
More than 184 million passwords exposed in massive data breach — Apple, Google, Microsoft and more
Cybersecurity researcher Jeremiah Fowler has just published a report about his discovery of a massive, unprotected online database of millions of sensitive pieces of data that were stored in a plain text file absent of any password requirement or encryption.
According to ZDNet, the 184 million unique account credentials that Fowler found include usernames, passwords, emails and URLs for apps and websites like Google, Microsoft, Apple, Facebook, Instagram and Snapchat, among others.
Perhaps more concerning were the even more sensitive information in the database – specifically credentials for bank and financial account, health platforms and government portals.
Fowler's analysis determined that this data has been captured by some type of infostealer, meaning the individuals exposed and the accounts involved will be vulnerable to a host of further scams and malicious behavior from threat actors such as phishing attacks.
Fowler has said he doesn't know if this database was legitimately or maliciously created in the first place, because the hosting provider would not disclose the name of the owner, though they have removed it from public access.
Fowler directly contacted people listed in the file, told them he was researching a data breach and confirmed that the information contained in the database was correct, valid account information.
Additionally, he has said that while whomever owns the database is to blame for the incident, users who treat their email accounts like free cloud storage leave themselves open to security and privacy risks by having years worth of sensitive documents such as tax forms, medical records, contracts or passwords readily available to cybercriminals who are able to gain access to their email accounts.
Get instant access to breaking news, the hottest reviews, great deals and helpful tips.
People who are involved in a security breach of this nature are subject to a variety of further threats, especially if they've reused the same password, used weak passwords, or have accounts in a position of government or other importance.
Like Fowler, we recommend that you always use strong, unique passwords that include multiple upper and lower case characters as well as numbers and special characters, that you frequently change and update passwords and that you never reuse passwords. It's often easiest to use a password manager to keep all of your passwords private and safe, or if possible, use a biometric passkey. Whenever possible, enable two-factor or multi-factor authentication on your accounts.
Keep a close eye on all your accounts, and if you feel like you've may have been or know you have been victim to a data breach, check your accounts on sites like HaveIBeenPwned or a password leak checker. You should also make sure that your antivirus software is set to regularly scan your computer; these scans can be set to run automatically when you're asleep or when you're otherwise not using your machine so that you won't be interrupted.
Lastly, know the signs of phishing scams and social engineering attacks so you can watch out for them – you are always the last line of defense when it comes to malware, and threat actors will take all the information they have in order to try and trick you into clicking on a link or downloading an app or software that appears legitimate but is secretly malicious code.
Never click on unexpected links, QR codes or attachments or links or attachments from unknown senders. Verify through independent means if someone contacts you asking you to download or click on something. Don't share personal information with people you don't know online, and clear out your accounts of old emails and photos that contain documents that may contain personal details and information.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
32 minutes ago
- Yahoo
Midjourney's video generator is behind the competition — here's why I love it anyway
When you buy through links on our articles, Future and its syndication partners may earn a commission. While the AI image market is now pretty crowded, Midjourney was one of the first to do it, turning words into images years ago. But since then, the company has fallen behind, being outpaced by a variety of competitors. This was most evident in the development of AI video generation. The technology has blown up in recent months, seeing huge improvements from companies like Google and OpenAI. While Midjourney has been quiet on this front for a long time, it finally launched its first video generator. However, while others push boundaries, competing to offer the most advanced package, Midjourney's first attempt at a video generator was surprisingly limited. There is no ability to prompt for the video, only to add images — either your own or ones you've made with Midjourney. While audio isn't common in video generators yet, it's missing from Midjourney's tool However, despite these limitations, in my time using Midjourney's video generator so far, it has quickly become one of my favorites. Midjourney has always stood out in the world of AI generation for one good reason. Where the likes of ChatGPT and Gemini are designed to create lifelike images and videos, Midjourney is hyper-focused on creativity. Before you even use it, you need to rank hundreds of images, giving the model an idea of your style preferences. These preferences can be turned on or off, but with the personalization on, image and video results are clearly pushed to styles that fit me. While you can't directly prompt for a video, the process is isn't much more complicated. After creating an image on Midjourney, you'll have the option to 'animate' the image. This can be done automatically, allowing the AI to choose what happens in the video, either with low