LinkedIn has said it does not believe any accounts have been comprised over a week since the password breach that affected some 6.5 million users was first discovered.
In an update on its ongoing efforts to deal with the incident and reassure users over its security, the firm said that its response to the incident appeared to have helped protect users.
"By the end of Thursday, 7 June, all passwords on the published list that we believed created risk for our members, based on our investigation, had been disabled," it said.
"This is true, regardless of whether or not the passwords were decoded. After we disabled the passwords, we contacted members with instructions on how to reset their passwords."
As a result it said it believed all accounts remain untouched.
"At this time, there have been no reports of compromised LinkedIn accounts as a result of this password theft," it said.
The firm also confirmed it had completed the processing of both "hashing" and "salting" all passwords, effectively adding another layer of security by storing a different version of the password in its systems to the one actually used by a member of the site.
LinkedIn has emailed those members it believes had their passwords stolen and urged them to login and create new credentials. One member of the V3 received this email, although it did not arrive until Saturday, three days after the breach was revealed.
Other sites were also hit by password beaches in the same week as LinkedIn, with both eHarmony and Last.fm warning users to change their passwords.
Kicking Palantir off of AWS is among their demands, too
Rafaela Vasquez was watching The Voice at the time of the crash, new evidence shows
PUBG price slashed on Steam after selling more than 50 million copies - as daily player numbers plunge
Use the same password for every website? It might be time to change them all