For years, organizations have framed breach risk as something finite. A breach occurs, notifications are sent, passwords are reset, and the incident is eventually considered closed.
On paper, that model suggests progress. In reality, it creates a dangerous false sense of closure.
Recent breach analysis shows fewer massive breach notifications reaching consumers, yet credential-based attacks, account takeover, and identity abuse continue to accelerate. If breaches are supposedly becoming more manageable, why does identity risk feel more persistent than ever?
The answer lies in a shift many security teams still underestimate: the growing role of previously compromised data (PCD).
Security programs are often optimized around incidents. Something happens, it is investigated, and remediation follows. Once required actions are completed, risk is assumed to be reduced.
But attackers don’t think in terms of incidents — they think in terms of access.
According to analysis from the Identity Theft Resource Center (ITRC), the total number of data compromise events in the U.S. reached a record 3,322 incidents in 2025, even as the number of individual victim notifications declined sharply year over year. That divergence reflects a strategic shift in attacker behavior.
Rather than relying on one-time “mega breaches,” attackers are increasingly focused on reusing and refining data that was already exposed, often years earlier. Fewer notifications do not mean less exposure. They often mean that the same data is being exploited more quietly and more efficiently.
Previously compromised data (PCD) refers to identity and credential data that was exposed in past breaches and later repackaged, aggregated, enriched, and reused in new attack campaigns. Compromised passwords can be repeatedly reissued in updated combo lists and redistributed across new markets and channels, expanding exposure and increasing the pool of actors able to weaponize them.
PCD does not always appear in connection with a newly disclosed breach. Instead, it resurfaces as part of ongoing attack activity, including:
Because this data is not “new,” it often escapes attention. Yet when combined with automation, infostealer malware, and AI-driven analysis, previously compromised data becomes newly actionable.
One of the most important shifts highlighted in recent breach research is that data does not lose value to attackers simply because time has passed.
No alert does not mean no exposure.
From an attacker’s perspective, PCD is one of the most efficient resources available.
The result is a steady stream of credential-based attacks that do not depend on fresh breach events — and often do not trigger obvious security alarms.
Most organizations are not ignoring this threat. They are simply optimized for a different risk model.
Together, these gaps allow reused breach data to remain active — and exploitable — inside enterprise environments long after the original breach fades from view.
This is the mindset shift security leaders must make:
A credential exposed once should be treated as exposed forever — unless it is continuously monitored and invalidated.
Credential exposure is not an event. It is a condition.
As long as exposed credentials remain active, attackers do not need a new breach to gain access. They only need automation to keep trying until one login works.
This reality explains why identity-driven attacks continue to succeed even in organizations with strong perimeter defenses, modern endpoint tools, and widespread MFA adoption. Authentication happens first — and compromised credentials still authenticate cleanly.
Defending against previously compromised data requires moving beyond episodic response toward continuous identity awareness.
That means:
This approach does not replace existing security controls. It fills a critical visibility gap they were never designed to address.
Breach notifications describe what happened in the past. Previously compromised data determines what can happen next.
As attackers continue to recycle identity data at scale, organizations that reduce risk most effectively will be those that stop treating credential exposure as temporary — and start treating it as continuous.
Because in today’s threat landscape, credential exposure never truly expires.