Skip to content
Thursday, January 1, 2026
Latest:
  • European Space Agency hit again as cybercrims claim 200 GB data up for sale
  • Amazon is selling the Meta Quest 3S for as low as $250 (and it comes with a free $50 credit)
  • I recommend bringing these 6 wellness gadgets into 2026 – here’s why
  • Hong Kong’s newest anti-scam technology is over-the-counter banking
  • How to clear the cache on your TV (and why it makes such a big difference)
ThreatsHub.org

  • Home
  • Main Page
  • Cyber Security News
    • Malware
    • Security
    • Vulnerabilities
    • Cloud and Web Security
  • About
    • About ThreatsHub Blog
    • Media Kit
    • Terms of Service
    • Privacy Statement

Cyber Security Trending News

The Register

European Space Agency hit again as cybercrims claim 200 GB data up for sale

December 31, 2025 TH Author

As in past incidents, ESA says the impact was limited to external systems The European Space Agency has suffered yet another security incident and, in keeping with past practice, says the impact is limited. Meanwhile, miscreants boast that they’ve made off with a trove of data, including what they claim are confidential documents, credentials, and source code.… READ MORE HERE…




The Register
January 28, 2025 TH Author

Baguette bandits strike again with ransomware and a side of mockery

Big-game hunting to the extreme Hellcat, the ransomware crew that infected Schneider Electric and demanded $125,000 in baguettes, has aggressively targeted government, education, energy, and other critical industries since it emerged around mid-2024.… READ MORE HERE…

Read More
ZDNet | Security
January 28, 2025 TH Author

This new Android feature protects your phone, even if someone has your PIN

If you’re looking for an additional layer of security for your Android device, Google’s Identity Check might be just the ticket. Here’s how it works.READ MORE HERE…

Read More
Microsoft Secure
January 28, 2025 TH Author

3 priorities for adopting proactive identity and access security in 2025

Adopting proactive defensive measures is the only way to get ahead of determined efforts to compromise identities and gain access to your environment.
The post 3 priorities for adopting proactive identity and access security in 2025 appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
ZDNet | Security
January 28, 2025 TH Author

Microsoft Edge offers new tool to combat scareware – here’s how it works

Edge’s new scareware blocker aims to protect you from malicious websites that try to scam you through fear tactics. Here’s how to opt in.READ MORE HERE…

Read More
ZDNet | Security
January 28, 2025 TH Author

How to protect your privacy from Facebook – and what doesn’t work

Bothered by Facebook looking over your shoulder? Here are some ways to keep Meta from being such a snooper.READ MORE HERE…

Read More
The Register
January 28, 2025 TH Author

Apple plugs security hole in its iThings that’s already been exploited in iOS

Cupertino kicks off the year with a zero-day Apple has plugged a security hole in the software at the heart of its iPhones, iPads, Vision Pro goggles, Apple TVs and macOS Sequoia Macs, warning some miscreants have already exploited the bug.… READ MORE HERE…

Read More
The Register
January 27, 2025 TH Author

US freezes foreign aid, halting cybersecurity defense and policy funds for allies

Uncle Sam will ‘no longer blindly dole out money,’ State Dept says US Secretary of State Marco Rubio has frozen nearly all foreign aid cash for a full-on government review, including funds to defend America’s allies from cyberattacks as well as steer international computer security policies.… READ MORE HERE…

Read More
Microsoft Secure
January 27, 2025 TH Author

Fast-track generative AI security with Microsoft Purview

Read how Microsoft Purview can secure and govern generative AI quickly, with minimal user impact, deployment resources, and change management.
The post Fast-track generative AI security with Microsoft Purview appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
The Register
January 27, 2025 TH Author

British Museum says ex-contractor ‘shut down’ IT systems, wreaked havoc

Former freelancer cuffed a week after being dismissed by UK’s top visitor attraction The British Museum was forced to temporarily close some galleries and exhibitions this weekend after a disgruntled former tech contractor went rogue and shuttered some onsite IT systems.… READ MORE HERE…

Read More
The Register
January 25, 2025 TH Author

Someone is slipping a hidden backdoor into Juniper routers across the globe, activated by a magic packet

Who could be so interested in chips, manufacturing, and more, in the US, UK, Europe, Russia… Someone has been quietly backdooring selected Juniper routers around the world in key sectors including semiconductor, energy, and manufacturing, since at least mid-2023.… READ MORE HERE…

Read More
  • ← Previous
  • Next →

Newsletter

Stay updated with Cyber Security

LATEST NEWS

  • European Space Agency hit again as cybercrims claim 200 GB data up for sale December 31, 2025
  • Amazon is selling the Meta Quest 3S for as low as $250 (and it comes with a free $50 credit) December 31, 2025
  • I recommend bringing these 6 wellness gadgets into 2026 – here’s why December 31, 2025
  • Hong Kong’s newest anti-scam technology is over-the-counter banking December 31, 2025
  • How to clear the cache on your TV (and why it makes such a big difference) December 30, 2025

Most Liked Weekly

  • No results were found in "week" period

Advertisement

Threatshub.org sponsored-Post

CYBERSECURITY INDUSTRY

  • CyberSecurity Blogs
  • DarkReading |TI
  • Microsoft Secure
  • Networkworld
  • Packet Storm
  • Reddit
  • The Register
  • Threatpost
  • TrendMicro
  • Wired
  • ZDNet | Security

Communities

  • Exclusive Telegram Channel
  • Join LinkedIn Community
  • ThreatsHub Group on Facebook
  • ThreatsHub Group on Google Plus
  • ThreatsHub Users Group on Reddit
  • About Pages

  • About ThreatsHub Blog
  • Meet the team
  • We Donate to ThreatsHub Projects
  • Contact Us
  • Stay in Touch with ThreatsHub

  • Follow us on Facebook
  • Follow us on Google Plus
  • Follow us on Twitter