If Iran and Israel do stop firing, Trump's high-risk strikes may pay off

Image
  US President Donald Trump took a gamble by inserting the US into the worsening conflict between Israel and Iran, but it may have paid off - at least for now. Trump announced on Monday evening that the two countries had agreed to a ceasefire that he said could lead to a lasting peace. If the American president has in fact ended what he labelled the " 12 Day War ", it would make for a significant step back from the brink of a conflict that seemed on the verge of engulfing the region, along with pulling America further in after US airstrikes hit Iranian nuclear facilities on Saturday. "Provided that the Israeli regime stops its illegal aggression against the Iranian people no later than 4 am Tehran time," Iranian Foreign Minister Abbas Araghchi said in a statement, "we have no intention to continue our response afterwards." The Israeli government later said it agreed to the proposal after "achieving the objectives" of its attacks on Iran. The tw...

Global News

16 Billion Passwords Exposed in Unprecedented Cyber Leak of 2025



Experts Raise Global Alarm Over Digital Security Threat

One of the largest password leaks in internet history has occurred, according to a new shocking report.

Cybernews and Forbes revealed a historic breach involving more than 16 billion stolen login credentials, making it the biggest leak ever reported.
This massive password leak poses a significant risk to global digital security at present.


16 Billion Login Credentials Stolen

The stolen account credentials have allegedly been exposed on the darknet and various illicit online marketplaces.

This substantial breach and its consequences underscore that cybersecurity is not merely a technical issue but a collective obligation.

Cybersecurity researchers discovered that over 16 billion login credentials were recently put up for sale online.
Experts warn that if this trove is not addressed, it could lead to:

  • Phishing attacks

  • Identity theft

  • Account takeovers around the globe

“The breach is more than just a leak—it is a blueprint for mass exploitation,” reported WION.


Highly Structured, New Data Stolen via Info Stealers

The leaked data was extracted by info stealer malware and is new and highly structured, not remnants of old breaches.

According to a Forbes report, researchers believe that several info stealers were behind this enormous password leak.
The investigation began early this year and uncovered alarming patterns.

In today’s digitally dependent world, experts stress:

If a password is compromised, it compromises nearly everything.


Global Response: Google and FBI Issue Warnings

  • Google is urging billions of users to change their passwords and adopt more secure passkeys.

  • The FBI is warning the public to avoid clicking links in SMS messages to reduce the risk of credential theft.

Reports by Merca20 highlight that even a small amount of money can now buy stolen passwords on the dark web.




How Did the Password Leak Happen?

According to Vilius Petkauskas at Cybernews, the leak involved:

  • 30 exposed datasets

  • Each dataset contained tens of millions to over 3.5 billion records

  • Totaling 16 billion compromised records

These credentials are:

  • A prime target for phishing and account takeover attempts

  • Considered new, weaponizable intelligence at scale

  • Not merely recycled from older breaches

Most of the data is organized as a URL, followed by login and password — giving access to nearly any online service, including:

  • Apple

  • Facebook

  • Google

  • GitHub

  • Telegram

  • Government services

This pattern is the standard signature of modern info stealer activity.


What Can You Do to Stay Safe?

Given the broad ramifications of this breach, experts strongly advise:

  • Use password management software

  • Monitor your data via dark web tracking tools

  • Choose strong, unique passwords for each account

  • Enable multi-factor authentication wherever possible

  • Be cautious of phishing emails or suspicious messages

Experts stress that now is the time to take this threat seriously and to:

  • Use a trusted password manager

  • Switch to passkeys wherever feasible


Comments

Popular posts from this blog

Pacers' Tyrese Haliburton Receives Injury Severity Confirmation

Inside the campaign of Zohran Mamdani, the democratic socialist running for mayor of New York City