Beyond Passwords: Inside the Largest Credential Leak in History

Beyond Passwords: Inside the Largest Credential Leak in History

Aug 04

Olivia Debroy
Olivia DebroyOlivia Debroy loves to craft impactful narratives at the intersection of journalism, data, and digital media, leveraging her expertise to tell stories that inform, engage, and inspire. She has reported for leading Indian publications such as The Hindu and Deccan Herald and is currently pursuing her Master’s in Journalism and Mass Communication with a minor in AI & Data Journalism at St. Joseph’s University, Bangalore, where she continues to sharpen her storytelling craft with a focus on data, innovation, and media strategy.
View Profile

If you thought your password was safe because it had a dollar sign and an exclamation point, think again. In June 2024, the world witnessed the digital equivalent of a data apocalypse: the leak of 16 billion passwords, a breach so massive it made previous record-holders like RockYou2021 (with a “mere” 9.9 billion) look like amateur hour.

16 Billion Reasons to Rethink Your Login

It started, as many digital shocks do, with a routine scan of the cyber underground by threat intelligence researchers. But what they stumbled on in June 2024 wasn’t routine at all- it was the largest credential dump in history: 16 billion unique password and email combinations, scraped and seeping through hacking forums and dark web marketplaces like floodwater through a sieve.

The file, innocuously named “rockyou2024.txt” in a dark web data marketplace, first raised eyebrows because of its sheer size, dwarfing all previous breaches with credentials scraped from over a decade of global hacks, infostealer campaigns, and neglected databases. Security researchers knew something was different when they probed the dataset and found not just old, recycled passwords, but millions of fresh logins- Google, Apple, Facebook, services big and small- all with URLs attached, making every record a plug-and-play weapon for credential stuffing or targeted attacks.

Unlike typical “combo lists” or cracked hash dumps, this breach’s magnitude and organization revealed a grim new normal. Many of the credentials were siphoned off by modern infostealer malware, which had quietly infected millions of computers worldwide. As digital detectives pieced together the story, it became clear these weren’t just leftovers from headline-making hacks of yesteryear- this was a decade-plus of credential theft, leaked and packaged in one enormous, easy-to-abuse bundle.

Inside the Credential Theft Machine: How Hackers Industrialized Your Password

The scale of this breach is the result of a perfect storm of factors. Over the past decade, credential theft has shifted from isolated hacks to industrialized operations powered by infostealer malware. These malicious programs, often sold as monthly subscriptions on the dark web, quietly harvest passwords, cookies, and authentication tokens from infected devices. The data is then packaged, organized, and sold or leaked in bulk- sometimes by the original thieves, sometimes by other criminals looking to make a name for themselves.

This particular breach aggregated data from at least 30 major leaks and infostealer logs, many of which had never been reported before. Unlike previous dumps that recycled old, stale credentials, this leak included fresh, weaponizable intelligence- complete with URLs for instant credential stuffing attacks.

The Damage Report: What 16 Billion Leaked Credentials Actually Contained

Below is a table summarizing the 10 largest or most notable datasets involved in the 16 billion password leak, including their scale, likely sources, and types of data/services affected. This breakdown is based on available research and reporting, as the datasets were often generically named and sometimes only partially described in public sources.

Dataset Name/LabelEstimated RecordsMain Sources/Platforms CoveredData Contents & Notes
Portuguese-speaking Dataset3.5+ billionMultiple, focus on Portuguese-speaking usersUsernames, passwords, URLs; covers social, email, corporate, and government services
Russian Federation Dataset455 millionRussian platforms, possibly .ru domainsUsernames, passwords, URLs; likely includes local social, email, gov, and corporate accounts
Telegram Dataset60 millionTelegramUsernames, passwords, URLs; focused on Telegram accounts
“Logins” (Generic)550 million avg*Multiple (Google, Apple, Facebook, GitHub, etc.)Usernames, passwords, URLs; generic naming, covers broad range of services
“Credentials” (Generic)550 million avg*MultipleUsernames, passwords, URLs; similar to above, likely overlaps
Malware-named Dataset16+ millionLinked to specific infostealer malwareUsernames, passwords, URLs; smaller, but focused on malware logs
May 2025 “Mysterious DB”184 millionUnknownUsernames, passwords, URLs; only previously reported dataset
Developer Portals DatasetUnknown (large)GitHub, other developer platformsUsernames, passwords, URLs; developer accounts and possibly code repo access
Corporate Platforms DatasetUnknown (large)Corporate portals, VPNsUsernames, passwords, URLs; business and enterprise accounts
Government Services DatasetUnknown (large)Government portals (global)Usernames, passwords, URLs; access to gov services, potentially highly sensitive

* Average size for generically named datasets; actual sizes ranged from tens of millions to billions of records.

What We Learned from the Leak: 6 Takeaways That Should Keep You Up at Night

  • Sources: The overwhelming majority of data comes from infostealer malware logs, with additional contributions from credential stuffing sets and repackaged leaks.
  • Contents: Most records are structured as URL + username + password, sometimes with tokens, cookies, or metadata, making them immediately useful for attacks.
  • Platforms: All major platforms are represented- Google, Apple, Facebook, Telegram, GitHub, corporate portals, and government services.
  • Overlap: There is significant duplication and overlap between datasets, making exact victim counts impossible to determine.
  • Exposure: Datasets were briefly exposed via unsecured Elasticsearch and object storage instances, then quickly taken down.

How the Hackers Pulled It Off: Data Leaks, Infostealers & a Whole Lot of Malware

Present in the vast and often shadowy world of Cybercrime, Data Leaks and InfoStealers are among the biggest headaches for individuals and organizations alike.

Data leaks happen when huge troves of sensitive information- like usernames, passwords, and personal details- are exposed to the public, often through breaches of websites or services. Imagine someone accidentally leaving the keys to your digital house out in the open for anyone to find.

On the other hand, infostealer campaigns are like the digital pickpockets of the cybercrime world. These operations use specialized malware- called infostealers- that sneak into your computer or device and quietly swipe everything from your login credentials and financial info to browser cookies and even crypto-wallet keys. What makes infostealer campaigns particularly dangerous is their business model: Malware-as-a-Service (MaaS). This means even criminals without deep technical skills can rent or buy these tools on underground forums, complete with dashboards and support, to launch their own attacks.

These campaigns spread their malware through phishing emails, malicious ads, fake software updates, and even pirated software. Once inside, the malware collects valuable data that’s then sold or traded on dark web marketplaces, fueling a vast underground economy. The result? Everything from identity theft and financial fraud to ransomware attacks and corporate espionage can be traced back to these two threats working hand-in-hand.

But the damage didn’t just end with data being stolen and sold. The sheer scale and organization of the breach sent shockwaves through governments and regulatory bodies around the world. Suddenly, it wasn’t just a cybersecurity issue- it was a legal and policy crisis. If cybercriminals could operate this efficiently, what did that say about our laws, our enforcement, and our preparedness?

The scale of the breach has forced lawmakers and regulators worldwide to confront the inadequacy of current data protection and cybersecurity laws. In the European Union, the General Data Protection Regulation (GDPR) already mandates prompt notification of data breaches and imposes heavy penalties for failing to protect personal data. After the 2024 breach, EU regulators began pushing for even stricter requirements, including mandatory multi-factor authentication (MFA) for critical services and regular credential audits.

In the United States, the Federal Trade Commission (FTC) and state attorneys general have ramped up enforcement actions against companies that fail to secure user credentials. New proposals in Congress aim to add explicit requirements for passwordless authentication and zero-trust architectures for government contractors and critical infrastructure providers.

Globally, governments are moving toward harmonized standards that require organizations to implement layered security, regular penetration testing, and automated credential exposure monitoring. Insurers are also tightening requirements for cyber insurance coverage, making MFA and credential hygiene non-negotiable for policyholders.

The Dark Web Bazaar: How Stolen Credentials Are Bought, Sold, and Weaponized

What happens to your stolen credentials? They enter a global black market where more than 24 billion username-password combos are up for grabs. Fresh logins fetch top dollar, while older ones are bundled and sold at a discount. Corporate, financial, and government credentials are the caviar of this ecosystem.

These credentials aren’t just used for logging into your old Myspace account. They’re the entry point for credential stuffing attacks, where bots try stolen logins across hundreds of sites, exploiting the fact that 81% of people reuse passwords. Even with a “low” 2% success rate, a million stolen logins means 20,000 compromised accounts.

And it gets worse: these credentials are the keys to multi-stage attacks- ransomware, lateral movement, privilege escalation, and business email compromise. The Snowflake campaign showed how credentials from just six infostealer strains led to breaches of 165 customer environments, exposing hundreds of millions of records.

Passwords are Dead and We Have Killed Them

The 16 billion password leak is proof that password-only authentication is not just outdated- it’s a liability. Thirty percent of internet users have experienced breaches due to weak passwords, and over 60% of all breaches involve compromised credentials.

Password reuse is the gift that keeps on giving- to cybercriminals. Two-thirds of Americans use the same password on multiple sites, and 13% use the same password everywhere. AI-powered attackers now use neural networks to guess password variations, cracking 16% of accounts in under a thousand guesses if they know just one of your passwords.

Automated credential testing is so fast and widespread that, for many organizations, compromise is a statistical certainty if they rely on passwords alone.

Multi-Factor Authentication: Not Optional, But Essential

Multi-factor authentication (MFA) isn’t just a best practice- it’s the only thing standing between you and the credential apocalypse. MFA can reduce successful account takeovers by up to 99.9% compared to password-only logins.

Modern MFA is more than SMS codes. Adaptive systems now adjust verification based on risk: if you’re logging in from a new device or location, you’ll face extra hurdles. The best setups are going passwordless with biometrics, hardware keys, and cryptographic certificates- making phishing and credential theft nearly impossible.

Zero Trust, Full Protection: Why Paranoia Pays Off

MFA is now a cornerstone of Zero Trust Architecture, which means “never trust, always verify.” Every access request is checked, every time, with dynamic policies that can adapt in real time. Layered security (defense-in-depth) is the new normal: firewalls, intrusion detection, endpoint protection, encryption, and user training all work together to make life miserable for attackers.

AI and machine learning are now essential, analyzing massive volumes of data to spot subtle signs of compromise that humans might miss. Security is no longer a static checklist- it’s a living, breathing system that adapts as fast as attackers do.

Don’t Panic- Protect: The Six Step Credential Defense Plan

  • Audit your credential exposure: Use automated tools to scan for leaked credentials tied to your organization
  • Deploy MFA everywhere: Start with high-risk accounts and roll out organization-wide, with user training and support
  • Go passwordless where possible: Use biometrics, hardware keys, and cryptographic authentication for sensitive systems
  • Embrace Zero Trust: Continuously verify every access request, using risk-based policies and adaptive authentication
  • Layer your defenses: Integrate network, endpoint, and identity security, with AI-driven threat detection
  • Continuously monitor and improve: Regularly review your security posture, run penetration tests, and stay up to date on emerging threats

Future-Proofing Authentication: Smarter, Safer, and Password-Free

The passwordless authentication market is exploding, projected to reach $55.7 billion by 2030 as organizations finally realize that passwords are the weakest link. Regulatory compliance is pushing MFA and Zero Trust adoption, with governments and insurers demanding higher standards than ever before.

AI will soon be everywhere in authentication, dynamically adjusting security based on behavior, device, and context. The organizations that embrace this evolution will survive the credential apocalypse. The rest? Well, they’ll be starring in the next “world’s largest password leak” headline.

Here’s the bottom line: if you’re still relying on passwords alone, you’re not just behind the curve- you’re the curve that attackers are targeting. Credential security isn’t about making your password “strong”- it’s about making your authentication strategy smarter, layered, and impossible to break with a single leak. Welcome to the new normal.

Share

Build Phishing Resilience With OutThink

Related Articles
Slid into my DMs: The rise of AI Phishing Influencers
Olivia Debroy
18/08/2025

Slid into my DMs: The rise of AI Phishing Influencers

Read More about AI-Native Cybersecurity Human Risk Management
Beyond Passwords: Inside the Largest Credential Leak in History
Olivia Debroy
04/08/2025

Beyond Passwords: Inside the Largest Credential Leak in History

Read More about AI-Native Cybersecurity Human Risk Management
Practical Guide to COM-B
Andy Wood
25/07/2025

Practical Guide to COM-B

Read More about AI-Native Cybersecurity Human Risk Management
Building the Foundation: The Crucial Role of Security Culture in Today's Organizations
Andy Wood
18/07/2025

Building the Foundation: The Crucial Role of Security Culture in Today's Organizations

Read More about AI-Native Cybersecurity Human Risk Management
How to Build and Sustain a Successful Security Champions Program
Andy Wood
11/07/2025

How to Build and Sustain a Successful Security Champions Program

Read More about AI-Native Cybersecurity Human Risk Management
It’s Time to Make Peace With Imperfection in Cybersecurity Human Risk Management
Thea Mannix
27/06/2025

It’s Time to Make Peace With Imperfection in Cybersecurity Human Risk Management

Read More about AI-Native Cybersecurity Human Risk Management
Why I Refused to Say “People Are the Weakest Link in Cyber”
Jane Frankland
26/06/2025

Why I Refused to Say “People Are the Weakest Link in Cyber”

Read More about AI-Native Cybersecurity Human Risk Management
Can Your People Outthink a Deepfake?
Olivia Debroy
19/06/2025

Can Your People Outthink a Deepfake?

Read More about AI-Native Cybersecurity Human Risk Management
Trusting HTTPS Could Be Your Biggest Mistake - Here’s Why
Olivia Debroy
16/06/2025

Trusting HTTPS Could Be Your Biggest Mistake - Here’s Why

Read More about AI-Native Cybersecurity Human Risk Management
The Human Risk Behind Scareware Attacks
Olivia Debroy
13/06/2025

The Human Risk Behind Scareware Attacks

Read More about AI-Native Cybersecurity Human Risk Management
Why Whaling Attacks Are the Caviar of Cybercrime
Olivia Debroy
10/06/2025

Why Whaling Attacks Are the Caviar of Cybercrime

Read More about AI-Native Cybersecurity Human Risk Management
Biometrics Are Here: Are We Ready for the Human Risks?
Olivia Debroy
06/06/2025

Biometrics Are Here: Are We Ready for the Human Risks?

Read More about AI-Native Cybersecurity Human Risk Management
I’m a Human Risk Manager (I Think?)
John Scott
03/06/2025

I’m a Human Risk Manager (I Think?)

Read More about AI-Native Cybersecurity Human Risk Management
How Microsoft’s ‘Passwordless by Default’ Might Save Security
Olivia Debroy
28/05/2025

How Microsoft’s ‘Passwordless by Default’ Might Save Security

Read More about AI-Native Cybersecurity Human Risk Management
The Cyber Risk Within: Insider Threats
Olivia Debroy
26/05/2025

The Cyber Risk Within: Insider Threats

Read More about AI-Native Cybersecurity Human Risk Management
What Is ‘Human Risk’ in Cyber?
Olivia Debroy
22/05/2025

What Is ‘Human Risk’ in Cyber?

Read More about AI-Native Cybersecurity Human Risk Management
What if Agentic AI Could Stop Human Risks Before They Happen?
Olivia Debroy
19/05/2025

What if Agentic AI Could Stop Human Risks Before They Happen?

Read More about AI-Native Cybersecurity Human Risk Management
How to Run a Cybersecurity Awareness Training Program in Academia
Ravi Miranda
15/05/2025

How to Run a Cybersecurity Awareness Training Program in Academia

Read More about AI-Native Cybersecurity Human Risk Management
Phishing in 2025: Cybercriminals Are Smarter Than You Know
Olivia Debroy
14/05/2025

Phishing in 2025: Cybercriminals Are Smarter Than You Know

Read More about AI-Native Cybersecurity Human Risk Management
Why Cybersecurity Human Risk Management Benefits CISOs
Gry Evita Sivertsen
29/04/2025

Why Cybersecurity Human Risk Management Benefits CISOs

Read More about AI-Native Cybersecurity Human Risk Management
The Strategic Role of Adaptive Security Awareness Training Content
Roberto Ishmael Pennino
21/04/2025

The Strategic Role of Adaptive Security Awareness Training Content

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity's Comfort Zone Problem
Jane Frankland
15/04/2025

Cybersecurity's Comfort Zone Problem

Read More about AI-Native Cybersecurity Human Risk Management
Turning Employees into Payment Security Champions: Your Guide to Free PCI Awareness Training
Roberto Ishmael Pennino
11/04/2025

Turning Employees into Payment Security Champions: Your Guide to Free PCI Awareness Training

Read More about AI-Native Cybersecurity Human Risk Management
AI Phishing: The Rising Threat of Intelligent Cyber Deception
Roberto Ishmael Pennino
02/04/2025

AI Phishing: The Rising Threat of Intelligent Cyber Deception

Read More about AI-Native Cybersecurity Human Risk Management
What Maslow’s Hierarchy of Needs Reveals About Cybersecurity Flaws
Jane Frankland
01/04/2025

What Maslow’s Hierarchy of Needs Reveals About Cybersecurity Flaws

Read More about AI-Native Cybersecurity Human Risk Management
Smishing: The Phishing Attack That Lives in Your Pocket
Roberto Ishmael Pennino
24/03/2025

Smishing: The Phishing Attack That Lives in Your Pocket

Read More about AI-Native Cybersecurity Human Risk Management
How Adaptive Security Awareness Training Drives Better Cybersecurity Outcomes: The Science
Rory Attwood
11/03/2025

