Within the past 2 years. It was specifically about correlating information obtained from dumps of breached websites to identify users and take advantage of password reuse to hack accounts.
The author had a pretty casual writing style and made this process very understandable for the reader. Included screenshots of BreachForums to demonstrate downloading the dumps and matching identical password hashes from multiple breaches and then using things like https://crackstation.net/ to determine which passwords were used. Credential stuffing 101.
Small blog, personal website, dark theme. Can't find it in my bookmarks or in the list of blogs I've found from here.
If anyone knows what I'm talking about and can help out that'd be awesome. Merry Christmas!