Close Menu
The Politics
    What's Hot

    WW1 toxic compound sprayed on Georgian protesters, BBC evidence suggests

    November 30, 2025

    Ukraine talks ‘productive’ but more work needed, Rubio says

    November 30, 2025

    Pope Leo finds his voice on first foreign trip

    November 30, 2025
    Facebook X (Twitter) Instagram
    • Demos
    • Politics
    • Buy Now
    Facebook X (Twitter) Instagram
    The Politics
    Subscribe
    Sunday, November 30
    • Home
    • Breaking
    • World
      • Africa
      • Americas
      • Asia Pacific
      • Europe
    • Sports
    • Politics
    • Business
    • Entertainment
    • Health
    • Tech
    • Weather
    The Politics
    Home»Tech»Huge password breach exposes billions of stolen credentials online
    Tech

    Huge password breach exposes billions of stolen credentials online

    Justin M. LarsonBy Justin M. LarsonNovember 30, 2025No Comments7 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email VKontakte Telegram
    Share
    Facebook Twitter Pinterest Email Copy Link


    NEWYou can now listen to Fox News articles!

    If you have not checked your credentials lately, now is the time. 

    A staggering 1.3 billion unique passwords and 2 billion unique email addresses surfaced online. This event is one of the largest exposures of stolen logins we have seen.

    This is not the result of one major breach. Instead, Synthient, a threat intelligence firm, searched the open and dark web for leaked credentials. You may remember the company from its earlier discovery of 183 million exposed email accounts. This time, the scale is far larger.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    AMERICA’S MOST-USED PASSWORD IN 2025 REVEALED

    Chinese hackers target US telecoms: What you need to know to protect your data

    Synthient uncovered a massive collection of stolen passwords and email addresses pulled from both the open and dark web.  (Kurt “CyberGuy” Knutsson)

    Where this huge trove came from

    Most of the data comes from credential stuffing lists. Criminals pull these lists from old breaches and use them in new attacks. Synthient went further. Its founder Benjamin Brundage gathered stolen logins from hundreds of hidden sources across the web.

    The data includes old passwords from past breaches and fresh passwords stolen by info-stealing malware on infected devices. Synthient partnered with security researcher Troy Hunt, who runs Have I Been Pwned. He verified the dataset and confirmed that it contains new exposures.

    To test the data, Hunt started with one of his old email addresses. He already knew it had been added to past credential stuffing lists. When he found it in the new trove, he reached out to trusted Have I Been Pwned users to confirm the findings. Some had never appeared in breaches before, which proved that this leak includes new stolen logins.

    183 MILLION EMAIL PASSWORDS LEAKED: CHECK YOURS NOW

    Concerned man looks at laptop

    Hackers use these stolen logins for credential stuffing attacks that target accounts across multiple sites. (iStock)

    How to check if your passwords were stolen

    To see if your email was affected, 

    • Visit Have I Been Pwned. It is the first and official source for this newly added dataset.
    • Enter your email address to find out if your information appears in the leak.
    • When done, come back here for Step 1 below.

    WHAT REALLY HAPPENS ON THE DARK WEB, AND HOW TO STAY SAFE

    Verification tests showed that the dataset contains fresh stolen credentials that had never appeared in earlier breaches.

    Verification tests showed that the dataset contains fresh stolen credentials that had never appeared in earlier breaches. (Kurt “CyberGuy” Knutsson)

    How to protect yourself after this massive credential leak

    These simple actions strengthen your accounts fast and help you stay ahead of criminals who rely on stolen passwords.

    1) Change any exposed passwords immediately

    Do not leave a known leaked password in place. Change it right away on every site where you used it. Create a new login that is strong, unique and not similar to your old one. This step cuts off criminals who already have your stolen credentials.

    2) Stop reusing passwords across sites

    Avoid reusing passwords across sites. Once hackers get a working email and password pair, they try it on other services. This attack method, called credential stuffing, still succeeds because many people recycle the same login. One stolen password should not unlock every account you own.

    3) Use a strong password manager

    A strong password manager can generate new secure logins for your accounts. It creates long, complex passwords that you do not have to memorize. It also stores them safely so you can sign in quickly without taking risky shortcuts. Many password managers also scan for breaches to see if your current passwords have been exposed.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    4) Turn on Two-Factor Authentication

    Even the strongest password can be exposed. Two-factor authentication adds a second step when you log in. You may enter a code from an authenticator app or tap a physical security key. This extra layer blocks attackers who try to access your account with stolen passwords.

    5) Protect your devices from malware and install strong antivirus software 

    Hackers often steal passwords by infecting your devices. Info-stealing malware hides inside phishing emails and fake downloads. Once installed, it pulls passwords straight from your browser and apps. Protect your phones and computers with strong antivirus software. It can detect and block info-stealing malware before it drains your accounts. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    6) Consider switching to passkeys when possible

    If you want better protection, start using passkeys on services that support them. Passkeys use cryptographic keys instead of text passwords. Criminals cannot guess or reuse them. They also stop many phishing attacks because they only work on trusted sites. Think of passkeys as a secure digital lock for your most important accounts.

    7) Use a data removal service

    Data brokers collect and sell your personal details, which criminals can combine with stolen passwords. A trusted data removal service can help find and remove your information from people-search sites. Reducing your exposed data makes it harder for attackers to target you with convincing scams and account takeovers.

