Use a tool like Have I Been Pwned to see if your email has appeared in any recent breaches.
2FA is the most effective defense against credential stuffing. Even if an attacker has your password, they cannot log in without the second code. 1,5M COMBOLIST GMAIL (TARGERED GAMING).txt
A is a text file containing massive lists of stolen credentials, typically in a username:password or email:password format. These files are used by cybercriminals to perform credential stuffing , an automated attack where they try these leaked pairs across various websites to gain unauthorized access. Use a tool like Have I Been Pwned