Search Blog
Hit enter to search or ESC to close
Trending Now
Kuching remains the most affordable tourist destination in Malaysia
- Get link
- X
- Other Apps
AirAsia wins Platinum in travel category at Putra Brands Awards
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
16 Billion Passwords Leaked: Why Identity is Now Your Real Cyber Shield
Another day, another massive data dump but this one is next level. A mind-blowing 16 billion usernames and passwords were exposed, pulled from past breaches and malware known as infostealers. While it’s not a new breach, this huge data set signals one thing loud and clear: our digital identities are way too easy to steal.
For Malaysian Gen Zs juggling multiple logins and cloud-based everything, this is your wake-up call. Cybercriminals aren’t just hacking systems they’re going after you.
What Actually Happened?
This mega leak wasn’t a sudden cyberattack. It’s the result of years’ worth of:
- Infostealer malware that quietly grabs your login info
- Reused passwords across apps and platforms
- Weak identity protections at the organizational level
These login combos get bundled, sold, and recirculated on dark web forums like digital black market goods. According to Tenable's Bernard Montel, this shows why the internet’s biggest weakness right now is identity-based access.
"Identities are the new perimeter... a master key for cybercriminals," says Montel.
What This Means for You
Here’s why this matters, especially in a mobile-first world:
- Your reused passwords can unlock multiple accounts
- Smart scripts can try these logins on everything from IG to your cloud storage
- Cloud misconfigurations mean businesses may unknowingly leave your data exposed
It’s not just your TikTok getting hijacked. It could be your online banking, your work access, or even your biometric data.
Why Companies Need Identity-First Cybersecurity
This breach highlights a shift: from just protecting devices and networks to protecting who is accessing them. Identity-first cybersecurity means:
- Verifying access permissions continuously
- Detecting credential misuse early
- Limiting over-privileged access that hackers can exploit
Tenable’s research even found hardcoded credentials (yes, literal passwords written into code) in over half of AWS environments. Not ideal.
5 Real Threats This Leak Makes Worse
- Credential stuffing: Bots trying stolen logins on other platforms
- Cloud misconfiguration: Open databases leaking sensitive info
- Overlapping identities: Multiple accounts tied to the same email/password combo
- Invisible assets: Companies losing track of what’s actually online
- AI-powered breaches: Faster and more targeted attacks
What Malaysians Can Do Right Now
- Change passwords regularly (and make them unique)
- Use a password manager
- Turn on 2FA everywhere
- Don’t trust free Wi-Fi for sensitive logins
- Update your apps, outdated software is a hacker’s playground
Why Prevention > Reaction in 2025
We can’t keep playing catch-up. Tenable pushes for exposure management that means:
- Mapping out your full attack surface
- Spotting weak points before hackers do
- Fixing misconfigurations proactively
The goal? Cut off the attack paths before they’re exploited.
You May Also Like
Bank Islam Warns Its User of Scam Tactics on Social Media
- Get link
- X
- Other Apps