Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Saucony Ride 18 Review: A Durable All-Nounder Shoe

    August 5, 2025

    Justin Sun Tron returns to Earth with cosmic plans for ecosystem

    August 5, 2025

    Qwen-Image is a powerful, open source new AI image generator

    August 5, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Massive data breech for Google, Microsoft, Facebook, and more exposes 184 million passwords
    Security

    Massive data breech for Google, Microsoft, Facebook, and more exposes 184 million passwords

    PineapplesUpdateBy PineapplesUpdateMay 23, 2025No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Massive data breech for Google, Microsoft, Facebook, and more exposes 184 million passwords
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Massive data breech for Google, Microsoft, Facebook, and more exposes 184 million passwords

    Jusun/Getty Images

    Nevertheless, another data breech has highlighted the password and other sensitive information – but it is a whopper.

    Cyber ​​security researcher Jeremiah Fouler Revealed its discovery of a large -scale online database with more than 184 million unique account in Credentials, A Thursday published reportAlong with others, including Google, Microsoft, Apple, Facebook, Instagram, and Snapchat, the user names, passwords, emails and URLs for a host of applications and websites were stored in a file. The database also included credentials for banks and financial accounts, health platforms and government portals.

    Also: Best Password Manager of 2025: Expert Testing

    Problem? The file was unknown. No password security. No security. A plain text file with only millions of sensitive data.

    Based on their analysis, the fauler determined that the data was captured by any infestaler malware. A popular device used by the cyber criminal, an infoseller is designed to grab user names, passwords and other sensitive data from violated sites and servers. Once criminals get their hand on data, they can use it to launch their attacks or pay information on the dark web.

    After finding the database, Fauler approached the hosting provider, which removed it from public reach. Since the provider would not disclose the name of the owner of the file, Fauler said he did not know if the database was legitimately created and then accidentally or deliberately used for malicious reasons.

    To examine the validity of the information, the fauler emailed several people listed in the file and told them that he was researching a data breech. Many persons confirmed that the records included valid account passwords and other data.

    Also: Online overhering? 5 ways it makes you an easy goal for cyber criminal

    Although the person or people behind the database and exposure are clearly guilty of this phenomenon, users also share some responsibility.

    “Many people inadvertently treat free cloud storage like their email accounts and have values ​​of years of sensitive documents, such as tax form, medical records, contracts and passwords, without considering how sensitive they are,” said the fouler. “It can pose a serious security and privacy risk if criminals had access to thousands or millions of email accounts.”

    In his report, the researcher highlighted the types of dangers faced by those whose data has been exposed in such violations.

    • Credential Stuffing Attack – People who use the same password on many accounts open themselves to compromise. Hackers deployed automatic credential stuffing scripts to try different emails and password combinations at thousands of different sites. The same password exposed on a site can be easily exposed to others.

    • Account acquisition – Cyber ​​criminals that get access to user names, passwords and other private data are capable of handling an account. They can steal your identity, do financial fraud, and run other types of scams, not only you but on family, friends and other contacts.

    • Rancemware and Corporate Steering – Fouler said that he discovered several commercial credibility in the leaked data. Attackers can take advantage of this information for stealing business records, starting ransomware attacks and even corporate spying corporate.

    • Attack against state and government agencies – Founder also saw many government accounts in various countries. An attacker equipped with this information can target the state and federal agencies.

    • Fishing and Social Engineering – Leaked emails provide cyber criminal with the history of someone’s interaction and contacts. The information can then be used in a targeted fishing attacks with the account owner along with the account owners they know.

    How can you save your own confidential data from being exposed in a violation? Although there is no correct solution, Fauler shared the following tips in his report:

    1. Change your password every year

    Many people have only one email address that is connected to many accounts, which means they cannot change it easily. But you can change your password at least time -time. Doing so is a good idea if you feel that your old password may have been compromised in a violation.

    2. Use complex and unique password

    Beyond using strong passwords, avoid using the same for many accounts.

    3. Consider a password manager

    A password manager can play a challenging role of creating, storing and implementing a strong and unique password for each account. As Fauler said, there is a risk in using the password manager. If your master password is ever stolen or compromised, a cyber criminal now has the key to unlock all your passwords. But it brings us to the next tip.

    Also: Hackers stole 1password database of this engineer. Could it be with you?

    4. Use multi-factor authentication

    The MFA provides a second level certification, usually through a code, authentic app or safety key. If your password ever dissolves, a cyber criminal cannot reach your account without that code. Ensure that you use MFA on all available accounts, but especially for banks and financial services and password managers.

    5. Check if your credentials are leaked

    Like Hasebeenpwned Will tell you if your email has popped up in any known violations. If yes, make sure that you change the password for the affected accounts.

    6. Monitor the use of your accounts

    Some websites and services will alert you to suspicious login activity and other etipical behavior, just as your credit card company alerts you for potentially suspicious transactions. Take advantage of this facility whenever possible.

    7. Use good safety software

    The correct safety software can detect and eliminate infostealer malware and other known hazards. Be sure to update your software with the latest definitions to defend yourself against the new variants.

    Get top stories of morning with us in your inbox every day Tech to -up newsletter,

    breech data exposes Facebook Google massive Microsoft million passwords
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleHow to verify on blue
    Next Article Emma Grad shared her ‘military operation’ daily routine
    PineapplesUpdate
    • Website

    Related Posts

    Security

    I found a small power bank that charge two devices at a time – for less than $ 25

    August 5, 2025
    Web3

    NASA data suggests that Pluto’s equator has been rolled with methane ice spires

    August 5, 2025
    Security

    Certain bug leaked in proton log fixes the totup secrets

    August 5, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Saucony Ride 18 Review: A Durable All-Nounder Shoe

    August 5, 2025

    Justin Sun Tron returns to Earth with cosmic plans for ecosystem

    August 5, 2025

    Qwen-Image is a powerful, open source new AI image generator

    August 5, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.