U.S. officials seeking extradition of: Jordan Ercit reports: Jacob Butler, 23, who was arrested Wednesday by OPP, also facing aiding and abetting computer intrusion charge in Alaska A 23-year-old Ottawa man is facing extradition to the United States after bei — May 2026· Radiology Associates of Richmond: On July 1, 2025,  Radiology Associates of Richmond (“RAR”) reported a breach to HHS that had occurred in April 2024 and affected more than 1.4 million patients. By the end of July 2025, the well-known radiolo — May 2026· Proposed State Laws For Breach: Joseph Lazzarotti of JacksonLewis writes: State breach-notification laws continue to evolve, and legislatures are using 2026 sessions to tighten consumer protections and shift the civil liability landscape that often fol — May 2026· Hackers breach two Vietnamese ministerial: Vietnamnet Global reports: Speaking at the Vietnam Security Summit 2026 on May 22, Lieutenant Colonel Tran Trung Hieu, Deputy Director of the National Cybersecurity Center and Director of VNCERT under the Ministry of Pub — May 2026· Verizon DBIR: Ransomware and vendor breaches persist, but the 2026 Data Breach Investigations Report (DBIR) highlights how evolving social engineering tactics make the sector more vulnerable. — May 2026· Trump Mobile: Lorenzo Franceschi-Bicchierai reports: Phone provider Trump Mobile has confirmed that it was exposing customers’ names, email addresses, mailing addresses, cell numbers, and order identifiers to the open internet. Chris — May 2026· Identity as the primary attack: The “retro” way “The thing about the old days is… they are the old days” – Slim Charles, The Wire Protecting a specified network perimeter was the main focus of enterprise security strategy for several decades. Bus — May 2026· Fake Gemini and Claude Code: The infostealer payload in this campaign collect a vast amount of data, from collaboration authentication keys to cryptocurrency wallets — May 2026· Hackers steal patient and billing: Daryna Antoniuk reports: German university hospitals are grappling with a large-scale patient data breach after unknown hackers targeted an external billing service provider used by medical centers across the country, ac — May 2026· Lawmakers Demand Answers as CISA: Lawmakers in both houses of Congress are demanding answers from the U.S. Cybersecurity & Infrastructure Security Agency (CISA) after KrebsOnSecurity reported this week that a CISA contractor intentionally published — May 2026· U.S. officials seeking extradition of: Jordan Ercit reports: Jacob Butler, 23, who was arrested Wednesday by OPP, also facing aiding and abetting computer intrusion charge in Alaska A 23-year-old Ottawa man is facing extradition to the United States after bei — May 2026· Radiology Associates of Richmond: On July 1, 2025,  Radiology Associates of Richmond (“RAR”) reported a breach to HHS that had occurred in April 2024 and affected more than 1.4 million patients. By the end of July 2025, the well-known radiolo — May 2026· Proposed State Laws For Breach: Joseph Lazzarotti of JacksonLewis writes: State breach-notification laws continue to evolve, and legislatures are using 2026 sessions to tighten consumer protections and shift the civil liability landscape that often fol — May 2026· Hackers breach two Vietnamese ministerial: Vietnamnet Global reports: Speaking at the Vietnam Security Summit 2026 on May 22, Lieutenant Colonel Tran Trung Hieu, Deputy Director of the National Cybersecurity Center and Director of VNCERT under the Ministry of Pub — May 2026· Verizon DBIR: Ransomware and vendor breaches persist, but the 2026 Data Breach Investigations Report (DBIR) highlights how evolving social engineering tactics make the sector more vulnerable. — May 2026· Trump Mobile: Lorenzo Franceschi-Bicchierai reports: Phone provider Trump Mobile has confirmed that it was exposing customers’ names, email addresses, mailing addresses, cell numbers, and order identifiers to the open internet. Chris — May 2026· Identity as the primary attack: The “retro” way “The thing about the old days is… they are the old days” – Slim Charles, The Wire Protecting a specified network perimeter was the main focus of enterprise security strategy for several decades. Bus — May 2026· Fake Gemini and Claude Code: The infostealer payload in this campaign collect a vast amount of data, from collaboration authentication keys to cryptocurrency wallets — May 2026· Hackers steal patient and billing: Daryna Antoniuk reports: German university hospitals are grappling with a large-scale patient data breach after unknown hackers targeted an external billing service provider used by medical centers across the country, ac — May 2026· Lawmakers Demand Answers as CISA: Lawmakers in both houses of Congress are demanding answers from the U.S. Cybersecurity & Infrastructure Security Agency (CISA) after KrebsOnSecurity reported this week that a CISA contractor intentionally published — May 2026·
Exposure Intelligence Platform

Continuous Visibility
Across Your Attack Surface.

Exposure Mapping · Risk Quantification · Continuous Surveillance

Every domain carries an exposure profile — credential breaches, infrastructure gaps, regulatory filings, dark web indexing. LeakTrace synthesizes 52 intelligence sources into a single, quantified risk posture before an adversary operationalizes the data.

