Technology
SoundCloud data breach exposes 29.8 million user accounts
NEWYou can now listen to Fox News articles!
Hackers have exposed personal and contact information tied to SoundCloud accounts, with data breach notification service Have I Been Pwned reporting impacts to approximately 29.8 million users. The breach hit one of the world’s largest audio platforms and left many users locked out with error messages before the company confirmed the incident.
Founded in 2007, SoundCloud grew into an artist-first service hosting more than 400 million tracks from over 40 million creators. That scale made this incident especially concerning. SoundCloud said it detected unauthorized activity tied to an internal service dashboard and launched its incident response process. At the time, users reported 403 Forbidden errors, especially when connecting through VPNs.
Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK
SoundCloud confirmed unauthorized activity after users reported access errors, triggering an internal incident response. (iStock)
What data was exposed in the SoundCloud breach
SoundCloud initially said attackers accessed limited data and did not touch passwords or financial information. The company said the exposed information matched what users already show publicly on profiles.
Later disclosures painted a much bigger picture.
According to Have I Been Pwned, attackers harvested data from approximately 29.8 million accounts. That data included:
- Email addresses
- Usernames and display names
- Profile photos and avatars
- Follower and following counts
- Geographic locations, in some cases
While no passwords were taken, linking emails to public profiles creates real risk. That combination fuels phishing, impersonation and targeted scams.
Who is behind the attack
Security researchers tied the breach to ShinyHunters, a well-known extortion gang. Sources told BleepingComputer that the group attempted to extort SoundCloud following the data breach. SoundCloud later confirmed those claims. In a January update, the company said attackers made demands and launched email-flooding campaigns to harass users, employees and partners. ShinyHunters has also claimed responsibility for recent voice phishing attacks targeting single sign-on systems at Okta, Microsoft and Google. Those attacks targeted corporate SaaS accounts to steal data and extort.
Why this breach matters even without passwords
At first glance, this may sound less serious than breaches involving passwords or credit cards. That assumption can be dangerous. Email addresses tied to real profiles allow scammers to craft convincing messages. They can pose as SoundCloud, brands or even other creators. With follower counts and usernames, messages feel personal and believable. Once attackers gain trust, they push links, malware or fake login pages. That is often how larger account takeovers begin.
What SoundCloud users should expect next
SoundCloud has not said whether more details will be released. The company did confirm the attack and the extortion attempt, but it has not answered follow-up questions about the scope or internal controls. For users, the long-term risk comes from how widely this dataset spreads. Once published, exposed data rarely disappears. It circulates across forums, marketplaces and scam networks for years.
We reached out to SoundCloud for comment, and a representative told us, “We are aware that a threat actor group has published data online allegedly taken from our organization. Please know that our security team—supported by leading third-party cybersecurity experts—is actively reviewing the claim and published data.”
SoundCloud has said it has found no evidence that sensitive data, such as passwords or financial information, was accessed.
Ways to stay safe after the SoundCloud breach
If you have or had a SoundCloud account, now is the time to act. Even limited data exposure can lead to targeted scams if you ignore it.
1) Watch for phishing and impersonation emails
Scammers often move fast after a breach. Watch your inbox for messages that mention SoundCloud, music uploads, copyright issues or account warnings. Do not click links or open attachments from unexpected emails. When in doubt, go directly to the official website instead of using email links. Strong antivirus software adds another layer of protection here.
Nearly 29.8 million accounts had emails and public profile data harvested, raising concerns about phishing and impersonation. (Cyberguy.com)
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
2) Change your SoundCloud password anyway
Passwords were not exposed, but changing them is still smart. Create a new password that you do not use anywhere else. If remembering passwords feels impossible, consider using a password manager to generate and securely store strong passwords. This reduces the risk of reuse across platforms.
Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2026 at Cyberguy.com
3) Turn on two-factor authentication
Two-factor authentication (2FA) adds a critical barrier if someone tries to access your account. Even if attackers guess or obtain a password later, they still need a second verification step. Enable 2FA anywhere SoundCloud or connected services offer it.
4) Lock down your email account
Your email is the real target after most breaches. If someone gains access to it, they can reset passwords everywhere else. Use a strong, unique password for your email account and turn on two-factor authentication. Review recovery emails and phone numbers to make sure they still belong to you.
DATA BREACH EXPOSES 400,000 BANK CUSTOMERS’ INFO
5) Reduce your online data footprint
Attackers use breached emails to search data broker sites and social platforms for more details. The less data available, the harder you are to target. Consider a data removal service to limit how often your email and personal details appear across the web.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com
6) Check your other accounts for suspicious activity
Attackers often reuse exposed email addresses to test logins across streaming services, social media and shopping accounts. Watch for password reset emails you did not request or login alerts from unfamiliar locations. If something looks off, act fast.
