Skip to content
Monday, December 29, 2025
Latest:
  • Accused data thief threw MacBook into a river to destroy evidence
  • I’ve tried nearly every browser out there and these are my top 4 (spoiler: none are Chrome)
  • Death, torture, and amputation: How cybercrime shook the world in 2025
  • Your Samsung phone has a secret Wi-Fi menu that can solve most internet problems – how to access
  • Is ChatGPT Plus worth your $20? Here’s how it compares to Free and Pro plans
ThreatsHub.org

  • Home
  • Main Page
  • Cyber Security News
    • Malware
    • Security
    • Vulnerabilities
    • Cloud and Web Security
  • About
    • About ThreatsHub Blog
    • Media Kit
    • Terms of Service
    • Privacy Statement

Cyber Security Trending News

The Register

Accused data thief threw MacBook into a river to destroy evidence

December 29, 2025 TH Author

Former staffer of Korean e-tailer Coupang accessed 33 million records but may have done less damage than feared Korean e-tailer Coupang claims a former employee has admitted to improperly accessing data describing 33 million of its customers, but says the accused deleted the stolen data.… READ MORE HERE…




ZDNet | Security
April 30, 2025 TH Author

I tested 10 AI content detectors – and these 5 correctly identified AI text every time

I’ve been testing AI content detectors for two years now. They’re getting more and more reliable.READ MORE HERE…

Read More
ZDNet | Security
April 30, 2025 TH Author

OpenAI recalls GPT-4o update for being too agreeable

Users complained GPT-4o was too ‘sycophantic.’ Here’s why and what happens now.READ MORE HERE…

Read More
The Register
April 30, 2025 TH Author

Ghost in the shell script: Boffins reckon they can catch bugs before programs run

Go ahead, please do Bash static analysis Shell scripting may finally get a proper bug-checker. A group of academics has proposed static analysis techniques aimed at improving the correctness and reliability of Unix shell programs.… READ MORE HERE…

Read More
TrendMicro
April 30, 2025 TH Author

Earth Kasha Updates TTPs in Latest Campaign Targeting Taiwan and Japan

This blog discusses the latest modifications observed in Earth Kasha’s TTPs from their latest campaign detected in March 2025 targeting Taiwan and Japan. Read More HERE…

Read More
The Register
April 29, 2025 TH Author

Watch out for any Linux malware sneakily evading syscall-watching antivirus

Google dumped io_uring after $1M in bug bounties A proof-of-concept program has been released to demonstrate a so-called monitoring “blind spot” in how some Linux antivirus and other endpoint protection tools use the kernel’s io_uring interface.… READ MORE HERE…

Read More
ZDNet | Security
April 29, 2025 TH Author

Google Wallet brings digital IDs to more states – how to add yours

Plus, proving your age with your phone is about to get way easier and more private.READ MORE HERE…

Read More
Microsoft Secure
April 29, 2025 TH Author

Microsoft announces the 2025 Security Excellence Awards winners

Congratulations to the winners of the Microsoft Security Excellence Awards that recognize the innovative defenders who have gone above and beyond.
The post Microsoft announces the 2025 Security Excellence Awards winners appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
The Register
April 29, 2025 TH Author

China is using AI to sharpen every link in its attack chain, FBI warns

Artificial intelligence is helping Beijing’s goons break in faster and stay longer RSAC  The biggest threat to US critical infrastructure, according to FBI Deputy Assistant Director Cynthia Kaiser, can be summed up in one word: “China.”… READ MORE HERE…

Read More
The Register
April 28, 2025 TH Author

Cybersecurity CEO accused of running malware on hospital PC blabs about it on LinkedIn

Sometimes, silence is the best option An Oklahoma City cybersecurity professional accused of installing spyware on a hospital PC confirmed on LinkedIn key details of the drama.… READ MORE HERE…

Read More
Microsoft Secure
April 28, 2025 TH Author

Faster, more personalized service begins at the frontline with Microsoft Intune

Secure, cloud-based endpoint management helps healthcare providers empower frontline staff and improve patient care.
The post Faster, more personalized service begins at the frontline with Microsoft Intune appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
  • ← Previous
  • Next →

Newsletter

Stay updated with Cyber Security

LATEST NEWS

  • Accused data thief threw MacBook into a river to destroy evidence December 29, 2025
  • I’ve tried nearly every browser out there and these are my top 4 (spoiler: none are Chrome) December 29, 2025
  • Death, torture, and amputation: How cybercrime shook the world in 2025 December 28, 2025
  • Your Samsung phone has a secret Wi-Fi menu that can solve most internet problems – how to access December 28, 2025
  • Is ChatGPT Plus worth your $20? Here’s how it compares to Free and Pro plans December 28, 2025

Most Liked Weekly

  • No results were found in "week" period

Advertisement

Threatshub.org sponsored-Post

CYBERSECURITY INDUSTRY

  • CyberSecurity Blogs
  • DarkReading |TI
  • Microsoft Secure
  • Networkworld
  • Packet Storm
  • Reddit
  • The Register
  • Threatpost
  • TrendMicro
  • Wired
  • ZDNet | Security

Communities

  • Exclusive Telegram Channel
  • Join LinkedIn Community
  • ThreatsHub Group on Facebook
  • ThreatsHub Group on Google Plus
  • ThreatsHub Users Group on Reddit
  • About Pages

  • About ThreatsHub Blog
  • Meet the team
  • We Donate to ThreatsHub Projects
  • Contact Us
  • Stay in Touch with ThreatsHub

  • Follow us on Facebook
  • Follow us on Google Plus
  • Follow us on Twitter