No account required
Results in 60 seconds
1,200 indexed sources
0Intelligence sources correlated
0Indexed breach databases
0Compromised records mapped
0Attack surfaces under surveillance
Live counter
Business Email Compromise — reported losses, year to date
$0
Business Email Compromise — an attacker gets inside an inbox, watches finance traffic, then redirects a wire to themselves. Highest-loss internet-crime category the FBI tracks, ten years running.
$3.04B
2025 full year (FBI IC3)
$10B+
Estimated true global losses
$123K
Average loss per incident
Counter ticks live from Jan 1 at the FBI's reported run rate · Sources: FBI IC3, Microsoft Digital Defense, APWG eCrime (2025)
Run Shadow on my email How we cut this number →
Shadow · Read-only mailbox forensics

See your email the way attackers see it.

Shadow reads every forwarding rule, every filter, every login method, and every connected device across your Microsoft 365 or Google Workspace. Nothing installed. Nothing changed. One admin click.

BEC attackers stay inside a hacked email account for 38 days before triggering a payment. Shadow runs in four minutes.

Run Shadow on my email → Why we built it
Live Threat Intelligence
5134 Active Incidents Open Full Map
How It Works

The LeakTrace Methodology.

01
Domain Fingerprinting

Enumerate every publicly exposed asset — subdomains, open ports, SSL configuration, DNS topology, and infrastructure signatures.

02
Source Correlation

Cross-reference against 52 intelligence sources: credential repositories, breach indices, threat feeds, paste archives, and regulatory registries.

03
Risk Quantification

19 weighted signals produce a composite exposure score (0-100) with severity classification: Critical, High, Moderate, Low.

04
Intelligence Delivery

5 analyst-grade reports generated within 24 hours: Infrastructure Evidence, Credential Exposure, Statutory Mapping, Executive Summary, and Master Defence Report.

05
Continuous Surveillance

Automated daily rescans. Threshold-based alerting on new exposures. Longitudinal risk trend analysis.

The Intelligence Layer

Exposure Data
Is Already Indexed.

Compromised credentials, infrastructure metadata, and corporate identifiers persist across breach repositories, paste archives, and data broker networks. This information has been queryable since the moment of exfiltration.

LeakTrace correlates those same sources. The difference between visibility and exposure is whether you map the data before an adversary acts on it.

98 billion compromised records indexed. Your exposure profile is already assembled.
Credential Repositories

1,200 indexed breach databases containing billions of compromised records. Credentials are cross-referenced by domain, email pattern, and organizational association.

Data Broker Indices

Corporate identifiers, contact records, and organizational metadata aggregated across commercial data broker networks and public registry filings.

Threat Intelligence Feeds

Paste site archives, credential dump repositories, and active monitoring channels where exfiltrated data surfaces and is distributed.

Infrastructure Telemetry

DNS topology, certificate chains, open service enumeration, header analysis. Automated reconnaissance identifies the same gaps that adversary tooling maps.

Deployment Models

One Objective.

Self-Serve  ·  Automated
LeakTrace Individual

Automated exposure scan across credential repositories, data broker indices, and threat intelligence feeds. Quantified risk assessment with prioritized remediation protocol.

  • Confirmed breach database scan
  • Criminal-targeting source exposure check
  • Data broker exposure assessment
  • SIM swap vulnerability profile
  • Session hijack and cookie theft risk score
  • Prioritized remediation guidance for every finding
Assessment-Driven  ·  Managed
LeakTrace Business

Full external attack surface assessment. Credential exposure, infrastructure telemetry, subdomain enumeration — documented, scored, and mapped to a remediation roadmap.

  • Corporate domain and subdomain exposure assessment
  • Employee credential breach exposure
  • Infrastructure vulnerability mapping
  • Hardcoded API keys in client-side code
  • Exposed configuration files and source repositories
  • Subdomain takeover and dangling-DNS risk
  • Public cloud-storage exposure
  • Forgotten subdomains via Certificate Transparency logs
  • Outdated JavaScript libraries with known CVEs
  • Criminal-targeting source exposure indicators
  • Ransomware and BEC risk assessment
  • Full remediation roadmap and implementation
Exposure Landscape
1 in 3

Individuals With Documented Credential Exposure

The median individual appears in four or more confirmed breach events. The data is indexed, searchable, and actively referenced by adversary infrastructure.

$16.6B
Internet crime losses recorded in 2024
FBI IC3, 2024
$4.44M
Average cost of a single business breach
IBM, 2024
98B+
Credential records in circulation from documented breaches
LeakTrace indexed corpus
194
Days the average organization takes to discover they were breached
IBM, 2024

194 days. The average dwell time between initial compromise and detection. During that window, the organization operates without visibility into active adversary presence.

LeakTrace correlates the same intelligence sources used in adversary reconnaissance. Exposure is identified and quantified before it becomes operational.

Internet Crime Losses — USD FBI IC3 Data
$16.6B ▲ 33% YoY
Projected →
2019202020212022202320242025
$16.6B in 2024
Reported losses only. True cost estimated 3–5× higher. Source: FBI IC3 Annual Report.
For Organizations & Partners

Deploy Intelligence at Scale

Partner Program
White-Label Intelligence Under Your Brand

Deliver branded cybersecurity assessments to your clients. Your logo, your colors, your name. We provide the intelligence engine. You keep the margin.

Partner Program
Enterprise API
Programmatic Intelligence Access

Integrate risk scoring, entity intelligence, and exposure data directly into your underwriting, lending, or vendor risk systems via REST API.

API Documentation
Trusted Across Industries

Trusted by the Professionals Who Secure Canadian Organizations

Law Firms
Accounting Firms
Insurance Brokers
MSPs
Financial Advisors
Healthcare Clinics