Skip to content
Sunday, December 28, 2025
Latest:
  • Death, torture, and amputation: How cybercrime shook the world in 2025
  • Your Samsung phone has a secret Wi-Fi menu that can solve most internet problems – how to access
  • Is ChatGPT Plus worth your $20? Here’s how it compares to Free and Pro plans
  • Bye bye, Wi-Fi: How to add a wired network to your home without running Ethernet
  • Bad Wi-Fi at home? Try my 10 go-to ways to fix your internet this weekend
ThreatsHub.org

  • Home
  • Main Page
  • Cyber Security News
    • Malware
    • Security
    • Vulnerabilities
    • Cloud and Web Security
  • About
    • About ThreatsHub Blog
    • Media Kit
    • Terms of Service
    • Privacy Statement

Cyber Security Trending News

The Register

Death, torture, and amputation: How cybercrime shook the world in 2025

December 28, 2025 TH Author

The human harms of cyberattacks piled up this year, and violence expected to increase The knock-on, and often unintentional, impacts of a cyberattack are so rarely discussed. As an industry, the focus is almost always placed on the economic damage: the ransom payment; the cost of business downtime; and goodness, don’t forget those poor shareholders.… READ MORE HERE…




ZDNet | Security
December 4, 2025 TH Author

After using an Android phone with liquid cooling, I’m not sure if I can go back to my Pixel

With snappy performance and even better efficiency, the Redmagic 11 Pro boasts the best mobile gaming I’ve tested to date.READ MORE HERE…

Read More
The Register
December 4, 2025 TH Author

Rust core library partly polished for industrial safety spec

Ferrous Systems achieves IEC 61508 (SIL 2) certification for systems that demand reliability Memory-safe Rust code can now be more broadly applied in devices that require electronic system safety, at least as measured by International Electrotechnical Commission (IEC) standards.… READ MORE HERE…

Read More
TrendMicro
December 4, 2025 TH Author

Project View: A New Era of Prioritized and Actionable Cloud Security

In today’s cloud-first world, security teams face an overwhelming flood of alerts, fragmented visibility, and reactive workflows. The complexity of modern cloud environments—spanning multi-cloud deployments, ephemeral assets, and decentralized ownership—demands a new approach to risk management. Read More HERE…

Read More
ZDNet | Security
December 3, 2025 TH Author

I changed 5 settings on my TV to quickly improve the picture quality (Samsung and LG models included)

Making a few simple adjustments to your TV’s basic settings can instantly sharpen the picture and enhance your viewing experience.READ MORE HERE…

Read More
The Register
December 3, 2025 TH Author

Here’s your worst nightmare: E-tailer can only resume partial sales 45 days after ransomware attack

Japan’s Askul still can’t run all its sites, but at least the fax line held up OK Japanese e-tailer Askul has resumed online sales, 45 days after a ransomware attack.… READ MORE HERE…

Read More
ZDNet | Security
December 3, 2025 TH Author

The best Walmart Cyber Monday deals are still live: Shop the top 35 sales while you can

Cyber Monday is over, but many of Walmart’s best deals are still live — including on the Nintendo Switch 2, PS5, and Apple products.READ MORE HERE…

Read More
The Register
December 3, 2025 TH Author

Indian government reveals GPS spoofing at eight major airports

Extra infosec investments are taxiing towards the runway India’s Civil Aviation Minister has revealed that local authorities have detected GPS spoofing and jamming at eight major airports.… READ MORE HERE…

Read More
TrendMicro
December 3, 2025 TH Author

PureRAT Campaign Targets Job Seekers, Abuses Foxit PDF Reader for DLL Side-loading

Job seekers looking out for opportunities might instead find their personal devices compromised, as a PureRAT campaign propagated through email leverages Foxit PDF Reader for concealment and DLL side-loading for initial entry. Read More HERE…

Read More
TrendMicro
December 3, 2025 TH Author

ValleyRAT Campaign Targets Job Seekers, Abuses Foxit PDF Reader for DLL Side-loading

Job seekers looking out for opportunities might instead find their personal devices compromised, as a ValleyRAT campaign propagated through email leverages Foxit PDF Reader for concealment and DLL side-loading for initial entry. Read More HERE…

Read More
Microsoft Secure
December 2, 2025 TH Author

How to build forward-thinking cybersecurity teams for tomorrow

To secure the future, we must future-proof our cybersecurity talent and develop teams that are agile, innovative, and perpetually learning.
The post How to build forward-thinking cybersecurity teams for tomorrow appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
  • ← Previous
  • Next →

Newsletter

Stay updated with Cyber Security

LATEST NEWS

  • Death, torture, and amputation: How cybercrime shook the world in 2025 December 28, 2025
  • Your Samsung phone has a secret Wi-Fi menu that can solve most internet problems – how to access December 28, 2025
  • Is ChatGPT Plus worth your $20? Here’s how it compares to Free and Pro plans December 28, 2025
  • Bye bye, Wi-Fi: How to add a wired network to your home without running Ethernet December 27, 2025
  • Bad Wi-Fi at home? Try my 10 go-to ways to fix your internet this weekend December 27, 2025

Most Liked Weekly

  • No results were found in "week" period

Advertisement

Threatshub.org sponsored-Post

CYBERSECURITY INDUSTRY

  • CyberSecurity Blogs
  • DarkReading |TI
  • Microsoft Secure
  • Networkworld
  • Packet Storm
  • Reddit
  • The Register
  • Threatpost
  • TrendMicro
  • Wired
  • ZDNet | Security

Communities

  • Exclusive Telegram Channel
  • Join LinkedIn Community
  • ThreatsHub Group on Facebook
  • ThreatsHub Group on Google Plus
  • ThreatsHub Users Group on Reddit
  • About Pages

  • About ThreatsHub Blog
  • Meet the team
  • We Donate to ThreatsHub Projects
  • Contact Us
  • Stay in Touch with ThreatsHub

  • Follow us on Facebook
  • Follow us on Google Plus
  • Follow us on Twitter