{"id":52409,"date":"2023-06-19T20:18:19","date_gmt":"2023-06-19T20:18:19","guid":{"rendered":"http:\/\/6ad8f7bb-23c0-4a91-a511-73aaf9c2f394"},"modified":"2023-06-19T20:18:19","modified_gmt":"2023-06-19T20:18:19","slug":"these-are-the-most-hacked-passwords-is-yours-on-the-list","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/","title":{"rendered":"These are the most hacked passwords. Is yours on the list?"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/de8a0d48c48ce91345187bcbcbcab840586ef3b2\/2023\/06\/19\/ff7e5ffd-7976-4748-8192-9f856e79f4f3\/gettyimages-1390536486.jpg?auto=webp&amp;width=768\" alt=\"Person with laptop looking at phone with a password on it\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/f9f17fa251b54594410e04f3bfffda7a5521dc72\/2023\/06\/19\/ff7e5ffd-7976-4748-8192-9f856e79f4f3\/gettyimages-1390536486.jpg?auto=webp&amp;width=1024\" alt=\"Person with laptop looking at phone with a password on it\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/28c18be3b1074fbc3e738408074b911f3b275f0e\/2023\/06\/19\/ff7e5ffd-7976-4748-8192-9f856e79f4f3\/gettyimages-1390536486.jpg?auto=webp&amp;width=1280\" alt=\"Person with laptop looking at phone with a password on it\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/28c18be3b1074fbc3e738408074b911f3b275f0e\/2023\/06\/19\/ff7e5ffd-7976-4748-8192-9f856e79f4f3\/gettyimages-1390536486.jpg?auto=webp&amp;width=1280\" alt=\"Person with laptop looking at phone with a password on it\" width=\"1280\" height=\"853.3333333333333\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Oscar Wong\/Getty Images<\/span><\/figcaption><\/figure>\n<p>Cybercriminals use a variety of tactics to try to <a href=\"https:\/\/www.zdnet.com\/article\/how-an-ai-tool-could-crack-your-passwords-in-seconds\/\" rel=\"follow\">determine your passwords<\/a>. And too many people make the effort easier by using weak and simple ones. A <a href=\"https:\/\/dojo.tech\/card-machine\/most-hacked-passwords-study\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">new study from Dojo<\/a> on the most hacked passwords may be able to help you stay safer online by knowing which mistakes to avoid.<\/p>\n<p>From the <a href=\"https:\/\/github.com\/ohmybahgosh\/RockYou2021.txt\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">RockYou2021 collection of breached password lists<\/a>, Dojo was able to examine more than 6 million such passwords. As a result, the firm uncovered the most commonly-used passwords, their average length, and the most popular subjects that surfaced in a huge number of breaches.<\/p>\n<p><strong>Also:<\/strong> <a href=\"https:\/\/www.zdnet.com\/article\/best-lastpass-alternative\/\" rel=\"follow\"><strong>Goodbye, LastPass: These are the best LastPass alternative password managers<\/strong><\/a><\/p>\n<p>First, though, what kind of tricks and techniques do hackers use to try to obtain your password?<\/p>\n<p><!----><\/p>\n<p>One popular method is the brute force attack in which cyber crooks use automated tools to run through millions of potential passwords per second. A similar tactic is the dictionary attack where the bad guys check common words and phrases to try to guess your password. Some hackers will scour your social media accounts to find personal details that may play a role in your passwords.<\/p>\n<p>Sent via email, text message, or phone call, the phishing attack is another popular scheme through which you&#8217;re tricked into revealing a sensitive password. And sometimes passwords are stolen through malware that infects your PC without your knowledge.<\/p>\n<p><strong>Also:<\/strong> <a href=\"https:\/\/www.zdnet.com\/article\/stop-using-your-browsers-built-in-password-manager\/\" rel=\"follow\"><strong>Stop using your browser&#8217;s built-in password manager. Here&#8217;s why<\/strong><\/a><\/p>\n<p>Based on the findings from Dojo&#8217;s analysis, the number and type of characters used in a password determine how quickly it can be hacked. Passwords with only lowercase characters are a popular but vulnerable pattern. Such a password with only six characters takes virtually zero seconds to crack. One with seven characters takes 0.12 seconds. And one with eight characters would take three seconds.<\/p>\n<p>Even spicing up a password with an uppercase letter, a number, or a special character doesn&#8217;t help much if the password is short or follows a familiar pattern. Passwords with eight characters that start with an uppercase letter appeared more than 4.5 million times in data breaches. Those that ended with a special character were found more than 3.5 million times.