Connect with us

Technology

200 million social media records leaked in major X data breach

Published

on

200 million social media records leaked in major X data breach

X, formerly known as Twitter, has been making headlines recently, with Elon Musk claiming that hackers have been trying to disrupt the platform. However, the most recent news involving the social media site is particularly alarming and puts its users at serious risk. 

Earlier this month, reports emerged of a major data breach involving X, after a self-proclaimed data enthusiast known as “ThinkingOne” claimed to have released a database containing over 200 million user records on a popular hacker forum. The leaked data includes names, email addresses and nearly everything else associated with a user’s X profile.

Stay protected & informed! Get security alerts & expert tech tips – sign up for Kurt’s ‘The CyberGuy Report’ now.

X app on an iPhone (Kurt “CyberGuy” Knutsson)

What you need to know

The X data leak is believed to stem from a combination of breaches, including a massive one that allegedly occurred in January 2025 and another in 2023. The leaked dataset, reportedly a 34 GB CSV file, contains 201,186,753 entries with information such as X screen names, user IDs, full names, locations, email addresses (from the 2023 breach), follower counts, profile data, time zones and profile images.

Advertisement

ThinkingOne claimed that the data was cross-referenced from a larger breach involving 2.8 billion unique Twitter IDs and screen names. This breach may have been linked to an insider job during layoffs at X, although the company has not verified this claim. Cybersecurity researchers, including those from Safety Detectives, partially confirmed the authenticity of the data by matching a sample with public X profiles and verifying some email addresses. However, they were not able to fully confirm ownership.

The breach appears to trace back to a vulnerability identified in January 2022 through Twitter’s bug bounty program. This flaw allowed attackers to access user data using only an email address or phone number. Although the vulnerability was patched, the compromised data seems to have resurfaced in later leaks.

200 million social media records leaked in major X data breach

Partial confirmation of the data (Safety Detectives) (Kurt “CyberGuy” Knutsson)

MALWARE EXPOSES 3.9 BILLION PASSWORDS IN HUGE CYBERSECURITY THREAT

The data breach puts X users at risk

The 2025 incident alone does not include passwords or financial information, but when combined with the email addresses from the 2023 leak, it significantly increases the risk of phishing and social engineering attacks. X has not officially acknowledged this specific breach at the time of writing, although it previously downplayed the 2023 incident by claiming it involved mostly public data.

The total of 2.8 billion records far exceeds X’s estimated 335 to 600 million active users, suggesting that the dataset may include inactive accounts, bots or historical data. While the full scope and impact of the breach remain unclear, the incident highlights ongoing security challenges for the platform, especially following its acquisition by xAI in late March 2025.

Advertisement
200 million social media records leaked in major X data breach

X logo on a smartphone (Kurt “CyberGuy” Knutsson)

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

7 ways you can stay safe from the X data breach

If you have an account on X or think your data may have been part of the breach, here are seven important steps you can take to protect yourself.

1) Use strong antivirus software 

This breach included email addresses linked to X accounts, prime fuel for phishing attacks. Hackers may now send emails that look like they’re from X, Musk or support, asking you to “verify your account” or “reset your password.” These often contain links or attachments that can install malware or steal personal data.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Advertisement

2) Remove your personal data from the internet

Since this X leak exposed full names, email addresses and other public-facing profile details, hackers can easily cross-reference it with other data broker sites to build a full profile on you. This could lead to impersonation or spear-phishing.

To reduce your exposure, use a trusted data removal service that scans data broker websites and requests the deletion of your personal information. While no service promises to remove all your data from the internet, having a removal service is great if you want to monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

3) Change your X account password

Even though this particular breach may not have included passwords, there’s still a significant risk, especially if you use the same password across multiple platforms. Once attackers have your email, they often try using it with common or previously leaked passwords to break into accounts.

Advertisement

To change your X account password, go to Settings and privacy from your profile menu, then select Your account and tap on Change your password. Enter your current password, set a new strong password and confirm the change. You can do this via the mobile app or by logging in through the web. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.

