Skip to content
Monday, December 29, 2025
Latest:
  • Accused data thief threw MacBook into a river to destroy evidence
  • I’ve tried nearly every browser out there and these are my top 4 (spoiler: none are Chrome)
  • Death, torture, and amputation: How cybercrime shook the world in 2025
  • Your Samsung phone has a secret Wi-Fi menu that can solve most internet problems – how to access
  • Is ChatGPT Plus worth your $20? Here’s how it compares to Free and Pro plans
ThreatsHub.org

  • Home
  • Main Page
  • Cyber Security News
    • Malware
    • Security
    • Vulnerabilities
    • Cloud and Web Security
  • About
    • About ThreatsHub Blog
    • Media Kit
    • Terms of Service
    • Privacy Statement

Cyber Security Trending News

The Register

Accused data thief threw MacBook into a river to destroy evidence

December 29, 2025 TH Author

Former staffer of Korean e-tailer Coupang accessed 33 million records but may have done less damage than feared Korean e-tailer Coupang claims a former employee has admitted to improperly accessing data describing 33 million of its customers, but says the accused deleted the stolen data.… READ MORE HERE…




The Register
April 14, 2025 TH Author

Don’t delete that mystery empty folder. Windows put it there as a security fix

Copilot vibe coding for OS development? Why not Canny Windows users who’ve spotted a mysterious folder on hard drives after applying last week’s security patches for the operating system can rest assured – it’s perfectly benign. In fact, it’s recommended you leave the directory there.… READ MORE HERE…

Read More
Microsoft Secure
April 14, 2025 TH Author

Explore how to secure AI by attending our Learn Live Series

Register to attend one or all our Learn Live sessions to learn how to secure your environment for AI adoption.
The post Explore how to secure AI by attending our Learn Live Series appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
ZDNet | Security
April 14, 2025 TH Author

Windows warning: Don’t delete that weird ‘inetpub’ folder. Already did? Here’s your fix

It may look empty, but that folder is tied to a new security patch – and it shouldn’t be removed.READ MORE HERE…

Read More
ZDNet | Security
April 14, 2025 TH Author

OpenAI used to test its AI models for months – now it’s days. Why that matters

The change is meant to speed things up, but some staff are calling it ‘a recipe for disaster.’READ MORE HERE…

Read More
The Register
April 14, 2025 TH Author

Official abuse of state security has always been bad, now it’s horrifying

UK holds onto oversight by a whisker, but it’s utterly barefaced on the other side of the pond Opinion  The UK government’s attempts to worm into Apple’s core end-to-end encryption were set back last week when the country’s Home Office failed in its bid to keep them secret on national security grounds.… READ MORE HERE…

Read More
The Register
April 14, 2025 TH Author

Old Fortinet flaws under attack with new method its patch didn’t prevent

PLUS: Chinese robodogs include backdoor; OpenAI helps spammer; A Dutch data disaster; And more! Infosec In Brief  Fortinet last week admitted that attackers have found new ways to exploit three flaws it thought it had fixed last year.… READ MORE HERE…

Read More
TrendMicro
April 14, 2025 TH Author

BPFDoor’s Hidden Controller Used Against Asia, Middle East Targets

A controller linked to BPF backdoor can open a reverse shell, enabling deeper infiltration into compromised networks. Recent attacks have been observed targeting the telecommunications, finance, and retail sectors across South Korea, Hong Kong, Myanmar, Malaysia, and Egypt. Read More HERE…

Read More
The Register
April 12, 2025 TH Author

LLMs can’t stop making up software dependencies and sabotaging everything

Hallucinated package names fuel ‘slopsquatting’ The rise of LLM-powered code generation tools is reshaping how developers write software – and introducing new risks to the software supply chain in the process.… READ MORE HERE…

Read More
The Register
April 12, 2025 TH Author

AI can’t stop making up software dependencies and sabotaging everything

Hallucinated package names fuel ‘slopsquatting’ The rise of AI-powered code generation tools is reshaping how developers write software – and introducing new risks to the software supply chain in the process.… READ MORE HERE…

Read More
ZDNet | Security
April 12, 2025 TH Author

5 warning signs that your phone’s been hacked – and how to fight back

Here are the biggest warning signs that your phone may be compromised and the secret codes that can tell you all about it.READ MORE HERE…

Read More
  • ← Previous
  • Next →

Newsletter

Stay updated with Cyber Security

LATEST NEWS

  • Accused data thief threw MacBook into a river to destroy evidence December 29, 2025
  • I’ve tried nearly every browser out there and these are my top 4 (spoiler: none are Chrome) December 29, 2025
  • Death, torture, and amputation: How cybercrime shook the world in 2025 December 28, 2025
  • Your Samsung phone has a secret Wi-Fi menu that can solve most internet problems – how to access December 28, 2025
  • Is ChatGPT Plus worth your $20? Here’s how it compares to Free and Pro plans December 28, 2025

Most Liked Weekly

  • No results were found in "week" period

Advertisement

Threatshub.org sponsored-Post

CYBERSECURITY INDUSTRY

  • CyberSecurity Blogs
  • DarkReading |TI
  • Microsoft Secure
  • Networkworld
  • Packet Storm
  • Reddit
  • The Register
  • Threatpost
  • TrendMicro
  • Wired
  • ZDNet | Security

Communities

  • Exclusive Telegram Channel
  • Join LinkedIn Community
  • ThreatsHub Group on Facebook
  • ThreatsHub Group on Google Plus
  • ThreatsHub Users Group on Reddit
  • About Pages

  • About ThreatsHub Blog
  • Meet the team
  • We Donate to ThreatsHub Projects
  • Contact Us
  • Stay in Touch with ThreatsHub

  • Follow us on Facebook
  • Follow us on Google Plus
  • Follow us on Twitter