Critical | Reuse
Credential stuffing after old password reuse
Attackers commonly take credential dumps from unrelated breaches and replay them against consumer and business services. Unique passwords cut off that path immediately.
Response: Rotate reused credentials, review vault reports, and prioritize MFA on accounts tied to recovery or payments.