What just happened?
If you see a successful upload message above then your
data was able to be leaked out of your organization. The data successfully left
Where did my data go?
Your data was sent to
dataleaktest.com using the File Upload method and the results shown on the
How do I protect my Data assets from leakage?
A network based data
security tool or an Endpoint based data security tool should be able to stop
leaks that use the File Upload method.
What internet technologies commonly use the file
upload method to get data?
Email uploads of some web based email
Social media commenting (usually SSL)
Email body of web based email (usually SSL)
Blogs, forums and message board
Flash based applications