Fortinet black logo

User Guide

Leaked Credentials

Leaked Credentials

The FortiRecon team continually monitors for credential leaks and provides alerts to you through the FortiRecon portal. If any leaked or breached credentials that involve email addresses of the organizations or the users of their systems are detected, the FortiRecon portal automatically displays the information.

As part of consolidated collection, the leaked credentials are gathered from multiple sources:

  • Publicly leaked or breached databases
  • Privately shared databases
  • Paste sites
  • Malware infections

Leaked credentials are the primary source of Password Re-Use Attacks. It is important for any organization to quickly neutralize leaked credentials.

On the Attack Surface Management > Leaked Credentials page, you can:

Leaked Credentials

The FortiRecon team continually monitors for credential leaks and provides alerts to you through the FortiRecon portal. If any leaked or breached credentials that involve email addresses of the organizations or the users of their systems are detected, the FortiRecon portal automatically displays the information.

As part of consolidated collection, the leaked credentials are gathered from multiple sources:

  • Publicly leaked or breached databases
  • Privately shared databases
  • Paste sites
  • Malware infections

Leaked credentials are the primary source of Password Re-Use Attacks. It is important for any organization to quickly neutralize leaked credentials.

On the Attack Surface Management > Leaked Credentials page, you can: