
In a startling revelation, security experts have identified what may be one of the largest data breaches ever recorded, revealing over 16 billion compromised login credentials, including those linked to Apple accounts. According to a report by Cybernews, this extensive cache of data grants cybercriminals alarming access to personal information, which could facilitate identity theft, account takeovers, and highly targeted phishing campaigns. The discovery follows a report by Wired in May about a 'mysterious database' containing around 184 million unprotected records sitting on a web server. Researchers now believe that this database is only a fraction of a much larger problem. They have revealed the existence of 30 datasets, each potentially housing up to 3.5 billion records, encompassing logins for social media, VPNs, and various corporate and developer platforms. Cybersecurity experts emphasize that this is not merely a data leak; it represents a 'blueprint for mass exploitation.' They highlight the alarming freshness and organized nature of these datasets, indicating that they are not remnants of older breaches but rather new, weaponizable intelligence. The leaked information grants access to numerous online services, including major platforms like Apple, Facebook, Google, and GitHub, as well as various government services. This scale of credential exposure is likely to fuel a surge in phishing schemes, account hijackings, and business email compromise (BEC) attacks. The datasets were reportedly well-organized, with URLs, usernames, and passwords indexed for easy access. Notably, one dataset, which contains more than 455 million records, is believed to have links to the Russian Federation, while another, with over 60 million records, is associated with Telegram. The report also indicates that many of these datasets were 'temporarily accessible' through unsecured storage instances. As a precaution, cybersecurity professionals strongly recommend enabling two-factor authentication (2FA) for added security, which combines a password with a secondary verification method such as an authenticator app or a phone call. Additionally, users are urged to avoid recycling old passwords, especially for social media and financial transactions, and consider deleting any unused accounts to enhance their security posture.
In a remarkable turnaround, India's personal computer market achieved its highest performance on record in 2025, eclipsi...
TechCrunch | Mar 06, 2026, 18:20
On September 26, 2022, NASA's Double Asteroid Redirection Test (DART) spacecraft made history by colliding with a binary...
Ars Technica | Mar 06, 2026, 19:05
In a recent announcement, Google has confirmed its intention to continue providing access to Anthropic's artificial inte...
CNBC | Mar 06, 2026, 18:40
In a landscape marked by skepticism towards public health figures, Anthony Fauci, the renowned infectious disease expert...
Ars Technica | Mar 06, 2026, 17:20
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a directive for federal agencies to address three...
Ars Technica | Mar 06, 2026, 19:45