How Adaptive Security Awareness Training Drives Better Cybersecurity Outcomes: The Science

Read More about AI-Native Cybersecurity Human Risk Management
Quishing: When QR Codes Become Cyber Traps - Your Essential Guide to Protection
Roberto Ishmael Pennino
10/03/2025

Quishing: When QR Codes Become Cyber Traps - Your Essential Guide to Protection

Read More about AI-Native Cybersecurity Human Risk Management
Domain Spoofing: The Cyber Trick You Can’t Afford to Ignore
Roberto Ishmael Pennino
10/03/2025

Domain Spoofing: The Cyber Trick You Can’t Afford to Ignore

Read More about AI-Native Cybersecurity Human Risk Management
PIPEDA Compliance: Why PIPEDA Training is Important
Roberto Ishmael Pennino
21/02/2025

PIPEDA Compliance: Why PIPEDA Training is Important

Read More about AI-Native Cybersecurity Human Risk Management
CCPA Training: Building a Culture of Privacy and Compliance
Roberto Ishmael Pennino
10/02/2025

CCPA Training: Building a Culture of Privacy and Compliance

Read More about AI-Native Cybersecurity Human Risk Management
Data Privacy Week: How Convention 108 Paved the Way for Modern Privacy Laws
Roberto Ishmael Pennino
31/01/2025

Data Privacy Week: How Convention 108 Paved the Way for Modern Privacy Laws

Read More about AI-Native Cybersecurity Human Risk Management
TISAX Training: Strengthening Automotive Information Security and Compliance
Roberto Ishmael Pennino
27/01/2025

TISAX Training: Strengthening Automotive Information Security and Compliance

Read More about AI-Native Cybersecurity Human Risk Management
GDPR Training: Building a Culture of Compliance
Roberto Ishmael Pennino
20/01/2025

GDPR Training: Building a Culture of Compliance

Read More about AI-Native Cybersecurity Human Risk Management
What Is DORA? DORA Training for Compliance
Dr. Charlotte Jupp
20/01/2025

What Is DORA? DORA Training for Compliance

Read More about AI-Native Cybersecurity Human Risk Management
Risk Quantification for Cybersecurity Human Risk Management
Lev Lesokhin
13/12/2024

Risk Quantification for Cybersecurity Human Risk Management

Read More about AI-Native Cybersecurity Human Risk Management
Adaptive SAT: The Future Is Now
Roberto Ishmael Pennino
12/11/2024

Adaptive SAT: The Future Is Now

Read More about AI-Native Cybersecurity Human Risk Management
NIST Recommends New Guidelines for Password Security
Roberto Ishmael Pennino
11/11/2024

NIST Recommends New Guidelines for Password Security

Read More about AI-Native Cybersecurity Human Risk Management
Empowering Organizations with Adaptive Security Awareness Training
Roberto Ishmael Pennino
07/11/2024

Empowering Organizations with Adaptive Security Awareness Training

Read More about AI-Native Cybersecurity Human Risk Management
Why Humans Should Be the New Frontline in Cyber Defense
Roberto Ishmael Pennino
06/11/2024

Why Humans Should Be the New Frontline in Cyber Defense

Read More about AI-Native Cybersecurity Human Risk Management
Behavioral Analytics Are Changing Cybersecurity
Roberto Ishmael Pennino
04/11/2024

Behavioral Analytics Are Changing Cybersecurity

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity Awareness Month 2024: Your Security Journey Doesn't End Here
Roberto Ishmael Pennino
01/11/2024

Cybersecurity Awareness Month 2024: Your Security Journey Doesn't End Here

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity Awareness Training for Remote Workforces
Roberto Ishmael Pennino
25/10/2024

Cybersecurity Awareness Training for Remote Workforces

Read More about AI-Native Cybersecurity Human Risk Management
Would You Skip an Update if You Knew What It Could Cost You?
Roberto Ishmael Pennino
24/10/2024

Would You Skip an Update if You Knew What It Could Cost You?

Read More about AI-Native Cybersecurity Human Risk Management
Why Every Cyber Strategy Fails Without This Element
Roberto Ishmael Pennino
22/10/2024

Why Every Cyber Strategy Fails Without This Element

Read More about AI-Native Cybersecurity Human Risk Management
Your Password Isn't Enough: Why Your Digital Life Needs Multifactor Authentication Today
Roberto Ishmael Pennino
21/10/2024

Your Password Isn't Enough: Why Your Digital Life Needs Multifactor Authentication Today

Read More about AI-Native Cybersecurity Human Risk Management
Is Your Cybersecurity Working From Home Too?
Roberto Ishmael Pennino
18/10/2024

Is Your Cybersecurity Working From Home Too?

