: Leaked databases often expose PII (Personally Identifiable Information) such as physical addresses and phone numbers.

Compressed ZIP archive containing a .sql (Structured Query Language) script.

Security researchers look for INSERT INTO statements that contain plaintext or poorly hashed credentials. :