this post was submitted on 09 Nov 2025
333 points (96.9% liked)

Technology

76672 readers
2278 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Use the "passwords" feature to check if one of yours is compromised. If it shows up, never ever reuse those credentials. They'll be baked into thousands of botnets etc. and be forevermore part of automated break-in attempts until one randomly succeeds.

you are viewing a single comment's thread
view the rest of the comments
[–] Wispy2891@lemmy.world 11 points 7 hours ago (1 children)

Let's make a master list of all the emails leaked with their passwords, what could go wrong?

[–] felixwhynot@lemmy.world 13 points 6 hours ago (1 children)
[–] Wispy2891@lemmy.world 12 points 5 hours ago (3 children)

It's exactly how it worked. A company called synthient made a master list with all the leaked emails + all leaked passwords. Then they were hacked and it leaked

[–] ExLisper@lemmy.curiana.net 8 points 5 hours ago

Someone should make a list of all the leaked credentials that got leaked.

[–] MrScottyTay@sh.itjust.works 5 points 4 hours ago

But then nothing has changed if they were just collating what was already leaked.

[–] ChogChog@lemmy.world 1 points 3 minutes ago

Synthient wasn’t hacked, as a security company, they aggregated tons of stealer logs dumped to social media, Telegram, etc.

They found 8% of the data collected was not in the HIBP database, confirmed with some of the legitimate owners that the data was real.

They then took that research and shared it with HIBP which is the correct thing to do.

I was also thrown off by the title they gave it when I first saw it, a security company being hacked would be a terrible look. but they explain it in the article. Should probably have named it “list aggregation” or something.