Ask the Community
Groups
Data source locations & descriptions: where do we find data? - Connect IT Community | Kaseya
<main> <article class="userContent"> <ul><li>Dark Web Chatroom: compromised data discovered in a hidden IRC</li> <li>Hacking Site: compromised data exposed on a hacked Website or data dump site</li> <li>Hidden Theft Forum: compromised data published within a hacking forum or community</li> <li>P2P File Leak: compromised data leaked from a Peer-to-Peer file sharing program or network</li> <li>Social Media Post: compromised data posted on a social media platform</li> <li>C2 Server/Malware: compromised data harvested through botnets or on a command and control (C2) server.</li> </ul> </article> </main>