stolen data

Buying stolen data

Should companies buy stolen data from third parties to combat credential reuse attacks against themselves? Herein we discuss the rampant, and quiet, practice of legitimate companies buying stolen data