Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Before quantum computing arrives, this startup wants businesses that are already working on it

Truecaller now lets you hang up on scammers — on behalf of your family

Disney+ launches TikTok-style short-form video stream ‘Verts’

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Before quantum computing arrives, this startup wants businesses that are already working on it

    13 March 2026

    How to watch Jensen Huang’s Nvidia GTC 2026 keynote

    13 March 2026

    Ford’s new AI assistant will help fleet owners know if seat belts are being used

    12 March 2026

    AI ‘Actress’ Tilly Norwood Releases Worst Song I’ve Ever Heard

    12 March 2026

    AI apps struggle with long-term retention, according to a new report

    11 March 2026
  • Apps

    Truecaller now lets you hang up on scammers — on behalf of your family

    13 March 2026

    Channel Surfer lets you watch YouTube like it’s old-school cable TV

    13 March 2026

    Google Maps is getting an AI ‘Ask Maps’ feature and upgraded ‘immersive’ navigation

    12 March 2026

    Google Play adds new paid and PC games, game tests, community posts and more

    12 March 2026

    Google brings Gemini to Chrome in India

    11 March 2026
  • Crypto

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025

    MoviePass opens Mogul fantasy league game to the public

    29 October 2025
  • Fintech

    India neobank Fi removes banking services on its platform

    11 March 2026

    X taps William Shatner to give invitations to his payment service, X Money

    4 March 2026

    Stripe wants to turn your AI costs into a profit center

    3 March 2026

    3 days left: Save up to $680 on your ticket to Disrupt 2026

    25 February 2026

    More startups surpass $10M ARR in 3 months than ever before

    24 February 2026
  • Hardware

    Ex-Apple Engineer Raises $5M for Note-Taking Locket That Only Records Your Voice

    12 March 2026

    Canopii seems to succeed where the old indoor farms failed

    11 March 2026

    Hyperscale Power is the latest startup to challenge 140-year-old transformer technology

    10 March 2026

    Whoop is launching a new blood test focused on women’s health

    10 March 2026

    Honor says its ‘Robot phone’ with moving camera can dance to music

    8 March 2026
  • Media & Entertainment

    Disney+ launches TikTok-style short-form video stream ‘Verts’

    13 March 2026

    Substack launches an embedded recording studio

    12 March 2026

    TikTok now allows Apple Music subscribers to play entire songs without leaving the app

    12 March 2026

    WordPress debuts a private workspace that runs in your browser via a new service, my.WordPress.net

    11 March 2026

    “Pokémon Pokopia” is a game about restoring a broken world — and I love it

    11 March 2026
  • Security

    Law enforcement shuts down botnet consisting of tens of thousands of hacked routers

    12 March 2026

    The pro-Iranian hacktivist group says it is behind the attack on medical technology giant Stryker

    12 March 2026

    Salt Typhoon hacks the world’s phone and internet giants — here’s where they’ve been hit

    11 March 2026

    DOGE employee stole Social Security data and thumbed it, report says

    11 March 2026

    US military contractor likely built iPhone hacking tools used by Russian spies in Ukraine

    10 March 2026
  • Startups

    Sales automation startup Rox AI hits $1.2 billion valuation, sources say

    13 March 2026

    When startups become a family business

    12 March 2026

    Ride-hailing inDrive acquires Pakistan’s Krave Mart to boost grocery delivery

    12 March 2026

    Google completes $32 billion acquisition of cloud cybersecurity startup Wiz

    11 March 2026

    Mandiant founder just raised $190 million for autonomous AI security agent startup

    11 March 2026
  • Transportation

    Why Rivian is holding onto the $45,000 R2 base model until ‘late 2027’

    13 March 2026

    Group14 opens factory to produce flash charge battery materials for EVs

    12 March 2026

    Nuro is testing its autonomous vehicle technology on the streets of Tokyo

    12 March 2026

    Zoox plans to put its robotaxis on the Uber app in Vegas this year

    11 March 2026

    GM figured out how to deal with EV uncertainty with the Chevy Bolt

    11 March 2026
  • Venture

    Gumloop gets $50M from Benchmark to turn every worker into an AI agent builder

    13 March 2026

    This SpaceX Veteran Says The Next Big Thing In Space Is Satellites Returning To Earth

