Technology
200 million social media records leaked in major X data breach
X, formerly known as Twitter, has been making headlines recently, with Elon Musk claiming that hackers have been trying to disrupt the platform. However, the most recent news involving the social media site is particularly alarming and puts its users at serious risk.
Earlier this month, reports emerged of a major data breach involving X, after a self-proclaimed data enthusiast known as “ThinkingOne” claimed to have released a database containing over 200 million user records on a popular hacker forum. The leaked data includes names, email addresses and nearly everything else associated with a user’s X profile.
Stay protected & informed! Get security alerts & expert tech tips – sign up for Kurt’s ‘The CyberGuy Report’ now.
X app on an iPhone (Kurt “CyberGuy” Knutsson)
What you need to know
The X data leak is believed to stem from a combination of breaches, including a massive one that allegedly occurred in January 2025 and another in 2023. The leaked dataset, reportedly a 34 GB CSV file, contains 201,186,753 entries with information such as X screen names, user IDs, full names, locations, email addresses (from the 2023 breach), follower counts, profile data, time zones and profile images.
ThinkingOne claimed that the data was cross-referenced from a larger breach involving 2.8 billion unique Twitter IDs and screen names. This breach may have been linked to an insider job during layoffs at X, although the company has not verified this claim. Cybersecurity researchers, including those from Safety Detectives, partially confirmed the authenticity of the data by matching a sample with public X profiles and verifying some email addresses. However, they were not able to fully confirm ownership.
The breach appears to trace back to a vulnerability identified in January 2022 through Twitter’s bug bounty program. This flaw allowed attackers to access user data using only an email address or phone number. Although the vulnerability was patched, the compromised data seems to have resurfaced in later leaks.
Partial confirmation of the data (Safety Detectives) (Kurt “CyberGuy” Knutsson)
MALWARE EXPOSES 3.9 BILLION PASSWORDS IN HUGE CYBERSECURITY THREAT
The data breach puts X users at risk
The 2025 incident alone does not include passwords or financial information, but when combined with the email addresses from the 2023 leak, it significantly increases the risk of phishing and social engineering attacks. X has not officially acknowledged this specific breach at the time of writing, although it previously downplayed the 2023 incident by claiming it involved mostly public data.
The total of 2.8 billion records far exceeds X’s estimated 335 to 600 million active users, suggesting that the dataset may include inactive accounts, bots or historical data. While the full scope and impact of the breach remain unclear, the incident highlights ongoing security challenges for the platform, especially following its acquisition by xAI in late March 2025.
X logo on a smartphone (Kurt “CyberGuy” Knutsson)
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
7 ways you can stay safe from the X data breach
If you have an account on X or think your data may have been part of the breach, here are seven important steps you can take to protect yourself.
1) Use strong antivirus software
This breach included email addresses linked to X accounts, prime fuel for phishing attacks. Hackers may now send emails that look like they’re from X, Musk or support, asking you to “verify your account” or “reset your password.” These often contain links or attachments that can install malware or steal personal data.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
2) Remove your personal data from the internet
Since this X leak exposed full names, email addresses and other public-facing profile details, hackers can easily cross-reference it with other data broker sites to build a full profile on you. This could lead to impersonation or spear-phishing.
To reduce your exposure, use a trusted data removal service that scans data broker websites and requests the deletion of your personal information. While no service promises to remove all your data from the internet, having a removal service is great if you want to monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
3) Change your X account password
Even though this particular breach may not have included passwords, there’s still a significant risk, especially if you use the same password across multiple platforms. Once attackers have your email, they often try using it with common or previously leaked passwords to break into accounts.
To change your X account password, go to Settings and privacy from your profile menu, then select Your account and tap on Change your password. Enter your current password, set a new strong password and confirm the change. You can do this via the mobile app or by logging in through the web. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.
4) Make your X profile more private to reduce future risk
Adjust your X account’s privacy settings to limit the visibility of personal information, such as making your profile private. Ensure that only necessary information is publicly visible. Information that seems harmless, like your location, job title or birthday, can be used by cybercriminals to impersonate you or guess your login credentials. If your X profile includes any personal details that aren’t necessary, now is the time to remove them.
Keeping your profile minimal not only protects your privacy but also makes it harder for scammers to craft convincing phishing messages or social engineering attacks. Think twice before posting personal updates or details publicly, especially if they can be used to guess passwords or verify your identity.
Go to Settings > Privacy and safety and lock down your account visibility.
5) Enable two-factor authentication (2FA) for your X and email accounts
If hackers got your email from the X breach, they may try to reset your password. 2FA helps stop this by requiring a second code to log in:
- Use an authenticator app like Google Authenticator or Authy, not SMS, which can be intercepted
- Secure your email accounts, too, since they can be used to reset your X credentials
6) Use a VPN on public Wi-Fi
Protect your data when accessing X or other platforms on public networks by using a VPN to encrypt your connection. This will help safeguard your information from being intercepted by malicious actors. A reliable VPN is essential for protecting your online privacy and ensuring a secure, high-speed connection. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.
