Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SoundCloud Data Breach Exposes 29.8 Million Personal users Details

SoundCloud Data Breach Exposes 29.8 Million Personal users Details

Posted on January 28, 2026January 28, 2026 By CWS

In December 2025, music streaming platform SoundCloud disclosed a big information breach affecting roughly 29.8 million person accounts.

The unauthorized entry compromised personally identifiable info (PII), together with electronic mail addresses, usernames, show names, avatars, follower statistics, and geographic location information.

The incident represents probably the most vital music platform breaches in recent times, impacting roughly 20% of SoundCloud’s complete person base.

SoundCloud’s safety workforce recognized unauthorized exercise on its platform throughout December 2025, prompting an instantaneous investigation into the scope and nature of the compromise.

The attackers used a flaw that permit them join public profile info to person electronic mail addresses and accumulate it in massive quantities.Following the invention, SoundCloud initiated incident response procedures and notified affected customers of the safety incident.

Uncovered Information and Assault Methodology

The compromised dataset contained 30 million distinctive electronic mail addresses linked to person accounts, alongside related profile info.

Particularly, the breach included usernames, show names, avatar pictures, follower and following counts, and in some instances, person nation info.

No passwords or fee particulars had been stolen, however combining emails with profile information will increase the chance of phishing and account takeovers.

The attackers demonstrated a scientific strategy by accessing and exfiltrating massive quantities of publicly out there information.

Suggesting both credential compromise or exploitation of an API vulnerability that permitted unauthorized bulk information extraction.

Following the info exfiltration, the menace actors contacted SoundCloud, demanding monetary compensation in change for non-disclosure of the stolen dataset.

When SoundCloud declined the extortion demand, the attackers subsequently launched the compromised information publicly, rising publicity dangers for affected customers.

Affect and Suggestions

The breach carries vital implications for person privateness and safety. E mail addresses linked to SoundCloud usernames considerably enhance the chance of focused phishing and social engineering assaults.

Affected customers are suggested to verify for potential publicity utilizing providers akin to HaveIBeenPwned. Attackers can leverage this information to conduct credential-stuffing assaults on different platforms the place customers could reuse electronic mail addresses.

SoundCloud has suggested affected customers to observe their accounts for suspicious exercise and implement further safety measures.

Customers ought to allow two-factor authentication (2FA) on their SoundCloud accounts and think about altering passwords on different platforms in the event that they reused credentials.

Organizations with worker accounts ought to evaluate entry logs for unauthorized exercise and think about implementing email-based threat-detection insurance policies to establish suspicious account entry patterns.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Breach, Data, Details, Exposes, Million, Personal, SoundCloud, Users

Post navigation

Previous Post: Rein Security Emerges From Stealth With $8M, Bringing Inside-Out AppSec Approach
Next Post: Why We Can’t Let AI Take the Wheel of Cyber Defense

Related Posts

Palo Alto Networks to Acquire CyberArk in  Billion Deal Palo Alto Networks to Acquire CyberArk in $25 Billion Deal Cyber Security News
Cybersecurity Newsletter Weekly – Chrome 0-Day, 22.2 Tbps DDOS Attack, Kali Linux Release, Cisco IOS 0-Day and More Cybersecurity Newsletter Weekly – Chrome 0-Day, 22.2 Tbps DDOS Attack, Kali Linux Release, Cisco IOS 0-Day and More Cyber Security News
Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials Cyber Security News
Top 20 Most Exploited Vulnerabilities of 2025 Top 20 Most Exploited Vulnerabilities of 2025 Cyber Security News
WhatsApp Denies Lawsuit Claim and Confirms Messages are Device-encrypted and Private WhatsApp Denies Lawsuit Claim and Confirms Messages are Device-encrypted and Private Cyber Security News
CrowdStrike Fires Insider for Sharing Internal System Details with Hackers CrowdStrike Fires Insider for Sharing Internal System Details with Hackers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News