Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
How LLMs leak your data while prompting
  • Dataleaks
  • EU AI Act
  • Privacy
September 3, 2025
1 minute read
Austria deals blow to “Pay or Okay” consent model
  • EU AI Act
  • GDPR
  • Privacy
August 20, 2025
1 minute read
When privacy becomes training data
  • EU AI Act
  • Privacy
August 17, 2025
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • WeTransfer
  • webshop
  • wallet
  • vulnerablity
  • vulnerability
  • vs
Browsing Tag

vmware

1 post
1 min
  • Cybersecurity
  • Dataleaks
  • Information Security

Irish university closed for two days due to hacking into IT systems

Irish university MTU Cork has decided to close all four campuses for two days and cancel all classes…
February 10, 2023
Lees meer
Featured Posts
  • How LLMs leak your data while prompting

    September 3, 2025
  • Austria deals blow to “Pay or Okay” consent model

    August 20, 2025
  • When privacy becomes training data

    August 17, 2025
  • Clorox blames IT Firm for $380M hack after “Password Over the Phone” slip

    July 24, 2025
  • Is the CISO role the job nobody wants?

    July 11, 2025
Categories
  • Awareness (6)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (22)
  • Data Sharing (1)
  • Dataleaks (30)
  • EIDAS (3)
  • EU AI Act (19)
  • Fraud (2)
  • GDPR (17)
  • Hacks (5)
  • Information Security (10)
  • Malware (4)
  • MFA (1)
  • Password Management (2)
  • Personal Data (4)
  • Phishing (13)
  • Privacy (40)
  • Ransomware (4)
  • Uncategorized (9)
  • Vulnerabilities (4)
Dataleaks
Copyright DataLeaks © 2025