this post was submitted on 09 Nov 2025
489 points (96.7% liked)

Technology

77950 readers
2652 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Use the "passwords" feature to check if one of yours is compromised. If it shows up, never ever reuse those credentials. They'll be baked into thousands of botnets etc. and be forevermore part of automated break-in attempts until one randomly succeeds.

(page 2) 50 comments
sorted by: hot top controversial new old
[–] DamnianWayne@lemmy.world 7 points 1 month ago (2 children)

This is why my password is hunter2, no one can see what is says under the asterix,

load more comments (2 replies)
[–] anas@lemmy.world 4 points 1 month ago* (last edited 1 month ago)

Apparently my email was included in this breach, but none of the passwords I used with it were (before I started using randomly generated ones).

[–] Bwaz@lemmy.world 4 points 1 month ago (2 children)

Possibly related question. Layely I've been getting email 'replies' from various businesses and services (all over the country, USA) all about an 'inquiry' that I never made. Apparently someone just got my email address and is using that for -- what ? A couple questions:

** What is that someone up to, why doing that?

** Should I do something about that?

** What could I do? Don't want to change email address.

load more comments (2 replies)
[–] thatradomguy@lemmy.world 4 points 1 month ago (3 children)

Are we supposed to pronounce the two "data"s differently when reading aloud? Asking for a friend...

[–] Rooster326@programming.dev 4 points 1 month ago (1 children)

One is like data from Ten Forward.

load more comments (1 replies)
load more comments (2 replies)
[–] neidu3@sh.itjust.works 3 points 1 month ago (1 children)

Is there any info regarding how old this data is?

[–] renrenPDX@lemmy.dbzer0.com 5 points 1 month ago

The breach occurred in April 2025.

During 2025, the threat-intelligence firm Synthient aggregated 2 billion unique email addresses disclosed in credential-stuffing lists found across multiple malicious internet sources. Comprised of email addresses and passwords from previous data breaches, these lists are used by attackers to compromise other, unrelated accounts of victims who have reused their passwords. The data also included 1.3 billion unique passwords, which are now searchable in Pwned Passwords. Working to turn breached data into awareness, Synthient partnered with HIBP to help victims of cybercrime understand their exposure.

This was added to Have I Been Pwned on Nov 6

load more comments
view more: ‹ prev next ›