Two-factor authentication is the single best defense against "combos" and "logs," as a password alone won't be enough to enter your account.
Data harvested from "stealer" malware, which can include saved browser passwords, cookies, autofill data, and even system screenshots.
Lists of username/email and password pairs used by bad actors to gain unauthorized access to accounts across different platforms.