<\/p>\n<p>Certain subjects and topics also lend themselves to hackable passwords.<\/p>\n<p>Among the themes analyzed by Dojo, nicknames and terms of endearment were used in passwords more than 1 million times. Names of TV show characters popped up more than 455,000 times, while TV show names appeared more than 365,000 times. Other popular topics found in the breached passwords included colors, fashion brands, cities, countries, movies, body parts, car brands, pet names, swear words, and video game characters.<\/p>\n<p><strong>Also:<\/strong>&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/best-password-manager\/\" rel=\"follow\"><strong>The best password managers to save you from login hassle<\/strong><\/a><\/p>\n<p>Drilling down to some of the categories, the passwords &#8220;King,&#8221; &#8220;Rose,&#8221; &#8220;Love,&#8221; &#8220;Boo,&#8221; &#8220;Hero,&#8221; and &#8220;Angel&#8221; were the most popular ones among nicknames and terms of endearment. Common colors used as passwords were &#8220;Red,&#8221; &#8220;Blue,&#8221; &#8220;Black,&#8221; &#8220;Gold,&#8221; and &#8220;Green.&#8221; And those who like to use video game characters for their passwords went with such choices as &#8220;Joel&#8221; (from The Last of Us), &#8220;Q*Bert,&#8221; &#8220;Link&#8221; (from The Legend of Zelda), &#8220;Mario&#8221; (from Super Mario Bros), and &#8220;Ryu&#8221; (from Street Fighter).<\/p>\n<p>Based on its analysis of the breached passwords, Dojo has cooked up a list of Do&#8217;s and Don&#8217;ts designed to help keep your passwords safer and more secure.<\/p>\n<h2>Do&#8217;s<\/h2>\n<ol>\n<li>Use a combination of lowercase and uppercase letters, numbers, and special characters to make your passwords more difficult to hack.<\/li>\n<li>Shoot for long passwords with at least 8 to 12 characters. The longer the password, the more time and effort required to guess it.<\/li>\n<li>Use <a href=\"https:\/\/www.zdnet.com\/article\/better-than-the-best-password-how-to-use-2fa-to-improve-your-security\/\" rel=\"follow\">multi-factor authentication<\/a>. With MFA, even a hacker who obtains your password will be unable to sign into your account without that second form of authentication.<\/li>\n<li>Change your passwords. If you&#8217;re worried that a particular password has been compromised or caught in a breach, be sure to change it as soon as possible to safeguard your account.<\/li>\n<li>Use a <a href=\"https:\/\/www.zdnet.com\/article\/how-to-protect-and-secure-your-password-manager\/\" rel=\"follow\">password manager<\/a>. Trying to create and remember a unique and complex password for every account is almost impossible without some help. &nbsp;A good password manager will handle the hard work for you, requiring you to just keep track of a single master password.<\/li>\n<\/ol>\n<h2>Don&#8217;ts<\/h2>\n<ol>\n<li>Don&#8217;t use any personal information in your passwords. Hackers can often discover your name, date of birth, or the name of a pet through social media and other resources.<\/li>\n<li>Don&#8217;t use a common or obvious pattern of letters or numbers, such as 1234 or qwerty. Hackers typically try these types of patterns right off the bat.<\/li>\n<li>Don&#8217;t share your password with other people. If you do, make sure you change it afterwards.<\/li>\n<li>Don&#8217;t automatically save passwords to your browser, especially if other people are using your computer or mobile device.<\/li>\n<li>Don&#8217;t use the same password for multiple accounts. If such a password is ever compromised, the hacker could easily try it on other sites that you use.<\/li>\n<\/ol>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Based on more than 6 million breached passwords, there are certain subjects and patterns you should avoid in your own passwords, says payment firm Dojo.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-52409","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>These are the most hacked passwords. Is yours on the list? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"These are the most hacked passwords. Is yours on the list? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-19T20:18:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/28c18be3b1074fbc3e738408074b911f3b275f0e\/2023\/06\/19\/ff7e5ffd-7976-4748-8192-9f856e79f4f3\/gettyimages-1390536486.