Skip to content
Monday, December 29, 2025
Latest:
  • Indian cops cuff ex-Coinbase rep over selling customer info to crims
  • Samsung just unveiled its first Wi-Fi speakers ahead of CES 2026, and they look splurge-worthy
  • Accused data thief threw MacBook into a river to destroy evidence
  • I’ve tried nearly every browser out there and these are my top 4 (spoiler: none are Chrome)
  • Death, torture, and amputation: How cybercrime shook the world in 2025
ThreatsHub.org

  • Home
  • Main Page
  • Cyber Security News
    • Malware
    • Security
    • Vulnerabilities
    • Cloud and Web Security
  • About
    • About ThreatsHub Blog
    • Media Kit
    • Terms of Service
    • Privacy Statement

Cyber Security Trending News

The Register

Indian cops cuff ex-Coinbase rep over selling customer info to crims

December 29, 2025 TH Author

There’s more where that came from, CEO says Rogue insiders suspected of taking bribes to hand over Coinbase customer records to criminals are beginning to face justice, according to CEO Brian Armstrong.… READ MORE HERE…




The Register
June 12, 2025 TH Author

‘Major compromise’ at NHS temping arm exposed gaping security holes

Incident responders suggested sweeping improvements following Active Directory database heist Exclusive  Cybercriminals broke into systems belonging to the UK’s NHS Professionals body in May 2024, stealing its Active Directory database, but the healthcare organization never publicly disclosed it, The Register can reveal.… READ MORE HERE…

Read More
The Register
June 12, 2025 TH Author

‘Major compromise’ at NHS temping arm exposed gaping security holes

Incident responders suggested sweeping improvements following Active Directory database heist Exclusive  Cybercriminals broke into systems belonging to the UK’s NHS Professionals body in May 2024, stealing its Active Directory database, but the healthcare organization never publicly disclosed it, The Register can reveal.… READ MORE HERE…

Read More
The Register
June 11, 2025 TH Author

DeepSeek installer or just malware in disguise? Click around and find out

‘BrowserVenom’ is pure poison Suspected cybercriminals have created a fake installer for Chinese AI model DeepSeek-R1 and loaded it with previously unknown malware called “BrowserVenom”.… READ MORE HERE…

Read More
ZDNet | Security
June 11, 2025 TH Author

Patch your Windows PC now before bootkit malware takes it over – here’s how

The flaw is able to skirt past your usual security protection and evade detection, but Microsoft has a patch.READ MORE HERE…

Read More
The Register
June 11, 2025 TH Author

Hire me! To drop malware on your computer

FIN6 moves from point-of-sale compromise to phishing recruiters In a scam that flips the script on fake IT worker schemes, cybercriminals posing as job seekers on LinkedIn and Indeed are targeting recruiters – a group hated only slightly less than digital crooks – with malware hosted on phony resume portfolio sites.… READ MORE HERE…

Read More
ZDNet | Security
June 11, 2025 TH Author

How to turn on Android’s Private DNS Mode – and why your security depends on it

Switching on Private DNS Mode on Android ensures your searches and DNS queries are encrypted, keeping them safe from prying eyes. Here’s what else you should know.READ MORE HERE…

Read More
ZDNet | Security
June 11, 2025 TH Author

I replaced my Ring with this subscription-less security camera – and it did some things better

The Aqara Camera Hub G5 Pro combines AI-powered visual recognition technology with a host of home security features.READ MORE HERE…

Read More
The Register
June 11, 2025 TH Author

CISO who helped unmask Badbox warns: Version 3 is coming

The botnet’s still alive and evolving Badbox 2.0, the botnet that infected millions of smart TV boxes and connected devices before private security researchers and law enforcement partially disrupted its infrastructure, is readying for a third round of fraud and digital attacks, according to one of the threat hunters who uncovered the original scheme.… READ MORE HERE…

Read More
TrendMicro
June 11, 2025 TH Author

Ensuring Secure Container Deployments with Image Signature Verification

Ensure your container deployments are secure with a verified image signature. Read More HERE…

Read More
TrendMicro
June 11, 2025 TH Author

Operation Secure: Trend Micro’s Threat Intelligence Fuels INTERPOL’s Infostealer Infrastructure Takedown 

In this blog, we discuss how Trend Micro played a pivotal role in Operation Secure, a multi-national law enforcement effort that dismantled the infrastructure behind widespread infostealer malware campaigns across Asia and the Pacific. Read More HERE…

Read More
  • ← Previous
  • Next →

Newsletter

Stay updated with Cyber Security

LATEST NEWS

  • Indian cops cuff ex-Coinbase rep over selling customer info to crims December 29, 2025
  • Samsung just unveiled its first Wi-Fi speakers ahead of CES 2026, and they look splurge-worthy December 29, 2025
  • Accused data thief threw MacBook into a river to destroy evidence December 29, 2025
  • I’ve tried nearly every browser out there and these are my top 4 (spoiler: none are Chrome) December 29, 2025
  • Death, torture, and amputation: How cybercrime shook the world in 2025 December 28, 2025

Most Liked Weekly

  • No results were found in "week" period

Advertisement

Threatshub.org sponsored-Post

CYBERSECURITY INDUSTRY

  • CyberSecurity Blogs
  • DarkReading |TI
  • Microsoft Secure
  • Networkworld
  • Packet Storm
  • Reddit
  • The Register
  • Threatpost
  • TrendMicro
  • Wired
  • ZDNet | Security

Communities

  • Exclusive Telegram Channel
  • Join LinkedIn Community
  • ThreatsHub Group on Facebook
  • ThreatsHub Group on Google Plus
  • ThreatsHub Users Group on Reddit
  • About Pages

  • About ThreatsHub Blog
  • Meet the team
  • We Donate to ThreatsHub Projects
  • Contact Us
  • Stay in Touch with ThreatsHub

  • Follow us on Facebook
  • Follow us on Google Plus
  • Follow us on Twitter