Professional Documents
Culture Documents
Does the data in the breach turn up in a Google search (i.e. it's just copied from another
source)?
Is the structure of the data consistent with what you'd expect to see in a breach?
Have the attackers provided sufficient evidence to demonstrate the attack vector?
Do the attackers have a track record of either reliably releasing breaches or falsifying
them?