    While no service can guarantee total removal, they drastically reduce your digital footprint, making it harder for scammers to cross-reference leaked credentials with public data to impersonate or target you. These services monitor and automatically remove your personal info over time, which gives me peace of mind in today’s threat landscape.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    8) Review your security often

    Security is not a one-time task. Check your passwords on a regular schedule and update older logins before they become a problem. Review which accounts have Two-factor authentication turned on and add it where you can. By staying proactive, you stay one step ahead of hackers and limit the damage from future leaks.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP 

    Kurt’s key takeaways

    Massive leaks like this one highlight how fragile digital security can be. Even when you follow best practices, your information can still land in criminal hands through old breaches, malware or third-party exposures. Taking a proactive approach puts you in a stronger position. Regular checks, secure passwords and strong authentication give you real protection.

    With billions of stolen passwords floating around, do you feel ready to check your own and tighten your account security today? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.



    Source link

    Related

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link
    Justin M. Larson
    • Website

    Related Posts

    Tech

    ‘Women are afraid to get pregnant’: Fighting mercury poisoning from illegal gold mining in Brazil | Science, Climate & Tech News

    November 30, 2025
    Tech

    More than 600 dead in Indonesia and Thailand after floods and landslides – and Sri Lanka reporting more than 200 deaths from cyclone | World News

    November 30, 2025
    Tech

    Elon Musk says robots will make work optional in new viral Optimus clip

    November 30, 2025
    Tech

    Chinese hackers use Anthropic’s Claude AI in major cyberattack campaign

    November 29, 2025
    Tech

    Apple Watch gets new Sleep Score feature for better sleep tracking

    November 29, 2025
    Tech

    Bigger than COVID? The graph that explains why AI is going to be so huge | Science, Climate & Tech News

    November 28, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    • Africa
    • Americas
    • Asia Pacific
    • Breaking
    • Business
    • Economy
    • Entertainment
    • Europe
    • Health
    • Politics
    • Politics
    • Sports
    • Tech
    • Top Featured
    • Trending Posts
    • Weather
    • World
    Economy News

    WW1 toxic compound sprayed on Georgian protesters, BBC evidence suggests

    Justin M. LarsonNovember 30, 20250

    Max Hudson,Oana MarocicoandSarah Buckley,BBC Eye InvestigationsShutterstockProtesters against the Georgian government have complained of long-lasting symptoms…

    Ukraine talks ‘productive’ but more work needed, Rubio says

    November 30, 2025

    Pope Leo finds his voice on first foreign trip

    November 30, 2025
    Top Trending

    WW1 toxic compound sprayed on Georgian protesters, BBC evidence suggests

    Justin M. LarsonNovember 30, 20250

    Max Hudson,Oana MarocicoandSarah Buckley,BBC Eye InvestigationsShutterstockProtesters against the Georgian government have complained…

    Ukraine talks ‘productive’ but more work needed, Rubio says

    Justin M. LarsonNovember 30, 20250

    US Secretary of State Marco Rubio says talks with Ukraine over a…

    Pope Leo finds his voice on first foreign trip

    Justin M. LarsonNovember 30, 20250

    Aleem MaqboolReligion Editor, Travelling with the Pope, BeirutGetty ImagesThe Pope arrived in…

    Subscribe to News

    Get the latest sports news from NewsSite about world, sports and politics.

    Advertisement
    Demo
    Editors Picks

    Review: Record Shares of Voters Turned Out for 2020 election

    January 11, 2021

    EU: ‘Addiction’ to Social Media Causing Conspiracy Theories

    January 11, 2021

    World’s Most Advanced Oil Rig Commissioned at ONGC Well

    January 11, 2021

    Melbourne: All Refugees Held in Hotel Detention to be Released

    January 11, 2021
    Latest Posts

    Queen Elizabeth the Last! Monarchy Faces Fresh Demand to be Axed

    January 20, 2021

    Review: Russia’s Putin Sets Out Conditions for Peace Talks with Ukraine

    January 20, 2021

    Review: Implications of San Francisco Govts’ Green-Light Nation’s First City-Run Public Bank

    January 20, 2021
    Advertisement
    Demo
    Editors Picks

    WW1 toxic compound sprayed on Georgian protesters, BBC evidence suggests

    November 30, 2025

    Ukraine talks ‘productive’ but more work needed, Rubio says

    November 30, 2025

    Pope Leo finds his voice on first foreign trip

    November 30, 2025

    ‘Every step a struggle:’ Nigerian woman with disabilities leads push for dignity and inclusion

    November 30, 2025
    Latest Posts

    Queen Elizabeth the Last! Monarchy Faces Fresh Demand to be Axed

    January 20, 2021

    Review: Russia’s Putin Sets Out Conditions for Peace Talks with Ukraine

    January 20, 2021

    Review: Implications of San Francisco Govts’ Green-Light Nation’s First City-Run Public Bank

    January 20, 2021
    Advertisement
    Demo
    Facebook X (Twitter) Pinterest Vimeo WhatsApp TikTok Instagram

    News

    • World
    • US Politics
    • EU Politics
    • Business
    • Opinions
    • Connections
    • Science

    Company

    • Information
    • Advertising
    • Classified Ads
    • Contact Info
    • Do Not Sell Data
    • GDPR Policy
    • Media Kits

    Services

    • Subscriptions
    • Customer Support
    • Bulk Packages
    • Newsletters
    • Sponsored News
    • Work With Us

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2025 The Politics Designed by The Politics.
    • Privacy Policy
    • Terms
    • Accessibility

    Type above and press Enter to search. Press Esc to cancel.