← All threats
highLast seen May 22, 2026Source: Cyentrix Intel feed

Database Leak / Unauthorised Data Exposure

Attacker dumps or sells a customer database. Implies the data store was accessible from the internet, lacked encryption at rest, or had weak access controls. DLP, classification, encryption and database access auditing close the gap.

See where you stand against this threat

Sign in to see your existing attestations against each mapped control — including which ones already cover you from past work.

Sign in →

Mapped controls· 6

Data loss prevention (DLP)

NIST SP 800-53 Rev 5

Recommended control for data breach

Data classification and labelling

ISO

Recommended control for data breach

Encryption at rest

NIST SP 800-53 Rev 5

Recommended control for data breach

Encryption in transit

NIST SP 800-53 Rev 5

Recommended control for data breach

Privileged access management (PAM)

NIST SP 800-53 Rev 5

Recommended control for data breach

Logging and alerting

NIST SP 800-53 Rev 5

Recommended control for data breach