7) Sign up for identity theft protection to catch if your X-linked info is abused
With 200-plus million names and email addresses exposed, scammers may try opening accounts in your name or use your email in fraud attempts. Good identity protection can alert you if your info is being sold on the dark web. It can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.
NEW PHISHING SCAM OUTSMARTS SECURITY CODES TO STEAL YOUR INFO
Kurt’s key takeaway
The X breach is yet another reminder that patching a vulnerability is only one piece of a much larger puzzle. The persistence of leaked data – years after the original flaw was disclosed and fixed – highlights the long tail of exposure that comes with large-scale breaches. Even when credentials aren’t involved, the combination of identifiers like email addresses, names and social connections can be weaponized through correlation attacks, data enrichment and AI-assisted social engineering.
Do you feel that companies are doing enough to protect your data from hackers and other cyber threats? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Slay the Spire II is even better with a friend
Slay the Spire II launched in early access last week, and it’s already an excellent sequel to one of the best roguelikes of all time. In many ways, it’s very similar to its predecessor. Like Hades II and Hollow Knight: Silksong, Slay the Spire II mostly iterates on an already superb foundation. But it does add online co-op with up to four players. While multiplayer changes the familiar rhythms of Slay the Spire just a bit, it’s still a great way to tackle the arduous climb up the spire.
A round of Slay the Spire II plays essentially the same as the original: In each run, you navigate three different acts across a winding map, slowly making a build by crafting your deck and picking up various perk-giving relics, and fighting enemies, elites, and bosses along the way. Slay the Spire II retains the deliberate, turn-based style of play, meaning that when it’s your turn, you have as much time as you want to decide what to do. Since you can see exactly what your enemies are planning for their next turn, there’s a lot of strategy in deciding how much damage to do and how much defense you might need to set up. Multiplayer adds a slight twist: When it’s your turn, everyone can play simultaneously. That opens up all sorts of new opportunities for planning, but it also requires communication to make sure everyone is using their cards effectively.
My multiplayer partner was my wife, the biggest Slay the Spire fan I know, and on our second run we got a thrilling victory. I played the new Necrobinder character, a necromancer, while she played as the returning Silent, which can make decks built around flurries of shivs. Over the course of the run, we accidentally settled into a strategy where I focused on applying the Vulnerable status to as many enemies as possible before my wife would rain down shivs upon our foes.
Slay the Spire II doesn’t encourage teamwork only in battles. At a campfire rest stop, you can choose to mend a friend’s health to help them out. (Some of the new enemies are tough, so I’m glad this is an option.) You each get a vote on which path to take next on the map. Everyone can draw on the map, too — as I learned many times after seeing the doodles my wife made when I would spend too long in the shop.
Since we had to communicate so much, our winning run took about an hour and a half, slower than how fast I could blast through runs in the first game. When we finally defeated the Act 3 boss, though, it was even more satisfying than most of my solo wins because we did it together. My one complaint is that co-op requires you to each play online on your own copy of the game, and that, because there’s no couch co-op, we each had to play on separate devices even though we were sitting on the couch right next to each other.
Those are annoying tradeoffs, but multiplayer is such a fun addition to Slay the Spire that I don’t mind. I can’t wait to try another multiplayer run and see what challenges — and doodles — are in store for me.
Technology
Android fixes 129 security flaws in major phone update
NEWYou can now listen to Fox News articles!
Most people never think about Android security updates until a headline like this appears. Suddenly, your phone, the device you use for messages, banking, photos and work, becomes part of a global cybersecurity story.
That is exactly what happened this week. Google released its latest Android security updates, and they fix a massive 129 vulnerabilities. Even more concerning, one of them is already being exploited by attackers.
The flaw targets a component connected to Qualcomm graphics hardware, and researchers say it has already been used in limited targeted attacks. If you use an Android phone, this is the kind of update you want installed as soon as possible.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter
GOOGLE DISMANTLES 9M-DEVICE ANDROID HIJACK NETWORK
Google’s March Android security update fixes 129 vulnerabilities, including a zero-day flaw already exploited in targeted attacks. (Firdous Nazir/NurPhoto via Getty Images)
Android security flaw already targeted by attackers
One vulnerability in particular has security researchers paying close attention. The flaw is tracked as CVE-2026-21385. Google says there are signs it is already being used in targeted attacks. That makes it a zero-day vulnerability.
In simple terms, attackers discovered the flaw before many devices received a fix. According to Qualcomm, the problem is tied to the graphics processing component inside many of its chipsets. Specifically, the issue involves something called an integer overflow. That technical term means a calculation error can cause memory corruption inside the system. Once that happens, attackers may gain a foothold on the device.
Qualcomm says the flaw impacts 235 different chipsets, which means a large number of Android phones could be affected. Google’s Threat Analysis Group discovered the issue and reported it through coordinated disclosure practices. Qualcomm then worked with device makers to release patches.
Why the Android security vulnerability is dangerous
Several of the patched vulnerabilities allow attackers to execute code remotely or gain elevated privileges on a device. One issue inside the Android System component is especially concerning. Google says it could allow remote code execution without any user interaction.
