Our Data

What we provide:

We aggregate intelligence data from various sources to enable you and your team to be trusted consultants within your organization. We provide all of our customers with a full list of our sources.

It's important to note that we do not track or report on data in cases where there is an active law enforcement investigation, or a regulator refuses to provide the data to us due to an internal rule or legal requirement. This ensures we operate within legal and ethical boundaries.

Our historical breach notification data dates back to 2010. If you need historical records prior to January 2023, please contact us, as they are not currently available via our web platform or API.

Here's some of the data that we collect:

  • Dark and deep web data

  • Federal breach notices & enforcement actions

  • State breach records and consumer notification notices

  • Bankruptcy and merger activity

  • News & media chatter


Left of boom image

Common fields:

Here’s a sample of field names that we collect from our various sources:

  • NAICS code

  • CIK number

  • Start date of breach

  • End date of breach

  • Name of submitter (ie. individual)

  • Name of affected organization

  • Affected organization address

  • Affected organization city

  • Affected organization state

  • Affected organization zip code

  • Description of breach

  • Location of breached information

  • Compromised accounts

  • Media / press source

  • Compromised data

  • URL to notice

  • URL to regulator report

  • Number of total persons impacted

  • Date report filed with regulator

  • Date breach discovered

  • Date of consumer notification

  • Identity theft services provider

  • Type of identity theft services

  • Manner of notice (ie., email, letter, etc)

  • Ransomware attacker name

  • Description of ransomware attacker

  • Leak site name

  • Article title

  • Article description

  • URL to press article