    10 March 2026

    Founders Fund is approaching $6 billion for its latest growth fund, sources say

    10 March 2026

    Robinhood’s startup fund stumbles in its NYSE debut

    7 March 2026

    City Detect, which uses artificial intelligence to help cities stay safe and clean, raises $13M Series A

    7 March 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»These are the cybersecurity stories we envied in 2025
Security

These are the cybersecurity stories we envied in 2025

techtost.comBy techtost.com26 December 202508 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
These Are The Cybersecurity Stories We Envied In 2025
Share
Facebook Twitter LinkedIn Pinterest Email

It’s the end of the year. That means it’s time to celebrate the best cybersecurity stories we didn’t publish. From 2023, TechCrunch has looked back at the year’s best stories in cybersecurity.

If you’re not familiar, the concept is simple. There are now dozens of journalists covering cybersecurity in the English language. There are tons of stories about cybersecurity, privacy, and surveillance published every week. And many of them are great, and you should read them. We’re here to recommend the ones we liked best, so keep in mind that this is a very subjective and, at the end of the day, incomplete list.

Anyway, let’s get into it. — Lorenzo Franceschi-Bicchierai.

Every once in a while, there’s a hacker story that once you start reading, you think it could be a movie or a TV show. Such is the case with Shane Harris’s very personal story of his months-long correspondence with a top Iranian hacker.

In 2016, The Atlantic reporter contacted a person who claimed to work as a hacker for Iran’s intelligence services, where he claimed to have worked on major operations such as the downing of a US drone and the now-infamous hack against oil giant Saudi Aramco, where Iranian hackers wiped the company’s computers. Harris was rightfully skeptical, but as he continued to talk to the hacker, who eventually revealed his real name, Harris began to believe him. When the hacker died, Harris was able to piece together the real story, which somehow turned out to be more incredible than the hacker had led him to believe.

The compelling story is also a great behind-the-scenes look at the challenges cybersecurity journalists face when dealing with sources who claim to have great stories to share.

In January, the UK government secretly issued a court order to Apple requiring the company to create a backdoor so police could access the iCloud data of any customer in the world. Due to a worldwide gag order, it was just because The Washington Post news that we learned the order was there all along. The requirement was the first of its kind and – if successful – would be a major defeat for tech giants that have spent the past decade locking themselves out of their users’ data so they can’t be forced to provide it to governments.

Apple then stopped offering encrypted cloud storage to its UK customers in response to demand. But with the news, the secret order was released to the public and allowed both Apple and critics to scrutinize the UK’s surveillance powers in a way that has not previously been tried in public. The story sparked a months-long diplomatic row between the United Kingdom and the United States, with Downing Street rejecting the request – only to try again several months later.

This story was the kind of instant access some reporters would dream of, but The Atlantic’s editor played out in real time after he was unwittingly added to a Signal group of senior US government officials. with a senior US government official discussing war plans on their cell phones.

“Right now we’re clean on OPSEC,” Defense Secretary Pete Hegseth said, but they weren’t.

Reading the discussion about where the US military should drop bombs — and then seeing news reports of missiles hitting the ground on the other side of the world — was confirmation that Jeffrey Goldberg should have known that he was, as he suspected, in a real conversation with real Trump administration officials, and it was all recorded and reportable.

And so he did, paving the way for a months-long investigation (and criticism) of the government’s operational security practices, in what has been called the largest government’s fault in history. The disclosure of the situation finally revealed the security loopholes involved in its use a disable signal clone which further compromised the government’s apparently secure communications.

Brian Krebs is one of the most veteran cyber security reporters and for years has specialized in tracking down online crumbs that lead him to uncover the identities of notorious cyber criminals. In this case, Krebs was able to find the real identity behind the online handle of a hacker, Rey, who belongs to the notorious group of advanced teenage cybercrimes calling themselves the Scattered LAPSUS$ Hunters.

Krebs’ search was so successful that he was able to speak to a person very close to the hacker—we won’t spoil the entire article here—and then the hacker himself, who confessed to his crimes and claimed he was trying to escape a life of crime in cyberspace.

