Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SoundCloud Confirms Data Breach Following VPN and Access Issues

SoundCloud Confirms Data Breach Following VPN and Access Issues

Posted on December 16, 2025December 16, 2025 By CWS

SoundCloud has confirmed a safety incident involving unauthorized entry to consumer information, revealing that hackers exfiltrated e mail addresses and public profile info from roughly 20% of its consumer base.

The corporate disclosed the breach in a transparency weblog submit on December 15, 2025, emphasizing that no delicate info like passwords or monetary particulars was compromised. The platform assured customers that the problem is totally resolved with no ongoing dangers to service availability.

SoundCloud detected suspicious exercise in an ancillary service dashboard, triggering rapid incident response protocols. Safety groups contained the breach swiftly and enlisted third-party cybersecurity specialists for a forensic investigation.

Following containment, the platform confronted two denial-of-service (DDoS) assaults that briefly disrupted internet entry, although cellular and API providers remained operational.

A purported risk actor group capitalized on the preliminary entry, however SoundCloud’s probe confirmed the exfiltration was restricted. “We’re assured that any entry to SoundCloud information has been curtailed,” the corporate acknowledged.

The breach uncovered non-sensitive information already seen on public profiles, minimizing potential hurt. Right here’s a breakdown:

AspectDetailsAffected DataEmail addresses; public profile informationUser Impression~20% of SoundCloud usersSensitive Information LostNone (no passwords, monetary information)Service DisruptionTemporary internet downtime (DDoS-related)Ongoing RiskNone; totally contained

No credentials or fee particulars have been concerned, decreasing dangers like account takeovers or monetary fraud.

In collaboration with specialists, SoundCloud bolstered defenses by enhancing monitoring, risk detection, identification entry controls, and auditing associated methods. These upgrades brought on transient VPN connectivity points for some customers, which groups are resolving.

The corporate prioritizes consumer privateness, promising ongoing updates. It urges vigilance towards phishing, recommending multi-factor authentication (MFA) and monitoring for suspicious emails.

This incident underscores persistent dangers to inventive platforms, the place public information can gasoline focused phishing. As ransomware and provide chain assaults evolve, music streaming providers face heightened scrutiny. SoundCloud’s proactive disclosure aligns with greatest practices from CISA and NIST, doubtlessly averting bigger fallout.

Customers ought to scan for phishing lures claiming “SoundCloud alerts” and allow MFA the place attainable. SoundCloud joins latest breaches at platforms like Spotify rivals, highlighting the necessity for strong ancillary service safety.

This similar group has been linked to different high-profile breaches not too long ago, together with a reported incident involving PornHub.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Access, Breach, Confirms, Data, Issues, SoundCloud, VPN

Post navigation

Previous Post: In-the-Wild Exploitation of Fresh Fortinet Flaws Begins
Next Post: Popular Chrome Extension with Over 6 Million Installs Captures User Inputs to AI Chatbots

Related Posts

Hackers Can Bypass OpenAI Guardrails Framework Using a Simple Prompt Injection Technique Hackers Can Bypass OpenAI Guardrails Framework Using a Simple Prompt Injection Technique Cyber Security News
MomentProof Introduces AI-Resilient Asset Protection for AXA MomentProof Introduces AI-Resilient Asset Protection for AXA Cyber Security News
Microsoft Warns Secure Boot May Be Bypassed as Windows UEFI Certificates Expire Microsoft Warns Secure Boot May Be Bypassed as Windows UEFI Certificates Expire Cyber Security News
Tesla’s Telematics Control Unit Vulnerability Let Attackers Gain Code Execution as Root Tesla’s Telematics Control Unit Vulnerability Let Attackers Gain Code Execution as Root Cyber Security News
Google Gemini Privacy Controls Bypassed to Access Private Meeting Data Using Calendar Invite Google Gemini Privacy Controls Bypassed to Access Private Meeting Data Using Calendar Invite Cyber Security News
10 Best AI penetration Testing Companies in 2025 10 Best AI penetration Testing Companies in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News