
In June 2025, cybersecurity researchers uncovered a data breached case involving 16 billion stolen credentials from 30 data leaks across major platforms, harvested in 2024 using infostealer malware that silently captured user logins and passwords.
Experts warn this is not the only incident, highlighting a burgeoning trend of breaches where stolen credentials from infected PCs are leaked online. Much of the data originates from infostealers – malware that secretly collects usernames, passwords, and personal information.
“The best defense against hackers is not technology, but awareness,” says James Scott, Senior Fellow, Institute for Critical Infrastructure Technology.
Experts are also pointing out the notice of possible data breach, mixing old and new data, has global, long-term effects. Users are asked to update all sensitive passwords, adopt multi-factor authentication (MFA), and stay vigilant. Tools like “Have I Been Pwned” can be utilized to check whether individuals’ credentials are leaked, though not every new breach is immediately available.
Protect Your Data and Your Zen
The attack also indicates an ominous trend in cybercrime and low password hygiene – industrial-strength deployment of infostealer viruses. The viruses plunder and peddle stolen information into massive black-market stores, which fuel spikes in phishing, identity theft, and fraud.
“There are just two types of companies in the world: those that have been hacked and they know it, and those that have been hacked and don’t know it,” Ted Schlein, an investing cyber security expert, summed up the data breached reality check.
Artificial intelligence is accelerating the velocity and sophistication of cyberattacks. The hackers are using AI to carry out automated attacks and generate very realistic phishing attacks, while the defenders are utilizing AI to track threats and respond in real-time.
Personal Cybersecurity Protection Plans
The offline consequences are dire: data leak monitoring credentials can lead to email, bank, and social media hijacking, fraudulent financial transactions, and irreparable credit score damage. “Cybercrime is the biggest threat to every company on the planet,” says ex-IBM CEO Ginni Rometty.
To protect themselves, users are encouraged to use unique two factor authentication protection, complex passwords, enable MFA ideally via apps or hardware tokens, and be aware of unusual activity. Updating software and reducing digital footprints can also reduce data breached exposure. Cybersecurity experts also recommend deleting unused accounts and setting up fraud alerts with credit bureaus as extra precautions.
Last but not least, as cyber-attacks rise, proactivity is the best protection.
Inside Telecom provides you with an extensive list of content covering all aspects of the tech industry. Keep an eye on our Cybersecurity sections to stay informed and up-to-date with our daily articles.