Independent media outlet 404 Media has achieved more journalistic impact this year than most mainstream media with far more resources. One of her biggest victories was uncovering and effectively shutting down a massive air travel surveillance system used by federal agencies and operating in plain sight.

404 Media reported that a little-known data broker founded by the airline industry called the Airlines Reporting Corporation was selling access to five billion airline tickets and travel itineraries, including names and financial information of ordinary Americans, allowing government agencies like ICE, the State Department and the IRS to track people without a warrant.

ARC, which is owned by United, American, Delta, Southwest, JetBlue and other airlines, said it would shut down the warrantless data plan after 404 Monthly media report and intense pressure from legislators.

The December 2024 assassination of UnitedHealthcare CEO Brian Thompson was one of the biggest stories of the year. Luigi Maggione, the prime suspect in the killing, was arrested soon after and charged with using a “phantom gun,” a three-dimensional weapon that had no serial numbers and was privately manufactured without a background check — essentially a weapon the government has no idea exists.

Wired, using it previous experience reporting on 3D printed weaponssought to test how easy it would be to make a 3D-printed weapon while navigating the tangled legal (and ethical) landscape. The reporting process was excellently told and the video accompanying the story is excellent and chilling.

DOGE, or the Department of Government Efficiency, was one of the biggest stories of the year as Elon Musk’s gang of lackeys tore through the federal government, tearing down security protocols and red tape as part of a massive grab of citizens’ data. NPR had some of the best investigative reporting exposing the resistance movement of federal workers trying to prevent the theft of the government’s most sensitive data.

In a story detailing a whistleblower’s official disclosure as shared with members of Congress, a senior IT official at the National Labor Relations Board told lawmakers that while seeking help investigating DOGE’s activity, he “found a typed letter in an envelope taped to his door, which included threatening language and sensitive personal information about his dog. its official unveiling.”

Any story begins with says a journalist found something that made them “feel like I’m going to crap my pants,” you know it’s going to be a fun read. Gabriel Geiger found a dataset from a mysterious tracking company called First Wap that contained records of thousands of people from around the world whose phone locations had been tracked.

The data set, spanning 2007 to 2015, allowed Geiger to identify dozens of high-profile individuals whose phones were monitored, including a former first lady of Syria, the head of a private military contractor, a Hollywood actor and an enemy of the Vatican. This story explored the shadowy world of phone surveillance by exploiting Signaling System No. 7, or SS7, an obscurely named protocol long known to enable malicious surveillance.

Swatting has been a problem for years. What started as a bad joke has become a real threat, which has backfired at least one death. Swatting is a type of hoax where someone—often a hacker—calls the emergency services and tricks the authorities into sending an armed SWAT team to the home of the hoaxer’s target, often pretending to be the target themselves and pretending to be about to commit a violent crime.

In this feature, Wired’s Andy Greenberg put a face to the many characters that are part of these stories, such as the call operators who have to deal with this problem. And it also described a prolific hacker known as Torswats who for months had been plaguing operators and schools across the country with fake—but highly believable—threats of violence, as well as a hacker who took it upon himself to track down Torswats.

cyber security Cybersecurity envied hacker Hacking infosec journalism Stories
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTop 14 agtech, food tech startups from the Disrupt Startup Battlefield
Next Article Treat yourself: The best smart glasses to buy with your holiday gift money
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Law enforcement shuts down botnet consisting of tens of thousands of hacked routers

12 March 2026

The pro-Iranian hacktivist group says it is behind the attack on medical technology giant Stryker

12 March 2026

Salt Typhoon hacks the world’s phone and internet giants — here’s where they’ve been hit

11 March 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Before quantum computing arrives, this startup wants businesses that are already working on it

13 March 2026

Truecaller now lets you hang up on scammers — on behalf of your family

13 March 2026

Disney+ launches TikTok-style short-form video stream ‘Verts’

13 March 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

India neobank Fi removes banking services on its platform

11 March 2026

X taps William Shatner to give invitations to his payment service, X Money

4 March 2026

Stripe wants to turn your AI costs into a profit center

3 March 2026
Startups

Sales automation startup Rox AI hits $1.2 billion valuation, sources say

When startups become a family business

Ride-hailing inDrive acquires Pakistan’s Krave Mart to boost grocery delivery

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.