That means an attacker may exploit the flaw without the victim tapping a link or installing an app. In cybersecurity terms, that type of vulnerability ranks among the most dangerous.
The March Android bulletin addresses ten critical flaws across the System, Framework and Kernel components. These parts sit at the core of Android, so any weakness there can ripple across millions of devices.
ANDROID MALWARE HIDDEN IN FAKE ANTIVIRUS APP
Android users are urged to install the latest security patch as manufacturers roll out updates across devices. (Barrington Coombs/PA Images via Getty Images)
Why some Android phones get security updates faster
Google released two patch levels for this update:
- 2026-03-01 security patch level
- 2026-03-05 security patch level
The second update includes everything in the first, plus fixes for additional hardware components and third-party software. Google Pixel devices typically receive updates immediately. However, many Android users must wait longer.
Phone manufacturers such as Samsung, Motorola and OnePlus often test the patches before releasing them for specific models. Carriers may also delay updates while they verify compatibility. As a result, some users receive security patches quickly while others wait weeks.
How to protect your Android phone from security threats
Security vulnerabilities are a reality in modern software. The good news is that there are several simple steps that can greatly reduce your risk.
1) Install Android updates quickly
Check for updates regularly and install them as soon as they appear. On most devices, go to Settings, tap Security and privacy or Software update, then select Check for updates and install the latest version if one is available. Security updates often fix vulnerabilities that attackers may already be trying to exploit.
2) Avoid apps from unknown sources
Only download apps from trusted stores like Google Play. Third-party app stores pose a higher risk of malware.
3) Keep Google Play Protect enabled
Google Play Protect, which is built-in malware protection for Android devices, scans apps for malicious behavior and warns you if something suspicious appears. It also automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices. Therefore, we recommend strong antivirus software because it adds another layer of protection by using deeper threat detection, real-time monitoring and broader malware databases that can catch suspicious apps or files that Google Play Protect may overlook. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
4) Use strong device security
Set a strong passcode on your phone and turn on fingerprint or face unlock if your device supports it. This helps keep strangers out of your phone if it is lost or stolen.
5) Be cautious with suspicious links
Many attacks still start with phishing messages. Avoid tapping unknown links in texts, emails, or social media messages.
YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT
A critical Android zero-day tied to Qualcomm chipsets could allow attackers to gain a foothold on affected devices. (Donato Fasano/Getty Images)
The bigger picture behind Android security updates
This Android update also highlights how modern mobile security works behind the scenes. Google’s Threat Analysis Group frequently discovers vulnerabilities that may already be used in real-world attacks. Those findings trigger coordinated responses involving chip manufacturers, phone makers and security researchers. In this case, Qualcomm received the report in December and provided fixes to device makers in early 2026.
By the time the public bulletin arrived, patches were already moving through the Android ecosystem. The process may look slow from the outside. In reality, it involves dozens of companies working together to prevent widespread exploitation.
Kurt’s key takeaways
Security updates rarely feel exciting. Yet they play a critical role in protecting billions of smartphones around the world. This latest Android update proves that point clearly. A zero-day flaw tied to Qualcomm graphics hardware was already being targeted before many users even knew it existed. Installing updates quickly remains one of the simplest ways to protect your device and your personal data. Most of the time, the update only takes a few minutes. Those few minutes can block attacks that might otherwise compromise your phone. So the next time your Android device prompts you to install a security patch, the better question may be this:
When your phone asks for a security update, do you install it immediately or tap remind me later? Let us know by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Apple smart home display rumors now point to a fall launch with iOS 27
The rumored “HomePod with a screen” we’ve heard so much about was reportedly lined up for launch in 2025, and then this spring, and now, according to the latest updates, it’s on the shelf until this fall. Leaker Kosutami posted as much on X last week, and today, Bloomberg reporter Mark Gurman followed up with similar information, saying its robot arm-equipped cousin is now planned for launch in 2027.
That was supposed to be ready by now, but it is now predicted to arrive later this year, along with the iPhone 18 Pro plus 2027 updates for iOS, macOS, and all the rest. He describes a silver aluminum-cased device with a 7-inch screen and USB-C power port running a version of tvOS 27, while new versions of the HomePod speaker and Apple TV 4K box are also waiting in the wings for that Siri update, and a smart home sensor is in the works, too.
-
Wisconsin1 week agoSetting sail on iceboats across a frozen lake in Wisconsin
-
Massachusetts1 week agoMassachusetts man awaits word from family in Iran after attacks
-
Maryland1 week agoAM showers Sunday in Maryland
-
Pennsylvania5 days agoPa. man found guilty of raping teen girl who he took to Mexico
-
Florida1 week agoFlorida man rescued after being stuck in shoulder-deep mud for days
-
Sports6 days agoKeith Olbermann under fire for calling Lou Holtz a ‘scumbag’ after legendary coach’s death
-
Detroit, MI4 days agoU.S. Postal Service could run out of money within a year
-
Miami, FL6 days agoCity of Miami celebrates reopening of Flagler Street as part of beautification project