Frequently Asked Questions
A data breach occurs when sensitive information is unintentionally exposed due to weak security measures or software vulnerabilities. CyberTrace aggregates these breaches and offers a subscription-based API, providing domain-specific insights and statistics
We do not store passwords in our databases—only statistical data aggregated by domain address.
Attackers sometimes announce data breaches that later turn out to be hoaxes. Striking a balance between making data searchable quickly and conducting thorough due diligence is essential to verify the breach's legitimacy. The following steps are typically taken to validate a breach:
- Has the affected service publicly acknowledged the breach?
- Does the breached data appear in a Google search, suggesting it was copied from another source?
- Is the structure of the data consistent with what is typical in a legitimate breach?
- Have the attackers provided credible evidence of the attack method?
- Do the attackers have a history of releasing legitimate breaches, or are they known for fabricating them?