News spread early Fridaythat a record-breaking data breach exposed 16 billion passwords to the world,torrid eroticism including user credentials for the likes of Facebook, Google, Apple, and tons of other places. Some commentators were quick to call it the largest password leak in history, and in terms of raw records exposed, that’s mostly, technically true. However, these records did notcome from a single breach — or even a new breach. Instead, they came from many smaller ones.
Data breaches are an unfortunate reality in the digital age, and some of the breaches can be quite large. However, not every release of stolen data is the direct result of a recent cybersecurity breach. As Mashable recently reported in our countdown of the top cybersecurity breaches of 2025, hackers will often compile information from multiple prior hacks and combine them into one massive file. This is becoming a trend in the darker corners of the internet. The end result is more of a “greatest hits” rather than a new, noteworthy hack.
Such is the case here. Per Bleeping Computer, the information contained in the 16 billion records was most likely compiled from a host of prior hacks, compiled, and then released as a single set of data. It was likely circulating for some time before being compiled, and likely came from a combination of breaches, hacks, phishing scams, and malware.
This is backed up by a tweetfrom vx-underground, an educational website that specializes in malware and cybersecurity. “Someone took a bunch of existing leaks, threw it all together, and slapped a NEW stick [sic] on it.”
This Tweet is currently unavailable. It might be loading or has been removed.
However, the existence of all this data in one spot is still rather damaging, as cybercriminals now have access to all of this data in a single spot, potentially making it much easier to concoct more effective phishing scams or engage in identity theft.
The largest single-point data breach in history is still Yahoo’s 2016 breach, when hackers stole data about all three billion of the website’s users.
Mashable is live at VidCon 2025:Check out our VidCon coveragewith your favorite content creators now.
With so many records in one spot — even if some of them are legacy data that is no longer relevant — it’s still probably a good idea to take an audit of your online services to make sure you’re protected. A good place to start is Have I Been Pwned, a website dedicated to showing data breaches. Simply go there, enter your email address(es), and the site will show you which credentials have been exposed to the public.
We recommend changing those credentials immediately if you haven’t already, and using a strong password when you do so, as they are more difficult to crack. After that, you’ll want to enable multi-factor authenticationon every account you possibly can, as the added layer helps keep criminals from stealing your life if they obtain your password. That should be the bare minimum, but there are plenty of other steps you can taketo keep yourself safe online as well.
Have a story to share about a scam or security breach that impacted you? Tell us about it. Email [email protected]with the subject line "Safety Net" or use this form.Someone from Mashable will get in touch.
Topics Cybersecurity
Corrections and Test Questions: Happy Monday by Sadie SteinJournalist's gobsmacked reactions during Trump interview are Twitter's tooShould I get back with my ex? Relationship experts respondHemingway Hotels, Customized Austen, Literary Shame by Sadie SteinSave up to 50% on select items during Petco’s Summer Playcation Event'Quordle' today: See each 'Quordle' answer and hints for May 13Jack London Advises; Baboons “Read” by Sadie SteinVote for TPR in the Final! by Sadie SteinMusic of the Heart? by Sadie SteinAmericans woke to 'demon sperm' trending on TwitterTikTok rap captures the UK's entire mood right now‘Yellowjackets’ episode 7: What does the morse code in Misty’s dream sequence mean?TikTok says it's not going anywhere after Trump promised a ban'BlackBerry' review: Comedy is sparked from true tech tragedyVote for TPR in the Final! by Sadie SteinHow to watch MLB out of network games: the best streaming and VPN deals for blacked out gamesThurber Insults and Library Dreams by Sadie SteinCleavage sex: what is it and how do you do it?Pig butchering romance scam: One victim out $450,000Pulitzers, Saints, and Camera Obscura! by Sadie Stein PlayStation 5 showcase reveals a bunch of exciting new game trailers This tiny battery could change the game for micro robots Meet the living, walking meme of conservative British politics 4 reasons I almost accepted your LinkedIn request, but didn't These six tweetstorms defined Trump's first six months as president How to avoid bad habits with your kid’s gaming and screen time Top surfer attacked by shark 2 years ago has a close call in the exact same spot Intense videos show Hurricane Sally hit the Gulf Coast hard The White House tried to make MAGAnomics a thing. It went as well as you’d expect. Netflix's 'The Devil All the Time' is an overheated mess: Movie review Screen time advice: When to schedule it and how much to allow Google Doodle honors civil rights pioneer Felicitas Mendez for Hispanic Heritage Month LG teases a slide Oculus will stop selling its PC 'SNL' prepares for fall audiences, casts Jim Carrey as Joe Biden Reporters have lots to say about Sean Spicer's resignation 'Challenger: The Final Flight' Review: Docuseries is touching We're about to run out of hurricane names in 2020 Halle Berry chugs an entire freaking glass of whiskey at Comic 'Card v Card' is a game where you race to spend someone else's money
3.0582s , 8288.8828125 kb
Copyright © 2025 Powered by 【torrid eroticism】,Exquisite Information Network