News spread early Fridaythat a record-breaking data breach exposed 16 billion passwords to the world,Ghost Over Flowers (2014) Uncut including user credentials for the likes of Facebook, Google, Apple, and tons of other places. Some commentators were quick to call it the largest password leak in history, and in terms of raw records exposed, that’s mostly, technically true. However, these records did notcome from a single breach — or even a new breach. Instead, they came from many smaller ones.
Data breaches are an unfortunate reality in the digital age, and some of the breaches can be quite large. However, not every release of stolen data is the direct result of a recent cybersecurity breach. As Mashable recently reported in our countdown of the top cybersecurity breaches of 2025, hackers will often compile information from multiple prior hacks and combine them into one massive file. This is becoming a trend in the darker corners of the internet. The end result is more of a “greatest hits” rather than a new, noteworthy hack.
Such is the case here. Per Bleeping Computer, the information contained in the 16 billion records was most likely compiled from a host of prior hacks, compiled, and then released as a single set of data. It was likely circulating for some time before being compiled, and likely came from a combination of breaches, hacks, phishing scams, and malware.
This is backed up by a tweetfrom vx-underground, an educational website that specializes in malware and cybersecurity. “Someone took a bunch of existing leaks, threw it all together, and slapped a NEW stick [sic] on it.”
This Tweet is currently unavailable. It might be loading or has been removed.
However, the existence of all this data in one spot is still rather damaging, as cybercriminals now have access to all of this data in a single spot, potentially making it much easier to concoct more effective phishing scams or engage in identity theft.
The largest single-point data breach in history is still Yahoo’s 2016 breach, when hackers stole data about all three billion of the website’s users.
Mashable is live at VidCon 2025:Check out our VidCon coveragewith your favorite content creators now.
With so many records in one spot — even if some of them are legacy data that is no longer relevant — it’s still probably a good idea to take an audit of your online services to make sure you’re protected. A good place to start is Have I Been Pwned, a website dedicated to showing data breaches. Simply go there, enter your email address(es), and the site will show you which credentials have been exposed to the public.
We recommend changing those credentials immediately if you haven’t already, and using a strong password when you do so, as they are more difficult to crack. After that, you’ll want to enable multi-factor authenticationon every account you possibly can, as the added layer helps keep criminals from stealing your life if they obtain your password. That should be the bare minimum, but there are plenty of other steps you can taketo keep yourself safe online as well.
Have a story to share about a scam or security breach that impacted you? Tell us about it. Email [email protected]with the subject line "Safety Net" or use this form.Someone from Mashable will get in touch.
Topics Cybersecurity
iOS 18 rumored to bring AI to Siri, Messages, Notes in new reportJD to invest $138 million into supporting short video content · TechNodeXiaomi ranks third in Q1 global smartphone shipments · TechNodeI went to a sensual masturbation workshop and the experience blew my mindApple iPad Pro on sale: Save $55 on the 11Tesla announces another big recall. See the models impacted.Trump guilty verdict: Now what, asks the internetIn case you missed it: Bank infoThe first big U.S. offshore wind farm is a big dealNYT's The Mini crossword answers for May 31Spotify to refund Car Thing purchases — how to get yoursBlizzard Chinese server restores data, takes new reservations · TechNodeUnistellar's eVscope boosts citizen astronomy during COVIDChina’s Chery will reportedly launch a new EV brand this year · TechNodeAlibaba to test rocket package delivery service with China’s startup Space Epoch · TechNodeGet Bose QuietComfort headphones for $100 off at AmazonImposter signs fake agreement on behalf of Li Auto with Uzbekistan dealership · TechNodeVolkswagen, Xpeng expand electric vehicle partnership · TechNodeMeta is using your posts to train AI. It's not easy to opt out.Alibaba to test rocket package delivery service with China’s startup Space Epoch · TechNode Drake and Jennifer Lopez had their own prom and totally kissed Donald Trump thanked someone and you'll never guess who The tiny detail in the 'Stranger Things 3' finale you may have missed Megan Rapinoe calls out Trump: 'Your message is excluding people' Barack Obama and Hillary Clinton are the 'most admired' people in America Google is testing a Play/Pause button for Chrome's toolbar Giant Trump How 'Spider Trump's brilliant cybersecurity solution is to send messages by courier 'Stranger Things' Season 3 moment gets meme'd into sweet oblivion 'Spider 7 ways online dating became more advanced in 2016 Google Pixel 4 XL renders: bump on the back, forehead on the front 'Stranger Things 3' is a zombie story that riffs on internet rage mobs These 10 classic bangers that all turn 10 in 2017 Relive 1997 with 20 songs turning 20 in 2017 How to shop from small businesses on Amazon's Prime Day Washington, D.C. flooding photos and video show a drenched capital India is anxious as PM Modi prepares to address nation on New Year's Eve Why the Spider
0.956s , 8230.453125 kb
Copyright © 2025 Powered by 【Ghost Over Flowers (2014) Uncut】,Pursuit Information Network