Buying stolen data

 Should companies buy stolen data from third parties to combat credential reuse attacks against themselves? Herein…