Image in purple and pink hues of multiple security related icons, plus icons and a person in the background using their smartphone.

16 Billion Passwords Data Breach: Are You at Risk?

The spooky grey area of cybercrime has been an internet blind-spot for many individuals and business alike. In the last twelve years, it has skyrocketed in risk and impact as we migrate our lives into the digital world. After a report released by security researchers on the ‘16 billion passwords data breach’, can we continue like we have always done?

16 billion passwords over various security breaches are the tally from the security research report released in May 2025. Is your password compromised? Do you reuse your password? If unsure, then you are in the right place. Our passwords are the first generation of keys to our digital lives. They also unlock digital intelligence, which others can weaponize against us.

The 16 Billion Passwords Data Breach, and Digital Subversion Collide

Cybersecurity communities are very active regarding the 16 billion passwords data breach, and with good reason. Everyone else seems to be aware from a distance, but may not check their own exposures. I would recommend a great place to start is by checking if your email address is safe from these breaches? You can find out via ‘Have I Been Pwned’.

Also, for your digital life, going into your online accounts and activating multi-factor authentication (e.g. via an Authenticator app on your phone) is a great security addition. It makes life for the hacker more difficult when targeting your account, which today is still a deterrence.

Should they gain access to your account, their follow-on actions will vary depending on who you are, the type of account accessed, etc. One thing that will be consistent is their gathering of data and information about you.

Cover art at 750x750px for the version 2 of From Terror to Valor: Echoes and Shadows, by John A. Mulhall.

From Terror to Valor: Echoes and Shadows, available at your favorite digital bookstore 

This information will be subject to analysis, packaging and reselling by malicious ‘info-brokers’. A top client for these brokers is digital authoritarians, also known as digital subversion specialists.

Digital Subversion Poisons Social Media

We all know of the infamous ‘far-right’ and their shadow rise from nothing into a powerful digital subversionist force. What we often miss is the business driven collusion by social media platforms who don’t publically disclose bot-accounts in these epic followings.

Equally difficult to identify is how leading social media platforms structure their community guidelines to allow ‘free-speech’ to prevail. This is a veiled pretence, which also allows weaponized false narratives to proliferate, and mainly for business reasons. Elon Musk’s embracement of ‘far-right’ ideology, and associated social media activism, is a notable exception.

Data Breach: A Future of Truth or Assertion

Nobody may order anybody to ‘believe’ in something. It’s as base a right as we have in this world. We can, however, take steps to protect ourselves from malicious influence. We must first recognize the potential for others to misuse our digital information. Protecting our private information on digital accounts is thus a priority.

A newer form of increased security for your digital accounts is passkeys. This ties your digital identity to your physical device. If confident that your device is physically and virtually (i.e. good password) secure, then I would recommend moving your login credentials from passwords to passkeys.

Then, you can securely take the disinformation fight back to our digital attackers as you can learn about their tactics, techniques, and practices. Applying the SIFT method to identify disinformation in the digital world also provides insights into what is behind it. For this effort, the positive impact will stretch far beyond any one user session, as we gain in knowledge, knowhow, and confidence regarding our digital lives.

About the Author

As I move onto my next authoring project, I will post less frequently on the real-world issues linked to my novel, From Terror to Valor: Echoes and Shadows. My next project, Hindsight Station, will be a progression science-fiction webnovel, delivered via Patreon and eventually Royal Road.

John is a versatile author known for his gripping fiction narratives in the thriller, action, and sci-fi genres. With a background as a journalist since 2016, and expertise in cloud technologies as an engineer; John brings a unique blend of storytelling prowess and technical acumen to his work.

Community Newsletter

Put your feet up and let us do the hard work for you. Sign up directly for blog news, news related to the theme of John's novels and more.

We’ll never send you spam or share your email address.
Find out more in our Privacy Policy.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
Shield Security