About LeakTrace
What is LeakTrace?
LeakTrace is an exposure intelligence platform that monitors breach databases and other data sources to identify when an organization's credentials have been compromised. It provides structured reporting and actionable intelligence for businesses in Canada and the United States.
What is exposure intelligence?
Exposure intelligence is the practice of continuously monitoring external data sources to identify when an organization's credentials, domains, or other digital assets appear in breach databases or threat actor channels. It transforms raw breach data into structured, actionable findings.
Who is LeakTrace designed for?
LeakTrace serves businesses of all sizes across Canada and the United States, from small and mid-sized companies to enterprises. It is also available to individuals who want to understand their personal credential exposure.
What regions does LeakTrace operate in?
LeakTrace operates in Canada and the United States. Reporting and compliance guidance are tailored to the regulatory frameworks applicable in each region, including PIPEDA and state-level breach notification laws.
About Scope
What is Scope?
Scope is LeakTrace's instant credential scan. It checks a domain or email address against monitored breach databases and returns a structured exposure assessment within seconds.
How does Scope work?
Scope queries multiple breach intelligence sources using the domain or email address you provide. It cross-references the results, deduplicates findings, and returns a categorized summary of any credential exposures detected.
What data sources does Scope scan?
Scope scans a range of breach databases, paste sites, and other monitored data sources where compromised credentials are known to surface. Sources are continuously updated as new breach datasets become available.
How long does a Scope scan take?
A Scope scan typically completes within seconds. Results are delivered immediately in-browser, with the option to generate a detailed PDF report.
What is included in a Scope report?
A Scope report includes identified breach events, exposed data types, a risk assessment, and recommended remediation steps. The executive summary PDF, called Brief, provides a formatted document suitable for stakeholder review.
About Credential Exposure
What is credential exposure?
Credential exposure occurs when usernames, passwords, or authentication tokens appear in breach databases or other data sources accessible to threat actors. It typically results from third-party service breaches rather than a direct compromise of your own systems.
How do credentials end up on the dark web?
Credentials reach the dark web through third-party data breaches, infostealer malware that harvests saved browser passwords, phishing campaigns, and misconfigured repositories or cloud storage. These datasets accumulate and are redistributed over time.
What should I do if my credentials are exposed?
Change the compromised password immediately, along with any other accounts where the same password was reused. Enable multi-factor authentication on all critical accounts and review access logs for signs of unauthorized activity.
How often should I check for credential exposure?
Credential exposure should be monitored continuously. New breaches are disclosed regularly, and credentials from older incidents continue to surface as datasets are combined and redistributed across threat actor channels.