While we can’t say definitively that the data we’ve discovered has already been used to exploit your organization, the fact that we are able to identify this data should be very concerning. Organizations should consult their internal or external IT and/or security teams to determine if they have suffered a cyber incident or data breach.
Does the identification of my organization’s exposed credentials mean we are being targeted by hackers?
Have more questions?
Provide feedback for the Documentation team!
Browse this section
- What does password criteria mean?
- Some of this data is old and includes employees that are no longer working for us. Doesn’t this mean we are not at risk?
- Identified method used to capture/ steal data: how was the data stolen or compromised?
- Does the identification of my organization’s exposed credentials mean we are being targeted by hackers?
- Data source locations & descriptions: where do we find data?
- How are the stolen or exposed credentials found on the dark web?
- How does Dark Web ID help protect my organization?
- What is the dark web?
- What does it mean when a password has a long series of random numbers and letters?
- What is the difference between a privileged user and standard user?
- See more