{"id":48173,"date":"2022-08-25T12:56:46","date_gmt":"2022-08-25T12:56:46","guid":{"rendered":"http:\/\/600c6036-ceb0-4988-aa07-dd37853e6dde"},"modified":"2022-08-25T12:56:46","modified_gmt":"2022-08-25T12:56:46","slug":"caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/","title":{"rendered":"Caught up in another password breach? Follow these 3 rules to protect yourself online"},"content":{"rendered":"<p>Another day, <a href=\"https:\/\/www.zdnet.com\/article\/plex-breached-change-your-passwords-now\/\" rel=\"follow\">another password breach<\/a>. This time, the compromised website belongs to the Plex media-streaming service, and the advice is predictable: Reset your account password immediately.<\/p>\n<p>Yes, of course you should do that. But don&#8217;t stop there. Every one of these incidents is an opportunity to assess your current online security and tighten it up as needed. The goal is to make sure you&#8217;re at minimal risk when (not if) another, similar data breach occurs. The best way to do that is to follow three ironclad rules:<\/p>\n<ol>\n<li>Always use a long, random password<\/li>\n<li>Never reuse a password<\/li>\n<li>Always turn on 2-factor authentication (2FA), if possible<\/li>\n<\/ol>\n<p>If you followed those rules, you wouldn&#8217;t have been particularly worried about today&#8217;s password breach. Why? The hash of that long, random password can&#8217;t easily be matched with its plaintext version, and even if the thieves managed to decrypt that password and try to use it before you changed it, they&#8217;d be stopped cold by the 2FA prompt.<\/p>\n<div class=\"c-shortcodePinbox c-shortcodePinbox-single g-border-thin-light-top g-outer-spacing-top-medium g-outer-spacing-bottom-medium g-inner-spacing-bottom-small\">\n<h3 class=\"c-sectionHeading\">ZDNET recommends<\/h3>\n<\/p><\/div>\n<p>Most importantly, if they tried those credentials on other sites, they&#8217;d have no success at all. The real danger of reusing passwords is that simply changing them in one place isn&#8217;t enough. If you use the same password on multiple websites, you could be in a heap of trouble once the bad guys start trying the stolen Plex password on popular sites like Gmail and Outlook.com.<\/p>\n<p>The good news is that a first-rate <a href=\"https:\/\/www.zdnet.com\/article\/best-password-manager\/\" rel=\"follow\">password manager<\/a> can help you identify weak passwords and detect duplicates. Here&#8217;s one example, a report generated by <span class=\"c-commerceLink\"><a href=\"https:\/\/www.tkqlhce.com\/click-9041660-14308408-1615917146000?sid=[subid_value]\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><span>1Password<\/span><!----><\/a><\/span> using its Watchtower feature:<\/p>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/\" alt=\"1password-watchtower\" height=\"707.1428571428571\" width=\"1200\"><\/picture><\/div>\n<p> <!----> <!----><\/div>\n<p> <!----><figcaption readability=\"1\">\n<div class=\"c-CmsContent c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"32\">\n<p>A good password manager can alert you to weak or reused passwords<\/p>\n<\/div>\n<p> <!----><\/figcaption><\/figure>\n<p>That&#8217;s an excellent starting point for getting your passwords in order. And don&#8217;t feel bad if the numbers seem alarmingly high. If you imported a collection of older passwords when you set up your password manager, then you&#8217;re undoubtedly dealing with a collection of credentials you created yourself. Because human beings are notoriously bad at creating truly random strings of text, those passwords are probably weak, which means they can be easily guessed or are vulnerable to a brute-force attack.<\/p>\n<p>A weak password is typically too short, is made up of words that can be found in a dictionary, and\/or contains all or part of the account name. Even if you did manage to create a truly random, hard-to-guess password, your password manager will flag it if it determines you&#8217;ve used that password at multiple sites.<\/p>\n<p>The good news is that every modern password manager also contains a password generator, which you can use to replace those old, weak, insecure passwords. Here&#8217;s what the password generator in 1Password looks like:<\/p>\n<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-medium c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/\" alt=\"1password-generator\" height=\"1079.111111111111\" width=\"768\"><\/picture><\/div>\n<p> <!----> <!----><\/div>\n<p> <!----><figcaption readability=\"1\">\n<div class=\"c-CmsContent c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"32\">\n<p>A password generator can create a truly random and hard to guess password<\/p>\n<\/div>\n<p> <!----><\/figcaption><\/figure>\n<p>One thing I love about 1Password&#8217;s generator is that it offers the option to create memorable passwords, like <strong>whinny-upswept-inferior-apiary<\/strong>, as an alternative to random strings of alphanumeric gibberish like <strong>TouB4kccX_kF7csPW9f9<\/strong>.