Read More about AI-Native Cybersecurity Human Risk Management
Human Risk Management Gets Adaptive
Lev Lesokhin
08/10/2024

Human Risk Management Gets Adaptive

Read More about AI-Native Cybersecurity Human Risk Management
Your Cybersecurity Is Only as Strong as Your People
Roberto Ishmael Pennino
08/10/2024

Your Cybersecurity Is Only as Strong as Your People

Read More about AI-Native Cybersecurity Human Risk Management
The Email That Could Cost You Everything: Your Essential Guide to Recognizing Phishing in 2024
Roberto Ishmael Pennino
07/10/2024

The Email That Could Cost You Everything: Your Essential Guide to Recognizing Phishing in 2024

Read More about AI-Native Cybersecurity Human Risk Management
How Ready Is Your Workforce for a Real Phishing Attack?
Roberto Ishmael Pennino
01/10/2024

How Ready Is Your Workforce for a Real Phishing Attack?

Read More about AI-Native Cybersecurity Human Risk Management
What is Cybersecurity Human Risk Management? What You Need to Know
Lev Lesokhin
23/09/2024

What is Cybersecurity Human Risk Management? What You Need to Know

Read More about AI-Native Cybersecurity Human Risk Management
Engagement Strategies for Cybersecurity Human Risk Management
Lev Lesokhin
16/08/2024

Engagement Strategies for Cybersecurity Human Risk Management

Read More about AI-Native Cybersecurity Human Risk Management
Enhance Your Phishing Training With Outthink
Lavinia Manocha
02/08/2024

Enhance Your Phishing Training With Outthink

Read More about AI-Native Cybersecurity Human Risk Management
Adaptive Security Awareness Training for Frontline Workers
Lavinia Manocha
26/07/2024

Adaptive Security Awareness Training for Frontline Workers

Read More about AI-Native Cybersecurity Human Risk Management
The Role of Security Awareness Training After IT Outages
Lev Lesokhin
26/07/2024

The Role of Security Awareness Training After IT Outages

Read More about AI-Native Cybersecurity Human Risk Management
Human Risk Management's Eight Dimensions of Secure Behavior Segmentation
Lev Lesokhin
25/07/2024

Human Risk Management's Eight Dimensions of Secure Behavior Segmentation

Read More about AI-Native Cybersecurity Human Risk Management
State-Sponsored Phishing Attacks Target 40,000 Corporate Users: What This Means for Protecting Your Business
Lev Lesokhin
18/07/2024

State-Sponsored Phishing Attacks Target 40,000 Corporate Users: What This Means for Protecting Your Business

Read More about AI-Native Cybersecurity Human Risk Management
Adaptive Security Awareness Training: Unlearning and Relearning Routines
Lev Lesokhin
10/07/2024

Adaptive Security Awareness Training: Unlearning and Relearning Routines

Read More about AI-Native Cybersecurity Human Risk Management
Did You Think Your Password Was Secure? Let’s Talk Password Security
Lev Lesokhin
24/05/2024

Did You Think Your Password Was Secure? Let’s Talk Password Security

Read More about AI-Native Cybersecurity Human Risk Management
Rethinking Security Awareness: Towards a Cybersecurity Human Risk Management Framework
Lev Lesokhin
23/05/2024

Rethinking Security Awareness: Towards a Cybersecurity Human Risk Management Framework

Read More about AI-Native Cybersecurity Human Risk Management
Password Security: Why the UK is Banning Generic Passwords
Lev Lesokhin
17/05/2024

Password Security: Why the UK is Banning Generic Passwords

Read More about AI-Native Cybersecurity Human Risk Management
Instagram Security Awareness Training: A Step-by-Step Guide
Lev Lesokhin
10/05/2024

Instagram Security Awareness Training: A Step-by-Step Guide

Read More about AI-Native Cybersecurity Human Risk Management
Cybersecurity Human Risk Management Forum Kicks Off in London
Lev Lesokhin
18/04/2024

Cybersecurity Human Risk Management Forum Kicks Off in London

Read More about AI-Native Cybersecurity Human Risk Management
Gamification Can Enhance Security Awareness Training – Badges and Leaderboards Are Just the First Step
Rory Attwood
31/01/2024

Gamification Can Enhance Security Awareness Training – Badges and Leaderboards Are Just the First Step

Read More about AI-Native Cybersecurity Human Risk Management