Use reputable services like Have I Been Pwned to see if your email address has been included in known data breaches.
Cybercriminals don't usually log into these accounts manually. Instead, they use bots to perform attacks. Download 476k Combolist txt
Generate unique, complex passwords for every single account so that one breach doesn't compromise your entire digital life. Use reputable services like Have I Been Pwned