A data breach investigation blow-by-blow

added by DotNetKicks
1/10/2017 4:11:14 PM

5 Kicks, 329 Views

Someone has just sent me a data breach. I could go and process the whole thing, attribute it to a source, load it into Have I been pwned (HIBP) then communicate the end result, but I thought it would be more interesting to readers if I took you through the