Skip to content
Monday, December 29, 2025
Latest:
  • Accused data thief threw MacBook into a river to destroy evidence
  • I’ve tried nearly every browser out there and these are my top 4 (spoiler: none are Chrome)
  • Death, torture, and amputation: How cybercrime shook the world in 2025
  • Your Samsung phone has a secret Wi-Fi menu that can solve most internet problems – how to access
  • Is ChatGPT Plus worth your $20? Here’s how it compares to Free and Pro plans
ThreatsHub.org

  • Home
  • Main Page
  • Cyber Security News
    • Malware
    • Security
    • Vulnerabilities
    • Cloud and Web Security
  • About
    • About ThreatsHub Blog
    • Media Kit
    • Terms of Service
    • Privacy Statement

Cyber Security Trending News

The Register

Accused data thief threw MacBook into a river to destroy evidence

December 29, 2025 TH Author

Former staffer of Korean e-tailer Coupang accessed 33 million records but may have done less damage than feared Korean e-tailer Coupang claims a former employee has admitted to improperly accessing data describing 33 million of its customers, but says the accused deleted the stolen data.… READ MORE HERE…




The Register
September 10, 2025 TH Author

Akira ransomware crims abusing trifecta of SonicWall security holes for extortion attacks

Patch, turn on MFA, and restrict access to trusted networks…or else Affiliates of the Akira ransomware gang are again exploiting a critical SonicWall vulnerability abused last summer, after a suspected zero-day flaw actually turned out to be related to a year-old bug.… READ MORE HERE…

Read More
The Register
September 10, 2025 TH Author

Uncle Sam indicts alleged ransomware kingpin tied to $18B in damages

Prosecutors claim Ukrainian ran LockerGoga, MegaCortex, and Nefilim ops – $11M bounty on his head A Ukrainian national faces serious federal charges and an $11 million bounty after allegedly orchestrating ransomware operations that caused an estimated $18 billion in damages across hundreds of organizations worldwide.… READ MORE HERE…

Read More
ZDNet | Security
September 10, 2025 TH Author

iPhone 17 Pro vs. iPhone 14 Pro: Why I’m upgrading to this years model after three years

The iPhone 17 Pro has officially been unveiled, but should you upgrade? Apple says yes, but we say maybe.READ MORE HERE…

Read More
ZDNet | Security
September 10, 2025 TH Author

How the AirPods Pro 3 may make this Apple user ditch the Watch for good

I’ve been slowly moving away from my Apple Watch, and with the AirPods Pro 3’s promising health features, I might never put it back on.READ MORE HERE…

Read More
TrendMicro
September 10, 2025 TH Author

What’s Your Cybersecurity Maturity?

This blog post looks at four key milestones along the cybersecurity maturity journey and poses some questions you can ask to determine the stage of your organization’s progress. Read More HERE…

Read More
The Register
September 9, 2025 TH Author

More packages poisoned in npm attack, but would-be crypto thieves left pocket change

Miscreants cost victims time rather than money During the two-hour window on Monday in which hijacked npm versions were available for download, malware-laced packages reached one in 10 cloud environments, according to Wiz researchers. But crypto-craving crims did little more than annoy defenders.… READ MORE HERE…

Read More
ZDNet | Security
September 9, 2025 TH Author

These rumored Apple Watch Series 11 features could put it above Google and Samsung

Having tested every major smartwatch release in 2025, here’s what’s on my Apple Watch wish list ahead of this week’s event.READ MORE HERE…

Read More
The Register
September 9, 2025 TH Author

Nokia successor HMD spawns secure device biz with Euro-made smartphone

Ivalo XE handset targets governments and security critical sectors, though Qualcomm silicon keeps it tied to the US Finnish phone maker HMD Global is launching a business unit called HMD Secure to target governments and other security-critical customers, and has its first device ready to go.… READ MORE HERE…

Read More
TrendMicro
September 9, 2025 TH Author

Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed

An analysis of the Gentlemen ransomware group, which employs advanced, adaptive tactics, techniques, and procedure to target critical industries worldwide. Read More HERE…

Read More
ZDNet | Security
September 8, 2025 TH Author

The 9 coolest gadgets I saw at IFA Berlin 2025 (including picks you can actually buy)

IFA is always packed with cutting-edge tech, but these standout innovations impressed me the most.READ MORE HERE…

Read More
  • ← Previous
  • Next →

Newsletter

Stay updated with Cyber Security

LATEST NEWS

  • Accused data thief threw MacBook into a river to destroy evidence December 29, 2025
  • I’ve tried nearly every browser out there and these are my top 4 (spoiler: none are Chrome) December 29, 2025
  • Death, torture, and amputation: How cybercrime shook the world in 2025 December 28, 2025
  • Your Samsung phone has a secret Wi-Fi menu that can solve most internet problems – how to access December 28, 2025
  • Is ChatGPT Plus worth your $20? Here’s how it compares to Free and Pro plans December 28, 2025

Most Liked Weekly

  • No results were found in "week" period

Advertisement

Threatshub.org sponsored-Post

CYBERSECURITY INDUSTRY

  • CyberSecurity Blogs
  • DarkReading |TI
  • Microsoft Secure
  • Networkworld
  • Packet Storm
  • Reddit
  • The Register
  • Threatpost
  • TrendMicro
  • Wired
  • ZDNet | Security

Communities

  • Exclusive Telegram Channel
  • Join LinkedIn Community
  • ThreatsHub Group on Facebook
  • ThreatsHub Group on Google Plus
  • ThreatsHub Users Group on Reddit
  • About Pages

  • About ThreatsHub Blog
  • Meet the team
  • We Donate to ThreatsHub Projects
  • Contact Us
  • Stay in Touch with ThreatsHub

  • Follow us on Facebook
  • Follow us on Google Plus
  • Follow us on Twitter