<\/p>\n<div class=\"c-shortcodePinbox c-shortcodePinbox-single g-border-thin-light-top g-outer-spacing-top-medium g-outer-spacing-bottom-medium g-inner-spacing-bottom-small\">\n<h3 class=\"c-sectionHeading\">ZDNET recommends<\/h3>\n<\/p><\/div>\n<p>Unfortunately, the process of changing your old passwords is labor-intensive. For each service, you&#8217;ll need to find the page where you change your password; use the password generator to create a new, random, unique password and then update the saved entry.<\/p>\n<p>As a best practice, you should do this as soon as possible for high-value sites like banks, credit card portals, and email and social media accounts. After completing each password change, I recommend that you immediately sign out of the service and sign in again, using your freshly saved password, to confirm that the new password was properly stored.<\/p>\n<p>The final step is to ensure that you turn on <a href=\"https:\/\/www.zdnet.com\/article\/better-than-the-best-password-how-to-use-2fa-to-improve-your-security\/\" rel=\"follow\">2-factor authentication<\/a> wherever you can. You should absolutely turn on this protection for high-value sites like email services and financial institutions. Your mobile phone is the best 2FA device, ideally with an authenticator app rather than SMS messages. Just make sure you&#8217;ve got a good backup for your 2FA credentials in case your phone is lost or stolen.<\/p>\n<p>For the most part, finding out which authentication methods are available for a specific site usually requires signing in and then poking around the account options section. Look for anything with the words <em>login<\/em> or <em>security.<\/em><\/p>\n<p>Not sure whether a service supports additional authentication options? Check out the excellent <a href=\"https:\/\/2fa.directory\/us\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">2FA Directory<\/a>, an open-source project that maintains an exhaustive list of websites, with details on whether and how they support 2FA. If your service isn&#8217;t measuring up, and switching is an option, this is definitely the place to start.&nbsp;<\/p>\n<div class=\"c-shortcodePinbox-textList\">\n<h3 class=\"c-sectionHeading\">ZDNET recommends<\/h3>\n<\/p><\/div>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Oops, it happened again. Another popular service got hacked. Take this opportunity to get your passwords in order.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-48173","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Caught up in another password breach? Follow these 3 rules to protect yourself online 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Caught up in another password breach? Follow these 3 rules to protect yourself online 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-25T12:56:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Caught up in another password breach? Follow these 3 rules to protect yourself online\",\"datePublished\":\"2022-08-25T12:56:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\\\/\"},\"wordCount\":787,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\\\/\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\\\/\",\"name\":\"Caught up in another password breach? Follow these 3 rules to protect yourself online 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\\\/\",\"datePublished\":\"2022-08-25T12:56:46+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Caught up in another password breach? Follow these 3 rules to protect yourself online\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Caught up in another password breach? Follow these 3 rules to protect yourself online 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/","og_locale":"en_US","og_type":"article","og_title":"Caught up in another password breach? Follow these 3 rules to protect yourself online 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-08-25T12:56:46+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Caught up in another password breach? Follow these 3 rules to protect yourself online","datePublished":"2022-08-25T12:56:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/"},"wordCount":787,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/","url":"https:\/\/www.threatshub.org\/blog\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/","name":"Caught up in another password breach? Follow these 3 rules to protect yourself online 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/","datePublished":"2022-08-25T12:56:46+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/","contentUrl":"https:\/\/www.zdnet.com\/article\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/caught-up-in-another-password-breach-follow-these-3-rules-to-protect-yourself-online\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Caught up in another password breach? Follow these 3 rules to protect yourself online"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48173"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48173\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}