Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English

Categories

  • Awareness
    • Fraud
    • Phishing
  • Compliance and Legislation
    • Data Sharing
    • EIDAS
    • EU AI Act
    • GDPR
    • Sovereignty
  • Cybersecurity
    • Hacks
    • Malware
    • MFA
    • Ransomware
    • Vulnerabilities
  • Information Security
    • Business Continuity
    • Cloud
    • Dataleaks
    • Password Management
    • Personal Data
    • Privacy
  • Uncategorized
Dataleaks Dataleaks
  • Trainings
  • Roundtable
  • English
dark
Dataleaks Dataleaks
Hand-Picked Top-Read Stories
When Palantir-AI becomes a sovereignty risk
  • EU AI Act
  • Sovereignty
December 14, 2025
1 minute read
The Wallet that ends the weakest “password” link
  • EIDAS
  • EU AI Act
December 7, 2025
1 minute read
Zero-Day breach hits Logitech with data stolen across multiple groups
  • Hacks
  • Personal Data
  • Ransomware
November 16, 2025
1 minute read
Trending Tags
  • zeroday
  • Youtube
  • wipe
  • whatsapp
  • whataboutism
  • WeTransfer
  • webshop
  • wallet
  • vulnerablity
  • vulnerability
Browsing Tag

vmware

1 post
1 min
  • Cybersecurity
  • Dataleaks
  • Information Security

Irish university closed for two days due to hacking into IT systems

Irish university MTU Cork has decided to close all four campuses for two days and cancel all classes…
February 10, 2023
Lees meer
Featured Posts
  • When Palantir-AI becomes a sovereignty risk

    December 14, 2025
  • The Wallet that ends the weakest “password” link

    December 7, 2025
  • Zero-Day breach hits Logitech with data stolen across multiple groups

    November 16, 2025
  • Trust is on the line in America through disinformation

    October 19, 2025
  • Starmer bets big on Digital ID revolution

    September 21, 2025
Categories
  • Awareness (8)
  • Business Continuity (2)
  • Cloud (7)
  • Compliance and Legislation (6)
  • Cybersecurity (23)
  • Data Sharing (1)
  • Dataleaks (30)
  • EIDAS (5)
  • EU AI Act (22)
  • Fraud (2)
  • GDPR (17)
  • Hacks (7)
  • Information Security (10)
  • Malware (4)
  • MFA (1)
  • Password Management (2)
  • Personal Data (5)
  • Phishing (13)
  • Privacy (40)
  • Ransomware (5)
  • Sovereignty (1)
  • Uncategorized (9)
  • Vulnerabilities (4)
Dataleaks
Copyright DataLeaks © 2025