4) Make your X profile more private to reduce future risk 

Adjust your X account’s privacy settings to limit the visibility of personal information, such as making your profile private. Ensure that only necessary information is publicly visible. Information that seems harmless, like your location, job title or birthday, can be used by cybercriminals to impersonate you or guess your login credentials. If your X profile includes any personal details that aren’t necessary, now is the time to remove them.

Keeping your profile minimal not only protects your privacy but also makes it harder for scammers to craft convincing phishing messages or social engineering attacks. Think twice before posting personal updates or details publicly, especially if they can be used to guess passwords or verify your identity.

Go to Settings > Privacy and safety and lock down your account visibility.

Advertisement

5) Enable two-factor authentication (2FA) for your X and email accounts 

If hackers got your email from the X breach, they may try to reset your password. 2FA helps stop this by requiring a second code to log in:

  • Use an authenticator app like Google Authenticator or Authy, not SMS, which can be intercepted
  • Secure your email accounts, too, since they can be used to reset your X credentials

6) Use a VPN on public Wi-Fi 

Protect your data when accessing X or other platforms on public networks by using a VPN to encrypt your connection. This will help safeguard your information from being intercepted by malicious actors. A reliable VPN is essential for protecting your online privacy and ensuring a secure, high-speed connection. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

7) Sign up for identity theft protection to catch if your X-linked info is abused

With 200-plus million names and email addresses exposed, scammers may try opening accounts in your name or use your email in fraud attempts. Good identity protection can alert you if your info is being sold on the dark web. It can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

Advertisement

NEW PHISHING SCAM OUTSMARTS SECURITY CODES TO STEAL YOUR INFO

Kurt’s key takeaway

The X breach is yet another reminder that patching a vulnerability is only one piece of a much larger puzzle. The persistence of leaked data – years after the original flaw was disclosed and fixed – highlights the long tail of exposure that comes with large-scale breaches. Even when credentials aren’t involved, the combination of identifiers like email addresses, names and social connections can be weaponized through correlation attacks, data enrichment and AI-assisted social engineering.

Do you feel that companies are doing enough to protect your data from hackers and other cyber threats? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

How to Install a VPN on a Fire TV Stick

Published

on

How to Install a VPN on a Fire TV Stick
An Amazon Fire TV Stick gives you access to a vast library of on-demand content through popular streaming services and media hosting platforms. If you don’t want that traffic to be visible to your internet service provider, we show you how to use a VPN to shield yourself.
Continue Reading

Technology

How to free up space on a PC

Published

on

How to free up space on a PC

Using a PC is all fun and games until you run out of storage. We’ve all been there, and the problem becomes more frequent if you’ve been using your PC for years. Over time, the hard disk starts filling up with everything, including PDFs, video files, random screenshots, and duplicate photos transferred from an SD card or your phone.

Once your PC’s storage fills up, it slows down because the resources required to process tasks become limited. I will discuss some proven methods to reclaim valuable space and improve your computer’s performance.

If you’re not a PC user, find more ways to free up space on these devices: iPhoneAndroidMac

JOIN THE FREE CYBERGUY REPORT: GET MY EXPERT TECH TIPS, CRITICAL SECURITY ALERTS, AND EXCLUSIVE DEALS — PLUS INSTANT ACCESS TO MY FREE ULTIMATE SCAM SURVIVAL GUIDE WHEN YOU SIGN UP!

Advertisement

Empty recycle bin

When you delete something on your PC, it remains in the Recycle Bin and still takes up space on your hard disk. The Recycle Bin usually holds deleted files for 30 days, but if you need to free up space right away, emptying it is a good first step. Note that “Recycle Bin” is the term used on Windows. To free up disk space from the Recycle Bin:

  • Search for Recycle Bin on your desktop and right-click it.
  • Select Empty Recycle Bin.
  • Confirm the deletion.

