Skip to content
Monday, December 29, 2025
Latest:
  • Accused data thief threw MacBook into a river to destroy evidence
  • I’ve tried nearly every browser out there and these are my top 4 (spoiler: none are Chrome)
  • Death, torture, and amputation: How cybercrime shook the world in 2025
  • Your Samsung phone has a secret Wi-Fi menu that can solve most internet problems – how to access
  • Is ChatGPT Plus worth your $20? Here’s how it compares to Free and Pro plans
ThreatsHub.org

  • Home
  • Main Page
  • Cyber Security News
    • Malware
    • Security
    • Vulnerabilities
    • Cloud and Web Security
  • About
    • About ThreatsHub Blog
    • Media Kit
    • Terms of Service
    • Privacy Statement

Cyber Security Trending News

The Register

Accused data thief threw MacBook into a river to destroy evidence

December 29, 2025 TH Author

Former staffer of Korean e-tailer Coupang accessed 33 million records but may have done less damage than feared Korean e-tailer Coupang claims a former employee has admitted to improperly accessing data describing 33 million of its customers, but says the accused deleted the stolen data.… READ MORE HERE…




ZDNet | Security
August 12, 2025 TH Author

This Bluetooth tracker’s latest feature could save your life – but it costs extra

Pebblebee’s Clip gets an Alert Live upgrade that shares your real-time location in an emergency.READ MORE HERE…

Read More
The Register
August 12, 2025 TH Author

Major outage at Pennsylvania Attorney General’s Office blamed on ‘cyber incident’

Website, emails, and phones are down for a second day The Pennsylvania’s Office of Attorney General (OAG) is blaming a digital blackout of its services on a “cyber incident.”… READ MORE HERE…

Read More
Microsoft Secure
August 12, 2025 TH Author

Dow’s 125-year legacy: Innovating with AI to secure a long future

Microsoft recently spoke with Mario Ferket, Chief Information Security Officer for Dow, about the company’s approach to AI in security.
The post Dow’s 125-year legacy: Innovating with AI to secure a long future appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
The Register
August 12, 2025 TH Author

Poisoned telemetry can turn AIOps into AI Oops, researchers show

Sysadmins, your job is safe Automating IT operations using AI may not be the best idea at the moment.… READ MORE HERE…

Read More
ZDNet | Security
August 12, 2025 TH Author

Don’t fall for AI-powered disinformation attacks online – here’s how to stay sharp

AI is already challenging our reality. Here are expert tools and tips that anyone can use to spot manipulation, verify information, and protect their organization from narrative attacks.READ MORE HERE…

Read More
TrendMicro
August 12, 2025 TH Author

New Ransomware Charon Uses Earth Baxia APT Techniques To Target Enterprises

We uncovered Charon, a new ransomware strainfamily that uses advanced APT-style techniques, including DLL sideloading, process injection, and anti-EDR capabilities, to target organizations with customized ransom demands. Read More HERE…

Read More
ZDNet | Security
August 11, 2025 TH Author

Finally, I found a portable charger that checks all of my boxes for traveling

The Voltme Hypercore 10K delivers 10,000mAh of power in a slim, pocket-friendly design.READ MORE HERE…

Read More
The Register
August 11, 2025 TH Author

Russia’s RomCom among those exploiting a WinRAR 0-day in highly-targeted attacks

A few weeks earlier ‘zeroplayer’ advertised an $80K WinRAR 0-day exploit Russia-linked attackers found and exploited a high-severity WinRAR vulnerability before the maintainers of the Windows file archiver issued a fix.… READ MORE HERE…

Read More
ZDNet | Security
August 11, 2025 TH Author

I tested GPT-5’s coding skills, and it was so bad that I’m sticking with GPT-4o (for now)

According to my LLM testing, ChatGPT has been the gold standard of programming tools, but GPT-5 stumbled badly, delivering broken plugins, flawed scripts, and errors that could derail projects without careful human oversight.READ MORE HERE…

Read More
The Register
August 10, 2025 TH Author

Trend Micro offers weak workaround for already-exploited critical vuln in management console

PLUS: Crypto mixer founders plead guilty; Another French telco hacked; Meta fights WhatsApp scams; And more! Infosec In Brief  A critical vulnerability in the on-prem version of Trend Micro’s Apex One endpoint security platform is under active exploitation, the company admitted last week, and there’s no patch available.… READ MORE HERE…

Read More
  • ← Previous
  • Next →

Newsletter

Stay updated with Cyber Security

LATEST NEWS

  • Accused data thief threw MacBook into a river to destroy evidence December 29, 2025
  • I’ve tried nearly every browser out there and these are my top 4 (spoiler: none are Chrome) December 29, 2025
  • Death, torture, and amputation: How cybercrime shook the world in 2025 December 28, 2025
  • Your Samsung phone has a secret Wi-Fi menu that can solve most internet problems – how to access December 28, 2025
  • Is ChatGPT Plus worth your $20? Here’s how it compares to Free and Pro plans December 28, 2025

Most Liked Weekly

  • No results were found in "week" period

Advertisement

Threatshub.org sponsored-Post

CYBERSECURITY INDUSTRY

  • CyberSecurity Blogs
  • DarkReading |TI
  • Microsoft Secure
  • Networkworld
  • Packet Storm
  • Reddit
  • The Register
  • Threatpost
  • TrendMicro
  • Wired
  • ZDNet | Security

Communities

  • Exclusive Telegram Channel
  • Join LinkedIn Community
  • ThreatsHub Group on Facebook
  • ThreatsHub Group on Google Plus
  • ThreatsHub Users Group on Reddit
  • About Pages

  • About ThreatsHub Blog
  • Meet the team
  • We Donate to ThreatsHub Projects
  • Contact Us
  • Stay in Touch with ThreatsHub

  • Follow us on Facebook
  • Follow us on Google Plus
  • Follow us on Twitter