In late October 2025
data breached from the Hungarian political party TISZA was published online before being extensively redistributed. Stemming from a compromise of the TISZA Világ service earlier in the month
the breach exposed 200k records of personal data including email addresses along with names
phone numbers and physical addresses.
pseudo
nom prénom
entreprise
adresse postale
date de naissance
mot de passe (hashé en MD5)
email
numéro de téléphone
adresse IP
réseaux sociaux (instagram
facebook
twitter
snapchat)
date d’inscription et de dernière connexion
During 2025
the threat-intelligence firm Synthient aggregated 2 billion unique email addresses disclosed in credential-stuffing lists found across multiple malicious internet sources. Comprised of email addresses and passwords from previous data breaches
these lists are used by attackers to compromise other
unrelated accounts of victims who have reused their passwords. The data also included 1.3 billion unique passwords
which are now searchable in Pwned Passwords. Working to turn breached data into awareness
Synthient partnered with HIBP to help victims of cybercrime understand their exposure.
During 2025
the threat-intelligence firm Synthient aggregated 2 billion unique email addresses disclosed in credential-stuffing lists found across multiple malicious internet sources. Comprised of email addresses and passwords from previous data breaches
these lists are used by attackers to compromise other
unrelated accounts of victims who have reused their passwords. The data also included 1.3 billion unique passwords
which are now searchable in Pwned Passwords.
données d’authentification en clair
état civil
adresse
n° de téléphone
email
carte d’identité
RIB
contrats de travail
avis d’imposition
attestion de Sécurité Sociale
attestation de formation
autorisation de travail
Autres fuites pour ce dossier :
In October 2025
the data of almost 4M MyVidster users was posted to a public hacking forum. Separate to the 2015 breach
this incident exposed usernames
email addresses and in a small number of cases
profile photos.
During 2025
Synthient aggregated billions of records of “threat data” from various internet sources. The data contained 183M unique email addresses alongside the websites they were entered into and the passwords used. After normalising and deduplicating the data
183 million unique email addresses remained
each linked to the website where the credentials were captured
and the password used. This dataset is now searchable in HIBP by email address
password
domain
and the site on which the credentials were entered.