HOW TO FREE UP SPACE ON YOUR ANDROID

Free up PC space 2

Step to empty recycle bin on PC. (Kurt “CyberGuy” Knutsson)

BEST ANTIVIRUS FOR PCS & MACS — CYBERGUY PICKS 2025

Delete unnecessary apps

After clearing the Recycle Bin, the next step is to delete unnecessary apps. Unused applications take up valuable storage space and can slow down your system. Removing them will free up space and improve performance on your Windows PC.

  • Go to Settings
  • Click Apps
  • Select Installed apps.
  • Sort apps by size to find large ones.
  • Click an app and select Uninstall.
free up PC space 3

Image of Installed apps on a PC. (Kurt “CyberGuy” Knutsson)

WHAT TO DO IF YOU THINK YOUR PC HAS A VIRUS

Delete the files you don’t need

Take some time to go through your files and delete anything you no longer need. Old documents, large video files, duplicate photos, and outdated downloads can take up a surprising amount of space. If you are unsure about deleting certain files, move them to an external drive or cloud storage before permanently removing them from your Windows PC.

Advertisement
  • Open Settings
  • Click System.
  • Select Storage.

YOUR IPHONE HAS A HIDDEN FOLDER EATING UP STORAGE SPACE WITHOUT YOU EVEN KNOWING

free up pc space 4

Steps to delete the files you don’t need on a PC. (Kurt “CyberGuy” Knutsson)

Free up PC space 5

Steps to delete the files you don’t need on a PC. (Kurt “CyberGuy” Knutsson)

  • Check the boxes for items like temporary files, downloads and recycle bin.
free up pc space 6

(Kurt “CyberGuy” Knutsson)

  • Click Remove files.
  • You can also use Disk Cleanup: Type “Disk Cleanup” in the Start menu, select a drive and choose files to delete.

Enable Storage Sense on Windows

If you’re using Windows, Storage Sense is a built-in feature that can automatically free up space by removing temporary files and old items from the Recycle Bin. How to enable storage sense on Windows:

  • Open Settings and go to System > Storage.
  • Click on Storage Sense and toggle it On.
  • Under the Configure cleanup schedules sectionchoose how often it should run (every day, week or month). Once enabled, Storage Sense will automatically clean up space based on your preferences.

DOES YOUR WINDOWS 11 PC KEEP RESTARTING? LET’S FIX THAT FRUSTRATING PROBLEM

Transfer files to external storage

  • Choose the right external drive: Opt for an external hard drive or solid-state drive (SSD) that suits your needs. SSDs offer faster speeds and better durability, while HDDs provide larger capacities at lower costs.
  • Transfer files: Connect your external drive, copy your files to it and verify that all files are successfully transferred.
  • Delete original files: After verifying the transfer, delete the original files from your PC to free up space. On Windows, use File Explorer to delete files and empty the Recycle Bin. On Mac, use Finder to move files to Trash and then empty it.

Consider cloud storage

Cloud storage services like Google DriveDropbox and Microsoft OneDrive offer convenient, flexible options for storing large files without consuming your laptop’s limited space. These services allow you to securely store your photos, videos and documents in the cloud, freeing up valuable storage on your device. One significant advantage of cloud storage is accessing files from any device with an internet connection, whether on your phone, tablet or another computer.

Most cloud services provide a certain amount of free storage (typically between 2GB and 15GB) before upgrading to a paid plan. For instance, Google Drive offers 15GB of free storage shared across Google services, while Dropbox provides 2GB for free with options to upgrade for more space. OneDrive provides 5GB for free, but Microsoft users can get additional storage through Office 365 subscriptions, granting access to the Microsoft Office suite.

Additionally, cloud storage services come with features like automatic syncing and backup, making it easier to organize and safeguard your files. This can be particularly helpful for large photo and video libraries, which can be set to upload automatically from your phone or computer. With features like file versioning and collaboration tools, cloud platforms offer more than just storage  — they enhance productivity and allow seamless file sharing with friends, family or colleagues.

