shapes minds with the Playbook of Deception

    September 21, 2025
  • How LLMs leak your data while prompting

    September 3, 2025
Categories
  • Awareness (8)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (23)
  • Data Sharing (1)
  • Dataleaks (30)
  • EIDAS (4)
  • EU AI Act (20)
  • Fraud (2)
  • GDPR (17)
  • Hacks (7)
  • Information Security (10)
  • Malware (4)
  • MFA (1)
  • Password Management (2)
  • Personal Data (5)
  • Phishing (13)
  • Privacy (40)
  • Ransomware (5)
  • Uncategorized (9)
  • Vulnerabilities (4)
Dataleaks
Copyright DataLeaks © 2025