Cybersecurity Reference > Glossary
What is Pwned?
The term usually implies a deliberate breach rather than an accidental exposure—someone broke in, took control, or stole your credentials. When security researchers or attackers say an account has been pwned, they mean it's been compromised in a way that gives unauthorized access or control.
The term has become particularly associated with credential breaches: large databases of stolen usernames and passwords that circulate among criminals and get indexed by security services. Sites like Have I Been Pwned catalog these breaches, letting people check if their email addresses appear in known compromised datasets.
While the word started as gaming slang, it's now common shorthand among security professionals for any successful compromise. The casual tone of the word shouldn't obscure its seriousness—being pwned can mean identity theft, financial loss, or unauthorized access to sensitive systems.
Origin
By the early 2000s, hackers were using "pwned" to describe successful compromises, and it appeared in defacement messages left on hacked websites.
The term gained mainstream cybersecurity recognition in 2013 when security researcher Troy Hunt launched "Have I Been Pwned," a free service that aggregates data breach information and lets users check if their credentials appear in known compromises. Hunt's site legitimized the slang term in professional contexts, and now it appears in security conferences, technical documentation, and even regulatory guidance. What started as a typo in a Quake chat room became the standard shorthand for "your credentials are compromised."
Why It Matters
The scale is staggering—billions of credentials circulate in underground markets, and data breach aggregation sites index breaches affecting most internet users.
For organizations, employee credentials pwned in external breaches represent direct attack vectors. An employee's compromised personal email password, if reused for work accounts, becomes an entry point for ransomware or corporate espionage. This is why security teams increasingly monitor for pwned credentials associated with their domains and force password resets when breaches occur.
The term's casual tone belies a fundamental problem: authentication in most systems depends on secrets that leak constantly and get weaponized immediately.
The Plurilock Advantage
We also provide threat hunting and monitoring that detects credential stuffing attempts and compromised account behavior patterns.
When credentials do get pwned—and they will—our incident response teams help contain the damage and implement controls that prevent reused passwords from becoming organizational vulnerabilities. We focus on making authentication resilient to credential leaks rather than hoping breaches won't happen.
.
Have You Already Been Pwned and Don't Know It?
Credential breaches expose your enterprise to account takeovers, data theft, and compliance risks.
Our security assessment services identify compromised credentials and vulnerable access points before attackers exploit them.




