: Session tokens that allow hackers to bypass Multi-Factor Authentication (MFA) and hijack active logins. Autofill Data : Addresses, phone numbers, and names.

: Hardware specs, IP address, and a list of installed software. 3. Recommended Actions If you suspect your data was part of this specific archive:

: Use the "Log out of all devices" feature in your Google, Microsoft, or Facebook security settings to invalidate any stolen cookies.

: Search your email address on HaveIBeenPwned to see if this specific log has been indexed in a known data breach.