Patent attributes
A computer-implemented method can be performed to identify the publication of sensitive data and/or malware to a third-party site. According to the method, at least one processor retrieves data items stored on a computer system over a network, the computer system hosting a third-party site, to which the data items are published. The at least one processor stores the data items in local, computer-readable memory, and processes the data items stored in the local, computer-readable memory based on at least one search criteria. The at least one processor determines that at least one of the data items satisfies the at least one search criteria, and in response, provides an alert identifying the at least one data items.