Unauthorized access or acquisition of sensitive information. Digital investigations into breaches often focus on intrusion vector, affected systems, exfiltration evidence, notification requirements, and correlating attacker infrastructure and artifacts across endpoints and logs.