highLast seen May 22, 2026Source: Cyentrix Intel feed
Database Leak / Unauthorised Data Exposure
Attacker dumps or sells a customer database. Implies the data store was accessible from the internet, lacked encryption at rest, or had weak access controls. DLP, classification, encryption and database access auditing close the gap.
See where you stand against this threat
Sign in to see your existing attestations against each mapped control — including which ones already cover you from past work.
Sign in →Mapped controls· 6
Data loss prevention (DLP)
NIST SP 800-53 Rev 5
Recommended control for data breach
Data classification and labelling
ISO
Recommended control for data breach
Encryption at rest
NIST SP 800-53 Rev 5
Recommended control for data breach
Encryption in transit
NIST SP 800-53 Rev 5
Recommended control for data breach
Privileged access management (PAM)
NIST SP 800-53 Rev 5
Recommended control for data breach
Logging and alerting
NIST SP 800-53 Rev 5
Recommended control for data breach