Finally, many cloud storage providers offer encryption and other security measures to protect your files for added peace of mind. However, it would be best always to take extra precautions, such as enabling two-factor authentication and using strong, unique passwords, to ensure your data is safe. Kurt’s favorite cloud services can be seen here.

Protect your data: Essential security steps after managing storage

After you’ve freed up space on your PC-whether by deleting old files, moving data to an external drive or leveraging cloud storage, it’s just as important to make sure your valuable information stays secure. The following steps will help you protect your files and personal data from cyber threats and accidental loss.

1. Use strong passwords: Create unique, complex passwords for all your accounts and devices. Consider using a password manager to generate and store secure passwords. Get more details about my best expert-reviewed Password Managers of 2025 here.

Advertisement

2. Enable encryption: Encrypt your external hard drives and cloud storage accounts to add an extra layer of protection to your data.

3. Implement two-factor authentication (2FA): Enable 2FA on all accounts that offer this feature, especially for cloud storage services.

4. Install and maintain strong antivirus software: Use a strong antivirus program and keep it updated to protect against malware and other security threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

5. Regularly update your operating system and applications: Keep your devices and software up to date to ensure you have the latest security patches.

6. Be cautious with public Wi-Fi: Avoid accessing sensitive information when connected to public networks, or use a VPN for added security. Using a VPN (Virtual Private Network) service can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices

Advertisement

7. Backup your data regularly: Create multiple backups of your important files, including at least one offline copy.

8. Use secure file transfer methods: When sharing files, use encrypted transfer methods or password-protected links.

By following these steps, you can significantly enhance the security of your data and protect yourself from potential cyber threats.

Kurt’s key takeaway

Your PC’s storage can fill up fast, but you can always free up some space. I personally prefer storing images and videos that take up too much space on an external drive. This way, I can access them whenever I need to while keeping my PC storage free. If an external drive feels like too much of a hassle, you can always opt for cloud storage. Windows supports a range of cloud storage options, including its own services like OneDrive.

Advertisement

What’s the most surprising thing you’ve found taking up space on your computer?  Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Meta asks judge to throw out antitrust case mid-trial

Published

on

Meta asks judge to throw out antitrust case mid-trial

Meta has filed a motion for judgment on the antitrust case it’s currently fighting in court. The motion argues that the Federal Trade Commission (FTC) has failed to produce any evidence that Meta unlawfully monopolized part of the social networking market, something the government argues it did through its acquisitions of Instagram and WhatsApp.

The filing was submitted this evening, shortly after the FTC rested its case in a protracted trial before DC District Court Judge James Boasberg. “After five weeks of trial, it is clear that the FTC has failed to meet the legal standard required under antitrust law,” said Meta spokesperson Christopher Sgro. “Regardless, we will present our case to show what every 17-year-old in the world knows: Instagram competes with TikTok (and YouTube and X and many other apps). The FTC spent tens of millions of taxpayer dollars bringing a weak case with a market definition that ignores reality.”

A judgment on partial findings asks a judge to consider a case’s merits before it has been fully argued in court, attempting to speed its resolution. The trial is still currently scheduled to proceed, with Meta launching into its defense against the FTC’s allegations, but the filing offers a preview of its case.

As Meta’s lawyers have done in cross-examination, it takes aim at the agency’s description of Meta monopolizing a “personal social networking services” market that people use to share information with family and friends. It argues that the FTC has failed to demonstrate Meta reduced the quality of its services (a key sign that a company lacks competition) or that it bought Instagram to neutralize a potential rival.

The FTC has made its case with testimony from several high-profile players in Meta’s businesses, including Instagram’s co-founder Kevin Systrom — who aired complaints about Meta’s handling of his company — and its current head, Adam Mosseri, who offered a more optimistic take. Meta has countered by emphasizing the company’s persistent struggles against social networks that the FTC doesn’t consider full competitors, particularly TikTok, which, in the war for those aforementioned 17-year-olds’ attention, Meta portrays as a constant scourge.

Advertisement
Continue Reading
Advertisement

Trending