TL;DR — Email addresses in stealer logs can now be queried in HIBP to discover which websites they've had credentials exposed against. Individuals can see this by verifying their address using the notification service and organisations monitoring domains can pull a list back via a new API. Nasty stuff, stealer| Troy Hunt
It's been 434 blog posts over six and a half years. It's gone from being excited about a hundred visitors in a week to hundreds of thousands on a big day. It's taken me from a hobby to a career. In so many ways, this blog has defined who I| Troy Hunt
1.02K Posts, 54 Following, 21.1K Followers · Creator of @haveibeenpwned@infosec.exchange. Microsoft Regional Director and MVP. Pluralsight author. Online security, technology and “The Cloud”. Australian.| Infosec Exchange