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-are-the-most-hacked-passwords-is-yours-on-the-list\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-are-the-most-hacked-passwords-is-yours-on-the-list\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"These are the most hacked passwords. Is yours on the list?\",\"datePublished\":\"2023-06-19T20:18:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-are-the-most-hacked-passwords-is-yours-on-the-list\\\/\"},\"wordCount\":849,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-are-the-most-hacked-passwords-is-yours-on-the-list\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/28c18be3b1074fbc3e738408074b911f3b275f0e\\\/2023\\\/06\\\/19\\\/ff7e5ffd-7976-4748-8192-9f856e79f4f3\\\/gettyimages-1390536486.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-are-the-most-hacked-passwords-is-yours-on-the-list\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-are-the-most-hacked-passwords-is-yours-on-the-list\\\/\",\"name\":\"These are the most hacked passwords. Is yours on the list? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-are-the-most-hacked-passwords-is-yours-on-the-list\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-are-the-most-hacked-passwords-is-yours-on-the-list\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/28c18be3b1074fbc3e738408074b911f3b275f0e\\\/2023\\\/06\\\/19\\\/ff7e5ffd-7976-4748-8192-9f856e79f4f3\\\/gettyimages-1390536486.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2023-06-19T20:18:19+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-are-the-most-hacked-passwords-is-yours-on-the-list\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-are-the-most-hacked-passwords-is-yours-on-the-list\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-are-the-most-hacked-passwords-is-yours-on-the-list\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/28c18be3b1074fbc3e738408074b911f3b275f0e\\\/2023\\\/06\\\/19\\\/ff7e5ffd-7976-4748-8192-9f856e79f4f3\\\/gettyimages-1390536486.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/28c18be3b1074fbc3e738408074b911f3b275f0e\\\/2023\\\/06\\\/19\\\/ff7e5ffd-7976-4748-8192-9f856e79f4f3\\\/gettyimages-1390536486.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-are-the-most-hacked-passwords-is-yours-on-the-list\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"These are the most hacked passwords. Is yours on the list?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"These are the most hacked passwords. Is yours on the list? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/","og_locale":"en_US","og_type":"article","og_title":"These are the most hacked passwords. Is yours on the list? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-06-19T20:18:19+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/28c18be3b1074fbc3e738408074b911f3b275f0e\/2023\/06\/19\/ff7e5ffd-7976-4748-8192-9f856e79f4f3\/gettyimages-1390536486.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"These are the most hacked passwords. Is yours on the list?","datePublished":"2023-06-19T20:18:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/"},"wordCount":849,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/28c18be3b1074fbc3e738408074b911f3b275f0e\/2023\/06\/19\/ff7e5ffd-7976-4748-8192-9f856e79f4f3\/gettyimages-1390536486.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/","url":"https:\/\/www.threatshub.org\/blog\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/","name":"These are the most hacked passwords. Is yours on the list? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/28c18be3b1074fbc3e738408074b911f3b275f0e\/2023\/06\/19\/ff7e5ffd-7976-4748-8192-9f856e79f4f3\/gettyimages-1390536486.jpg?auto=webp&amp;width=1280","datePublished":"2023-06-19T20:18:19+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/28c18be3b1074fbc3e738408074b911f3b275f0e\/2023\/06\/19\/ff7e5ffd-7976-4748-8192-9f856e79f4f3\/gettyimages-1390536486.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/28c18be3b1074fbc3e738408074b911f3b275f0e\/2023\/06\/19\/ff7e5ffd-7976-4748-8192-9f856e79f4f3\/gettyimages-1390536486.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/these-are-the-most-hacked-passwords-is-yours-on-the-list\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"These are the most hacked passwords. Is yours on the list?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52409"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52409\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}