or high motion. Or you can manually choose what happens. This turns Midjourney into a similar version of an AI video generator as the big competitors… just with a few extra steps to get there. You can also upload your own images, turning those into videos. Despite some big concerns around copyright right now, Midjourney has also put a strong emphasis on avoiding deepfakes. It won't edit images of real people and is surprisingly unwilling to create something that might resemble celebrity figures. The video generation from Midjourney is clearly designed for the same group as the image generator. It's built for people wanting to make creative projects or design things that are clearly separate from real life. Scroll through Midjourney's explore page and you'll be greeted by moving comic book strips, anime fights and stylised car chases. Midjourney also seems to have put a lot of work into its prompt understanding. Previously, the model would struggle to create good results without incredibly specific details. Now, it works in a similar way to the likes of ChatGPT, able to create images and videos from short descriptions. From the short time I've used it so far, I've got high hopes for Midjourney's video generator. They have warned that prices could change as they test the model so now is a great time to give it a go. OpenAI court filings just revealed new details on AI device with Jony Ive Google Gemini just got a great video feature ChatGPT can't match — here's how to use it I've been using this one ChatGPT prompt for years — and it works in absolutely any situation
Yahoo
37 minutes ago
- Yahoo
Landmark EU tech rules holding back innovation, Google says
By Foo Yun Chee BRUSSELS (Reuters) -Alphabet's Google will on Tuesday warn EU antitrust regulators and its critics that landmark European Union rules aimed at reining in Big Tech are hampering innovation to the detriment of European users and businesses. The U.S. tech giant will also urge regulators to give more detailed guidance to help it comply with the rules, and ask its critics to provide evidence of costs and benefits to prove their case. Google is under pressure to address charges under the EU's Digital Markets Act that it favours its own services such as Google Shopping, Google Hotels and Google Flights over rivals. The charges may result in fines of as much as 10% of its global annual revenue. Earlier this month, Google proposed more changes to its search results to better showcase rival products, but critics say these still do not ensure a level playing field. "We remain genuinely concerned about real world consequences of the DMA, which are leading to worse online products and experiences for Europeans," Google's lawyer Clare Kelly will tell a workshop organised by the European Commission to give Google critics the opportunity to seek clarifications. She will say changes implemented by Google to date after discussions with the Commission and its critics have resulted in European users paying more for travel tickets as they cannot directly access airline sites, according to a copy of her speech seen by Reuters. Kelly will also say European airlines, hotels and restaurants have reported up to a 30% loss in direct booking traffic, while users have complained about clunky workarounds. Google's other lawyer, Oliver Bethell, will ask regulators to spell out in detail what the company needs to do, and critics to come up with hard evidence. "If we can understand precisely what compliance looks like, not just in theory, but taking account of on the ground experience, we can launch compliant services quickly and confidently across the EEA," he will say. The EEA is the 27 EU countries, Iceland, Liechtenstein and Norway. "We need help identifying the areas where we should focus. That means bringing real evidence of costs and benefits that we can take account of with the Commission," Bethell said. The day-long workshop starts at 0700 GMT. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data


Forbes
41 minutes ago
- Forbes
Google Confirms Emergency Update For All Chrome Users—Attacks Underway
Update now warning for billions of Chrome users. Google has issued an emergency update for Chrome users, after its own Threat Analysis Group discovered and reported an actively exploited vulnerability last week. When a single security fix is rolled out this quickly, it's critical to update immediately. Google warns it is 'aware that an exploit for CVE-2025-6554 exists in the wild,' and that 'access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven't yet fixed.' The high-severity vulnerability is a 'Type Confusion in V8,' Google's Javascript engine, which could allow hackers to remotely execute code on devices. This issue was mitigated 'by a configuration change pushed out to Stable channel across all platforms.' That config change took place a week ago and has been followed by this urgent software update. As usual, it will download to your device. You then need to restart your browser to ensure it installs. All your regular browsing tabs should be restored, but your Incognito private browsing tabs will not, so save any work before you exit Chrome. Attacks exploiting CVE-2025-6554 will come by way of specially crafted HTML pages, and as usual while the assumption is this is very specifically targeted for now, once a vulnerability is in the public domain that can change quickly. Chrome is essentially the default browser on Windows, despite Microsoft's efforts to push Edge more widely. As such, this is primarily a Windows threat. That said, whatever device you're using to run Chrome should be updated today. We saw something similar last month — with another emergency update — which should frame the urgency. The latest update for Windows/ Mac is 138.0.7204.96/.97. We can expect this to prompt a U.S. government update mandate and deadline.