Security researchers linked the breach to the ShinyHunters extortion group, which later attempted to pressure SoundCloud for payment. (Thomas Trutschel/Photothek via Getty Images)
Kurt’s key takeaways
Data breaches no longer stay contained to one app or one moment in time. Even when attackers expose information that looks harmless, the fallout can last much longer. The SoundCloud breach shows how public profile data paired with private contact details creates real exposure. Staying alert, limiting data sharing and using strong security habits remain your best defense as breaches continue to escalate.
Have you checked which old or forgotten accounts still expose your email and could be putting you at risk right now? Let us know your thoughts by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Soundcore new Space 2 promise improved ANC and sound
We finally have an update to the Soundcore Space One that launched two and a half years ago. At MWC 2026, Soundcore has announced the Space 2, which will be available in the US on April 21st in three colors — linen white, jet black, and seafoam green — for $129.99. That’s $30 more than the Space One’s original price.
According to Soundcore, the Space 2 have had a full-band noise cancellation upgrade with the focus of those improvements on the low-frequency sounds we all generally use ANC headphones to block — things like airplane, train, and bus engine sounds while traveling. The Space 2 use the same number of microphones as the Space One for noise canceling, instead relying on optimized mic placement and structure and materials improvements for the boost in performance.
Redesigned 40mm drivers incorporate dual layers in their design. There’s a silk diaphragm with metal ceramic that supposedly results in faster transient response — the driver’s ability to respond to sudden sound quickly and accurately — with better balanced sound reproduction. The Space One had great sound performance for the price, but I’m all for any improvement to sound performance accuracy. Like the Space One, the Space 2 will support LDAC high-res audio.
The headphones connect wirelessly over Bluetooth 6.1, although they do not support Auracast transmissions — an unfortunate exclusion. There’s also a 3.5mm jack for a wired connection.
Battery life has been increased to up to 50 hours with ANC and 70 hours with ANC off. This is up from 40 hours with ANC and 55 hours without ANC with the Space One headphones. With a five-minute charge the Space 2 get an additional four hours of listening.
The Space 2 will include many of the features found on the Space One. You can use HearID 3.0 to go through a series of sound samples to tune the headphones’ sound to your preferences. It worked well for me on the Space One to get them closer to a sound I liked, with a bit of the edge taken off the higher frequencies. There’s also a sensor that detects when you remove the headphones and stops playback so you don’t miss any of your music or podcast. They once again come with a cloth bag that matches the color of the headphones instead of a case, which is one change I wish Soundcore had made, as the cloth bag doesn’t offer as much protection if you tend to throw your headphones into your backpack or bag.
The Soundcore Space One were among the best budget ANC headphones when they came out, and still hold up to more recent releases. But with the bump in price to over $100 for the Space 2, there’s a bit more expectation on them. ANC performance continues to improve — and products get cheaper — across manufacturers, so the Soundcore Space 2 has some competition from companies like Sony, EarFun, and JLab. If the ANC on the Space 2 stands up to current budget headphones and they still sound as good and are as comfortable as the Space One, you can expect to see the new Soundcore Space 2 on many recommendation lists.
Technology
Tired of websites blocking your VPN? A dedicated IP fixes that
NEWYou can now listen to Fox News articles!
If you have ever turned on your VPN and suddenly could not log in to your bank, email, streaming service or work portal, you are not imagining things. In fact, this is one of the most common frustrations VPN users face today.
However, the issue is not that VPNs stopped working. Instead, websites have become far more aggressive about blocking traffic that looks suspicious.
As a result, the way your VPN is built now matters just as much as whether you use one at all.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter
Shared VPN IPs often trigger red flags, which is why banks, email providers and streaming sites sometimes block access. (Kurt “CyberGuy” Knutsson)
Why websites block many VPN connections
Most VPNs give you a shared IP address. As a result, hundreds or even thousands of people can appear online from the same address at the same time. From a website’s perspective, that traffic pattern raises red flags. When platforms detect too many logins, rapid location changes or unusual activity tied to one IP, they step in quickly. In many cases, they respond by:
- Blocking access
- Triggering captchas
- Requiring extra verification codes
- Temporarily locking accounts
Meanwhile, you did nothing wrong. Instead, you end up dealing with restrictions caused by other users sharing that same IP address.
What a dedicated IP does differently
With a dedicated IP, you get an address that belongs only to you. Unlike shared VPN connections, no one else uses it.
Each time you connect, you use the same IP address. As a result, you avoid sharing traffic, rotating locations or competing with random users whose activity could trigger blocks.
Because of that consistency, your connection looks much more like a typical home or office internet setup. And that simple difference can dramatically reduce website suspicion and login headaches.
