"This password has appeared in a data breach" — have you seen this warning on your phone or browser? Many people dismiss it, but this is not a notification you should ignore.
In 2024, RockYou2024 exposed roughly 10 billion passwords. The same year, MOAB (Mother of All Breaches) leaked 26 billion records. Can you be sure your password is not among them?
This article shows you how to check for breaches right now, and exactly what to do if you find one.
Your Password Is Probably Already Leaked
This is not an exaggeration — it is statistical reality.
In 2025, a Cybernews investigation found 16 billion credentials (email + password pairs) exposed online — a compilation of data stolen over the years through infostealer malware. Data breaches are hitting record numbers every year. The question is not whether your password has been leaked, but whether you know about it.
If you do not know your password is compromised, an attacker can use it before you change it. If you want to go beyond passwords and see what other personal data is exposed, the Personal OSINT Audit Guide walks through the full process.
How to Check Right Now
Several tools can tell you if your credentials have appeared in known breaches. Here are the most reliable ones.
Have I Been Pwned
The industry standard, created by security researcher Troy Hunt. It searches across 963+ breached websites containing over 17.5 billion accounts.
- Go to haveibeenpwned.com
- Enter your email address and search
- If you see "Oh no — pwned!" your email was found in past breaches
You can also check individual passwords under the "Passwords" tab. Only the first 5 characters of the SHA-1 hash are sent to the server — your actual password never leaves your device. This is called k-anonymity, and it is how HIBP keeps the check private.
The first time most people run their email through HIBP, they're shocked. Multiple breaches from services they forgot they even signed up for — it's a wake-up call that shows up constantly on Reddit. Breach checking is not optional.
NordPass Data Breach Scanner
NordPass includes a built-in data breach scanner. It automatically checks whether passwords saved in NordPass appear in known breach databases and flags compromised ones.
While Have I Been Pwned checks one email at a time, NordPass scans all your saved passwords at once. When breaches are found, you can change the password directly from the app.
Google Password Checkup
If you save passwords in Chrome, Google can check them.
- Chrome → Settings → Passwords and Autofill → Google Password Manager
- Run "Password Checkup"
- Compromised, reused, and weak passwords are listed
Note: Google's "Dark Web Report" feature was discontinued in February 2026. Password Checkup itself remains available.
Apple Security Recommendations
iPhone and Mac users can check using built-in OS features.
- iOS: Settings → Passwords → Security Recommendations
- macOS: System Settings → Passwords → Security Recommendations
Warnings are categorized as "Compromised Passwords," "Reused Passwords," and "Weak Passwords."
What "Compromised Password" Warnings Mean
A "compromised password" notification does not mean your specific account was hacked.
It means "a password identical to yours was found in a publicly known data breach." Someone else using the same password had their account breached, and that password is now in attacker dictionaries.
This matters because of credential stuffing. Attackers take leaked email + password combinations and try them on other services automatically. If you reuse passwords, one breach can cascade across all your accounts. For a deeper dive into how this attack works, see Why Password Reuse Is Dangerous.
What to Do If You Find a Breach
Follow these steps when you discover a compromised password.
Immediate Actions (Do Now)
- Change the password on the breached service — Use 12+ characters with uppercase, lowercase, numbers, and symbols. Make it random
- Change it everywhere you reused it — This is the most critical step. One breach can compromise every account sharing that password
- Enable two-factor authentication (2FA) — Even if a password leaks, 2FA keeps your account safe. Use an authenticator app, not SMS ("Is SMS 2FA Still Safe? How to Switch")
- Check bank and credit card statements — Look for unauthorized transactions
Long-Term Fixes
- Adopt a password manager — Generate and store unique random passwords for every service. You never need to memorize them. A good manager includes automatic breach scanning
- Switch to passkeys — Where supported, eliminate passwords entirely. Available on Google, Apple, GitHub, and more
- Set up ongoing monitoring — Register for Have I Been Pwned notifications, or use NordPass auto-scanning
How to Never Worry About Leaks Again
The root cause of password breach problems is that humans manage passwords. We reuse them. We pick easy ones. A password manager solves this.
