Skip to content
Monday, December 29, 2025
Latest:
  • Accused data thief threw MacBook into a river to destroy evidence
  • I’ve tried nearly every browser out there and these are my top 4 (spoiler: none are Chrome)
  • Death, torture, and amputation: How cybercrime shook the world in 2025
  • Your Samsung phone has a secret Wi-Fi menu that can solve most internet problems – how to access
  • Is ChatGPT Plus worth your $20? Here’s how it compares to Free and Pro plans
ThreatsHub.org

  • Home
  • Main Page
  • Cyber Security News
    • Malware
    • Security
    • Vulnerabilities
    • Cloud and Web Security
  • About
    • About ThreatsHub Blog
    • Media Kit
    • Terms of Service
    • Privacy Statement

Cyber Security Trending News

The Register

Accused data thief threw MacBook into a river to destroy evidence

December 29, 2025 TH Author

Former staffer of Korean e-tailer Coupang accessed 33 million records but may have done less damage than feared Korean e-tailer Coupang claims a former employee has admitted to improperly accessing data describing 33 million of its customers, but says the accused deleted the stolen data.… READ MORE HERE…




TrendMicro
June 6, 2025 TH Author

NEOM McLaren Formula E Team & Trend Micro Innovation History

Explore how innovation becomes a team sport when Trend Micro and the NEOM McLaren Formula E Team leaders come together to talk culture, risk, and forward thinking. Read More HERE…

Read More
The Register
June 5, 2025 TH Author

Uncle Sam puts $10M bounty on RedLine dev and Russia-backed cronies

Any info on Maxim Rudometov and his associates? There’s $$$ in it for you The US government is offering up to $10 million for information on foreign government-backed threat actors linked to the RedLine malware, including its suspected developer, Maxim Alexandrovich Rudometov.… READ MORE HERE…

Read More
The Register
June 5, 2025 TH Author

BidenCash busted as Feds nuke stolen credit card bazaar

Dark web crime platform raked in $17M+ over three years of operation Uncle Sam has seized 145 domains tied to BidenCash, the notorious dark web market that trafficked in more than 15 million stolen credit cards.… READ MORE HERE…

Read More
Microsoft Secure
June 5, 2025 TH Author

Connect with us at the Gartner Security & Risk Management Summit

Microsoft will spotlight ​​its AI-first, end-to-end security platform at the Gartner Security & Risk Management Summit. Read our blog post for details on how to connect with us there and a teaser of what to expect from our sessions.​​
The post Connect with us at the Gartner Security & Risk Management Summit appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure
June 5, 2025 TH Author

Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity: Part 3

Meet the minds behind how Microsoft prioritizes cybersecurity across every team and employee.
The post Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity: Part 3 appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
ZDNet | Security
June 5, 2025 TH Author

Cybercriminals are stealing business Salesforce data with this simple trick – don’t fall for it

The goal is to steal large amounts of confidential data in an attempt to extort the victims. Here’s how it works.READ MORE HERE…

Read More
ZDNet | Security
June 5, 2025 TH Author

Is your Asus router part of a botnet? How to check – and what you can do

Cybercriminals have hacked into thousands of Asus routers. Here’s how to tell if yours is compromised.READ MORE HERE…

Read More
ZDNet | Security
June 5, 2025 TH Author

How to turn off Gemini in your Gmail, Docs, Photos, and more – it’s easy to opt out

It’s a little hidden, but there is a way to remove Gemini from your favorite Google services.READ MORE HERE…

Read More
The Register
June 5, 2025 TH Author

AI kept 15-year-old zombie vuln alive, but its time is drawing near

Researchers have come up with a fix for a path traversal bug first spotted in 2010 A security bug that surfaced fifteen years ago in a public post on GitHub has survived developers’ attempts on its life.… READ MORE HERE…

Read More
The Register
June 4, 2025 TH Author

Fake IT support calls hit 20 orgs, end in stolen Salesforce data and extortion, Google warns

Victims include hospitality, retail and education sectors A group of financially motivated cyberscammers who specialize in Scattered-Spider-like fake IT support phone calls managed to trick employees at about 20 organizations into installing a modified version of Salesforce’s Data Loader that allows the crims to steal sensitive data.… READ MORE HERE…

Read More
  • ← Previous
  • Next →

Newsletter

Stay updated with Cyber Security

LATEST NEWS

  • Accused data thief threw MacBook into a river to destroy evidence December 29, 2025
  • I’ve tried nearly every browser out there and these are my top 4 (spoiler: none are Chrome) December 29, 2025
  • Death, torture, and amputation: How cybercrime shook the world in 2025 December 28, 2025
  • Your Samsung phone has a secret Wi-Fi menu that can solve most internet problems – how to access December 28, 2025
  • Is ChatGPT Plus worth your $20? Here’s how it compares to Free and Pro plans December 28, 2025

Most Liked Weekly

  • No results were found in "week" period

Advertisement

Threatshub.org sponsored-Post

CYBERSECURITY INDUSTRY

  • CyberSecurity Blogs
  • DarkReading |TI
  • Microsoft Secure
  • Networkworld
  • Packet Storm
  • Reddit
  • The Register
  • Threatpost
  • TrendMicro
  • Wired
  • ZDNet | Security

Communities

  • Exclusive Telegram Channel
  • Join LinkedIn Community
  • ThreatsHub Group on Facebook
  • ThreatsHub Group on Google Plus
  • ThreatsHub Users Group on Reddit
  • About Pages

  • About ThreatsHub Blog
  • Meet the team
  • We Donate to ThreatsHub Projects
  • Contact Us
  • Stay in Touch with ThreatsHub

  • Follow us on Facebook
  • Follow us on Google Plus
  • Follow us on Twitter