Press ESC to close or Enter to search

Home
About Us
Services
Pricing
Tools
Resources
Contact
Get Started
Live Security Feed
Your IPDetecting...
NCSCUK organisations urged to strengthen cyber defences ALERTPhishing attacks targeting Microsoft 365 users on the rise CISACritical vulnerabilities identified in popular software NEWSRansomware groups increasingly targeting SME businesses NCSCNew guidance released for securing remote workers ALERTBusiness email compromise attacks cost UK firms millions CISAZero-day exploits require immediate patching attention NEWSAI-powered threats becoming more sophisticated in 2025 NCSCUK organisations urged to strengthen cyber defences ALERTPhishing attacks targeting Microsoft 365 users on the rise CISACritical vulnerabilities identified in popular software NEWSRansomware groups increasingly targeting SME businesses NCSCNew guidance released for securing remote workers ALERTBusiness email compromise attacks cost UK firms millions CISAZero-day exploits require immediate patching attention NEWSAI-powered threats becoming more sophisticated in 2025
View Dashboard

Dumpster Diving

Attacks

Searching through rubbish to find confidential information, documents, or discarded equipment.

Dumpster diving involves searching through an organisation's rubbish to find useful information—documents with account numbers, organisational charts, technical manuals, old hard drives, or any data that wasn't properly destroyed. Information gathered through dumpster diving supports social engineering, identity theft, and targeted attacks. The attack exploits inadequate disposal procedures for sensitive materials.

Why It Matters

The DSC Perspective:

Proper document destruction and equipment disposal are essential controls. Shredding policies, secure bins for sensitive documents, and proper sanitisation of old hard drives and devices prevent dumpster diving attacks.