Why NordPass
There are several password managers, but I recommend NordPass for these reasons.
Built-in breach scanner. Automatically checks your saved passwords against breach databases. One-click password changes when issues are found.
xChaCha20 encryption. A next-generation cipher beyond AES-256. Zero-knowledge architecture means NordPass itself cannot see your passwords.
NordVPN integration. NordVPN Plus plans and above include NordPass. Manage VPN and passwords under one account.
Passkey support. NordPass stores and manages passkeys — the passwordless authentication standard replacing traditional passwords.
If you want a deeper look at NordPass beyond breach scanning, see our NordPass Review. Managing passwords for a team? Check out the NordPass Business Review. For a broader take on protecting a small business, our SMB Cybersecurity Guide covers the essentials.
Password manager by the makers of NordVPN
- Manage passwords, passkeys, and credit cards in one place
- Zero-knowledge architecture
- Built-in data breach scanner
FAQ
Is Have I Been Pwned safe to use?
Yes. HIBP never stores or logs the email addresses you search. For password checks, only the first 5 characters of the SHA-1 hash are sent to the server using k-anonymity — your actual password never leaves your device. The service is run by Troy Hunt, a widely respected security researcher, and is used by governments and enterprises worldwide.
My password was breached, but I already changed it. Am I safe?
Changing the password on the breached service is step one, but you also need to change it on every other service where you reused it. Attackers use credential stuffing to try leaked passwords across hundreds of sites automatically.
How often should I check for password breaches?
At minimum, check every few months. Better yet, set up automatic monitoring — register your email at Have I Been Pwned's notification service to get alerts when new breaches include your address, or use NordPass's auto-scanning feature.
Are free password managers good enough?
Free managers like Google Password Manager handle basic storage and breach checks. However, they typically lack cross-platform sync, advanced breach scanning, or secure sharing. If you manage more than a handful of accounts, a dedicated manager like NordPass gives you automatic breach alerts and works across all your devices. See our password management guide for a detailed comparison.
What is the difference between a data breach and a password leak?
A data breach is any unauthorized access to a system — it can expose emails, names, payment info, or other data. A password leak specifically means passwords were among the exposed data. Not every breach includes passwords, but when they do, the risk is much higher because attackers can directly access your accounts.
Can passkeys completely replace passwords?
Passkeys eliminate the password entirely for services that support them — Google, Apple, GitHub, Amazon, and many others. They use public-key cryptography tied to your device, so there is nothing to leak or phish. Adoption is growing fast, but not every service supports them yet. Use passkeys where available, and strong unique passwords everywhere else.
Should I worry about breaches from services I no longer use?
Yes. Even if you stopped using a service years ago, if your password there was reused on active accounts, it is still a risk. Old breaches stay in attacker databases permanently. Check HIBP, identify which old passwords you might have reused, and update those accounts. If possible, delete accounts on services you no longer use.
Wrapping Up
| Action | Right now | Long term |
|---|---|---|
| Breach check | Have I Been Pwned / NordPass | NordPass auto-scanning |
| Password changes | Breached service + all reused passwords | Unique passwords via manager |
| 2FA | Critical services first | All accounts |
| Authentication upgrade | — | Passkeys where supported |
With 10 billion passwords publicly available in 2026, assuming "it will not happen to me" is not a strategy. Check with Have I Been Pwned or NordPass right now. If you find breaches, password changes and 2FA will contain the damage. Long term, a password manager and passkeys create an environment where breaches no longer matter.
Related articles:
- Why Password Reuse Is Dangerous: How Credential Stuffing Works
- NordPass Review: Zero-Knowledge Password Manager Tested
- Can't Remember Passwords? You Don't Have To
- How to Check the Dark Web for Your Personal Data
- Personal OSINT Audit: How to Find What the Internet Knows About You
- Public Wi-Fi Safety: How to Stay Secure on Open Networks