Techniques for detecting malicious or improper data modifications