Credential check
If my information is exposed, what should I do?
If the tool identifies exposed data, you are advised to replace this data as quickly as possible so that no one can exploit it. It's the same principle as if someone steal the key to your home. Then of course you want to change the lock as quickly as ...
How should I interpret the results of password monitoring?
The report is interpreted as follows: Headline: Indicates from which source the information is exposed, e.g. Dropbox. If it says "Dark Web Password Database," it means that the information is exposed but the original source cannot be verified. Source ...
What is password monitoring?
A service that scans for exposed passwords linked to the company's domain. The tool scans the clear, deep, and dark web for exposed email addresses and passwords linked to those email addresses, specifically at the domain level rather than tied to ...
Why are you monitoring my information?
Safestate collaborates with a number of different partners where you as a customer can take advantage of our proactive cyber security services. This includes that we monitor whether your data has been exposed. We search with a keyword, which can be ...
I've received an email about leaked information, but there's no information about the source.
Sometimes, certain pieces of information can be identified as leaked (exposed) without the original source being available. Unfortunately, we're unable to investigate this further. As the recipient of this information, what you can do is, if the ...
What does a leak mean?
The term "leak" can be used for several different purposes. An information leak means that unexpected people gain access to secret or confidential data and information. This can happen intentionally through hacking or through inadvertent actions, ...
How do you find this information?
Our service "Leaked User Information" actively and continuously searches for new leaks both automatically and manually in: Dumped and leaked texts (pastebins) Protected forums on the dark web and clear web. Encrypted invisible networks (I2P) Web ...
The risk of leaked login credentials involves:
The easiest way into the core of the organization and its information assets is through an employee's username and saved password. Think of user credentials like a regular door key; if the key suddenly finds itself outside the door, why bother trying ...
What should I do with the email addresses that have leaked passwords?
If you have disclosed your email address along with your password, you should immediately change the password for the corresponding email account. To do this, log in to the account and navigate to the settings or security section, where you can ...
How do I ensure to reduce the risks in the future?
Here are some steps to prevent email addresses and passwords from leaking: Use strong passwords that include a combination of letters, numbers, and special characters. Regularly update passwords and avoid using the same password for multiple ...
What is a combolist / bundle?
A combolist is a text file containing a list that includes email addresses and passwords sourced from various leaks, making it difficult to determine the original data source. Examples of different combolist names: Combolist 400M Social Media ...