Skip to content
Tuesday, December 30, 2025
Latest:
  • Indian cops cuff ex-Coinbase rep over selling customer info to crims
  • Samsung just unveiled its first Wi-Fi speakers ahead of CES 2026, and they look splurge-worthy
  • Accused data thief threw MacBook into a river to destroy evidence
  • I’ve tried nearly every browser out there and these are my top 4 (spoiler: none are Chrome)
  • Death, torture, and amputation: How cybercrime shook the world in 2025
ThreatsHub.org

  • Home
  • Main Page
  • Cyber Security News
    • Malware
    • Security
    • Vulnerabilities
    • Cloud and Web Security
  • About
    • About ThreatsHub Blog
    • Media Kit
    • Terms of Service
    • Privacy Statement

Cyber Security Trending News

The Register

Indian cops cuff ex-Coinbase rep over selling customer info to crims

December 29, 2025 TH Author

There’s more where that came from, CEO says Rogue insiders suspected of taking bribes to hand over Coinbase customer records to criminals are beginning to face justice, according to CEO Brian Armstrong.… READ MORE HERE…




ZDNet | Security
June 3, 2025 TH Author

Wyze’s new Bulb Cam turns any light socket into a 2K camera – for just $50

The new Wyze Bulb Cam replaces light bulbs and offers extra security coverage built into a motion-activated smart light.READ MORE HERE…

Read More
The Register
June 2, 2025 TH Author

Ukrainians smuggle drones hidden in cabins on trucks to strike Russian airfields

A real-world Trojan Horse attack Ukraine claims it launched a cunning drone strike on Sunday against multiple Russian airbases, hitting over 40 military aircraft and inflicting an estimated $7 billion in damage, in an operation dubbed “Spiderweb.”… READ MORE HERE…

Read More
ZDNet | Security
June 2, 2025 TH Author

Southwest has new rule that changes how you charge your phone mid-flight

Packing a portable charger for your next flight? Better read up on Southwest’s latest policy change.READ MORE HERE…

Read More
Microsoft Secure
June 2, 2025 TH Author

Discover how automatic attack disruption protects critical assets while ensuring business continuity

To help security teams protect critical assets while ensuring business continuity, Microsoft Defender developed automatic attack disruption: a built-in self-defense capability.
The post Discover how automatic attack disruption protects critical assets while ensuring business continuity appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
Microsoft Secure
June 2, 2025 TH Author

Announcing a new strategic collaboration to bring clarity to threat actor naming

Microsoft and CrowdStrike are teaming up to create alignment across our individual threat actor taxonomies to help security professionals connect insights faster.
The post Announcing a new strategic collaboration to bring clarity to threat actor naming appeared first on Microsoft Security Blog. READ MORE HERE…

Read More
The Register
June 2, 2025 TH Author

US community bank says thieves drained customer data through third party hole

Disclosure at MainStreet Bancshares comes as American finance orgs beg for looser reporting requirements Community bank MainStreet Bancshares says thieves stole data belonging to some of its customers during an attack on a third-party provider.… READ MORE HERE…

Read More
The Register
June 2, 2025 TH Author

Lumma infostealer takedown may have inflicted only a flesh wound as crew keeps pinching and selling data

PLUS: Ransomware gang using tech support scam; Czechia accuses China of infrastructure attack; And more! Infosec In Brief  Despite last week’s FBI announcement that it helped to take down the crew behind the Lumma infostealer, the malware continues to operate.… READ MORE HERE…

Read More
The Register
May 31, 2025 TH Author

Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump

‘It’s a high-stakes intelligence war’ he told El Reg exclusive  A mystery whistleblower calling himself GangExposed has exposed key figures behind the Conti and Trickbot ransomware crews, publishing a trove of internal files and naming names.… READ MORE HERE…

Read More
The Register
May 30, 2025 TH Author

ConnectWise customers get mysterious warning about ‘sophisticated’ nation-state hack

Pen tester on ScreenConnect bug: This one ‘terrifies’ me ConnectWise has brought in the big guns to investigate a “sophisticated nation state actor” that broke into its IT environment and then breached some of its customers.… READ MORE HERE…

Read More
The Register
May 30, 2025 TH Author

Feds arrest DoD techie, claim he dumped top secret files in park for foreign spies to find

28-year-old alleged to have made multiple drops to folks who turned out to be undercover FBI agents A Defense Intelligence Agency (DIA) IT specialist is scheduled to appear in court today after being caught by the FBI trying to surreptitiously drop top secret information to a foreign government in a public park.… READ MORE HERE…

Read More
  • ← Previous
  • Next →

Newsletter

Stay updated with Cyber Security

LATEST NEWS

  • Indian cops cuff ex-Coinbase rep over selling customer info to crims December 29, 2025
  • Samsung just unveiled its first Wi-Fi speakers ahead of CES 2026, and they look splurge-worthy December 29, 2025
  • Accused data thief threw MacBook into a river to destroy evidence December 29, 2025
  • I’ve tried nearly every browser out there and these are my top 4 (spoiler: none are Chrome) December 29, 2025
  • Death, torture, and amputation: How cybercrime shook the world in 2025 December 28, 2025

Most Liked Weekly

  • No results were found in "week" period

Advertisement

Threatshub.org sponsored-Post

CYBERSECURITY INDUSTRY

  • CyberSecurity Blogs
  • DarkReading |TI
  • Microsoft Secure
  • Networkworld
  • Packet Storm
  • Reddit
  • The Register
  • Threatpost
  • TrendMicro
  • Wired
  • ZDNet | Security

Communities

  • Exclusive Telegram Channel
  • Join LinkedIn Community
  • ThreatsHub Group on Facebook
  • ThreatsHub Group on Google Plus
  • ThreatsHub Users Group on Reddit
  • About Pages

  • About ThreatsHub Blog
  • Meet the team
  • We Donate to ThreatsHub Projects
  • Contact Us
  • Stay in Touch with ThreatsHub

  • Follow us on Facebook
  • Follow us on Google Plus
  • Follow us on Twitter