NEW YORK HALTS ROBOTAXI EXPANSION PLAN
A dedicated IP gives you a consistent address that looks more like a normal home connection, reducing captchas and login alerts. (Kurt “CyberGuy” Knutsson)
What a dedicated IP can do that shared VPN IPs usually can’t
That consistency does more than reduce suspicion; it improves how smoothly you access the sites and services you use every day.
Access more websites without blocks
Banks, government portals, healthcare sites, and streaming services are far less likely to block a dedicated IP because it does not show heavy or erratic traffic patterns.
Reduce captchas and security challenges
Those endless “prove you’re human” messages are usually triggered by shared IP abuse. A dedicated IP dramatically reduces them.
Make banking and email logins smoother
Financial institutions and email providers often flag constantly changing IP addresses as suspicious. A dedicated IP stays consistent, so login alerts and lockouts happen far less often.
Support remote work and secure systems
Some employers only allow access from approved IP addresses. Shared VPN IPs cannot be approved. Dedicated IPs can.
Improve streaming reliability
Shared VPN IPs are often the first to get blocked when streaming services crack down. Dedicated IPs are less likely to be flagged because traffic looks normal and predictable.
What a dedicated IP does not do
A dedicated IP:
- Does not remove encryption
- Does not expose your identity
- Does not weaken your privacy
Your traffic remains encrypted, and your real location stays hidden. You simply get a connection that websites trust more.
Who benefits most from a dedicated IP
A dedicated IP is especially helpful if you:
- Use online banking regularly
- Travel and access sites from different locations
- Work remotely
- Stream often
- Get tired of captchas and blocked pages
- Want a VPN that feels normal to use
GOOGLE DISMANTLES 9M-DEVICE ANDROID HIJACK NETWORK
With fewer blocks and smoother logins, a dedicated IP helps your VPN work quietly in the background instead of getting in your way. (Kurt “CyberGuy” Knutsson)
How to choose a VPN that offers a dedicated IP
If you want these benefits, look for a VPN provider that offers a dedicated IP option built directly into its service. Some providers include it in premium plans, while others offer it as an add-on. Either way, the process should be simple. You should be able to select your dedicated IP inside the app without advanced setup or manual configuration. Before signing up, check that the provider also offers strong speeds, reliable uptime and clear privacy policies. A dedicated IP improves access, but overall performance still matters.
What to look for beyond a dedicated IP
A dedicated IP reduces blocks. However, a quality VPN should also deliver strong security and smooth performance.
Fast, stable connections: Speed matters for streaming, video calls and everyday browsing. Look for providers known for consistent performance.
Wide server coverage: More server locations give you flexibility when traveling and help reduce location errors.
Clear privacy practices: Choose a VPN with a strict no-logs policy and independent audits when possible.
Secure server technology: Modern VPNs often use RAM-based servers that automatically wipe data on reboot.
Easy-to-use apps: Protection should feel simple, not technical. Clean apps across major devices make daily use effortless.
For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com
Kurt’s key takeaway
If your VPN keeps getting blocked, the problem may not be the VPN itself. It may be the shared IP address behind it. Websites are increasingly aggressive about suspicious traffic. When hundreds of users share the same IP, banks, email providers and streaming platforms take notice. That is when the captchas, verification codes and account lockouts start. A dedicated IP changes that experience. You still get encryption. You still protect your real location. But your connection looks stable and predictable, which helps you avoid constant interruptions.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Should protecting your privacy really mean fighting with your bank, email, and streaming apps? Let us know by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Polymarket defends its decision to allow betting on war as ‘invaluable’
Polymarket has been allowing people to bet on when the US would strike Iran next. Obviously, now that it’s actually happened and people have died, the prediction betting market is feeling some pressure. The site has been at the center of controversy before, including suspicions of insider trading on the Super Bowl halftime show and the capture of Venezuelan President Nicolás Maduro.
In a statement posted on its site, Polymarket defended its decision to allow betting on the potential start of a war, saying that it was an “invaluable” source of news and answers, before taking shots at traditional media and Elon Musk’s X. The statement reads:
…
Read the full story at The Verge.
-
World4 days agoExclusive: DeepSeek withholds latest AI model from US chipmakers including Nvidia, sources say
-
Massachusetts4 days agoMother and daughter injured in Taunton house explosion
-
Montana1 week ago2026 MHSA Montana Wrestling State Championship Brackets And Results – FloWrestling
-
Denver, CO4 days ago10 acres charred, 5 injured in Thornton grass fire, evacuation orders lifted
-
Louisiana7 days agoWildfire near Gum Swamp Road in Livingston Parish now under control; more than 200 acres burned
-
Technology1 week agoYouTube TV billing scam emails are hitting inboxes
-
Technology1 week agoStellantis is in a crisis of its own making
-
Politics1 week agoOpenAI didn’t contact police despite employees flagging mass shooter’s concerning chatbot interactions: REPORT