Skip to main content

There wasn’t a headline.

There wasn’t a single company to blame.

But somewhere out there, a file containing nearly 2 billion unique email addresses and 1.3 billion passwords is circulating—compiled from decades of breaches, data dumps, and malware logs.

And if you’ve used email since the 90s, there’s a good chance your data is in it.

Where Did This Data Come From?

Unlike big-name hacks that grab headlines, this data set was quietly indexed and analyzed by security expert Troy Hunt, founder of the site Have I Been Pwned (HIBP).

It’s not the result of one giant breach.

Instead, it’s a massive compilation of stolen and leaked credentials from thousands of breaches, going back decades.

This is important:

  • Some of the data dates back to the 1990s
  • Some came from credential-stealing malware logs
  • Others are from forums, paste sites, and previously leaked lists that have been recompiled

HIBP now includes this new data, making it easier for users to search and see if their email appears.

Why It Matters (Even If You’ve Changed Your Passwords)

Credential leaks don’t expire. Once your email and password combo is out there, it can be reused and repackaged for years.

Attackers use tools to try these old credentials on dozens (even thousands) of sites:

  • This is called credential stuffing, and it works if you reuse passwords
  • They can automate this to test logins across social media, email, bank logins, and more

Worse: once a stolen email/password combo works, they may not stop at one account. They could reset passwords elsewhere, impersonate you, or escalate access inside your business.

So What Should You Do?

Here are some practical steps for individuals and businesses:

1. Check if you’ve been pwned

Go to haveibeenpwned.com and enter your work and personal email addresses. It won’t show your password, but it will list known breaches.

2. Don’t reuse passwords. Ever.

If you still use the same password across multiple accounts, stop. Today. Use a password manager to create unique, strong passwords for every login.

3. Enable Multi-Factor Authentication (MFA)

Wherever it’s available—email, Microsoft 365, banking, business systems—enable MFA. It adds a critical second layer that can block unauthorized access, even with the right password.

4. Use a password manager

For teams and businesses, look into password managers like 1Password or Bitwarden. These tools:

  • Generate strong, unique passwords
  • Auto-fill logins securely
  • Make it easier for staff to do the right thing

5. Audit old accounts and credentials

  • Close accounts you no longer use
  • Remove saved passwords from browsers (they’re easy to steal)
  • Periodically check exposure using tools like HIBP or browser alerts

6. Educate your team

Cybersecurity isn’t just an IT problem. Everyone in your business should understand:

  • What phishing looks like
  • Why password reuse is dangerous
  • How to verify suspicious messages or login attempts

7. Monitor for suspicious logins

Set up alerts in Microsoft, Google, or your security tools to flag logins from new devices, geographies, or at odd hours. It’s a simple way to catch problems early.

What This Doesn’t Mean

  • It doesn’t mean you’ve been hacked.
  • It doesn’t mean your business is compromised.
  • But it does mean your exposure has increased—especially if those credentials are still active somewhere.

Final Thought

Most people don’t hear about these kinds of breaches because they don’t happen all at once.

But they matter more precisely because they are harder to see.

The data doesn’t go away. It just gets reused.

If you want to take credential security seriously—across your team, tools, and client data—we can help.

Let’s talk about building a stronger, simpler defense before the next breach hits your inbox.

Contact us here.