Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Money transfer app Duc has exposed thousands of driver’s licenses and passports to the open web

Different teams start with different VCs

Tesla’s cheaper vehicles aren’t helping its declining sales

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Salesforce announces a heavy overhaul for Slack, with 30 new features

    2 April 2026

    Meta’s gas glut could power South Dakota

    2 April 2026

    Anthropic is one month old

    1 April 2026

    Mercor Says It Was Hit By Cyber ​​Attack Linked To Compromise Of LiteLLM Open Source Project

    1 April 2026

    With its new app store, Ring bets on artificial intelligence to overcome home security

    31 March 2026
  • Apps

    Exclusive: Beehiiv expands into podcasting, targeting Patreon

    2 April 2026

    A new dating app, Sonder, has a deliberately annoying sign-up process (and it works)

    2 April 2026

    Truecaller Caller ID app reaches 500 million monthly users

    1 April 2026

    Go play this secret game in the TikTok DMs

    1 April 2026

    Speechify’s Windows app uses local models for transcription and dictation

    31 March 2026
  • Crypto

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025

    MoviePass opens Mogul fantasy league game to the public

    29 October 2025
  • Fintech

    Doss raises $55 million for AI inventory management that connects to ERP

    24 March 2026

    Despite stiff competition, Kalshi, Polymarket CEOs back $35m VC fund projections

    23 March 2026

    Amid legal turmoil, Kalshi is temporarily banned in Nevada

    20 March 2026

    Nominations for the Startup Battlefield 200 are still open

    19 March 2026

    Kalshi’s legal woes pile up as Arizona files first criminal charges for ‘illegal gambling operation’

    17 March 2026
  • Hardware

    Nothing’s AI device design reportedly includes smart glasses and headphones

    2 April 2026

    Cognichip wants AI to design the chips that power AI, and it just raised $60 million to test

    2 April 2026

    Meta launches two new Ray-Ban glasses designed for prescription wearers

    1 April 2026

    Whoop’s valuation just tripled to $10 billion

    1 April 2026

    The Pixel 10a doesn’t have a camera bump, and it’s great

    30 March 2026
  • Media & Entertainment

    Roku is launching a standalone app for Howdy, its $2.99 ​​streaming service

    31 March 2026

    SXSW is making a comeback as a premier networking, ideas festival for founders and VCs

    30 March 2026

    ‘Project Hail Mary’ becomes Amazon MGM’s biggest box office hit

    30 March 2026

    Sora’s shutdown could be a reality check moment for video AI

    29 March 2026

    Netflix confirms it’s raising prices again

    27 March 2026
  • Security

    Money transfer app Duc has exposed thousands of driver’s licenses and passports to the open web

    2 April 2026

    Apple releases security patch for older iPhones and iPads to protect against DarkSword attacks

    2 April 2026

    WhatsApp is alerting hundreds of users who installed a fake app made by a government-run spyware maker

    1 April 2026

    Health data giant CareCloud says hackers accessed patient medical records

    1 April 2026

    North Korean hackers accused of hijacking popular open source project Axios to spread malware

    31 March 2026
  • Startups

    Different teams start with different VCs

    2 April 2026

    YC’s troubled startup Delve’s reputation just got worse

    2 April 2026

    StrictlyVC San Francisco is less than a month away

    1 April 2026

    It’s not your imagination: AI startups have higher valuations

    1 April 2026

    The company behind ClassPass and Mindbody just got a lot bigger with a $7.5 billion merger

    31 March 2026
  • Transportation

    Tesla’s cheaper vehicles aren’t helping its declining sales

    2 April 2026

    The Rivian spinoff will also build autonomous delivery vehicles for DoorDash

    2 April 2026

    Uber and WeRide are ramping up robotaxi operations in Dubai

    1 April 2026

    Robotaxi companies decline to say how often their AVs need remote assistance

    1 April 2026

    TechCrunch Mobility: When a robotaxi needs to call 911

    30 March 2026
  • Venture

    Toyota’s Woven Capital appoints new CIO and COO in push to find ‘future of mobility’

    1 April 2026

    Exclusive: Runway Launches $10M Fund, Builders Program to Back Early-Stage AI Startups

    31 March 2026

    Former Coatue Partner Raises Massive $65M Seed Fund for Enterprise AI Agent Startup

    31 March 2026

    From Moon Hotels to Cattle Grazing: 8 Startup Investors Hunted at YC Demo Day

    28 March 2026

    16 of the most interesting startups from the YC W26 Demo Day

    27 March 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»These are the cybersecurity stories we envied in 2025
Security

These are the cybersecurity stories we envied in 2025

techtost.comBy techtost.com26 December 202508 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
These Are The Cybersecurity Stories We Envied In 2025
Share
Facebook Twitter LinkedIn Pinterest Email

It’s the end of the year. That means it’s time to celebrate the best cybersecurity stories we didn’t publish. From 2023, TechCrunch has looked back at the year’s best stories in cybersecurity.

If you’re not familiar, the concept is simple. There are now dozens of journalists covering cybersecurity in the English language. There are tons of stories about cybersecurity, privacy, and surveillance published every week. And many of them are great, and you should read them. We’re here to recommend the ones we liked best, so keep in mind that this is a very subjective and, at the end of the day, incomplete list.

Anyway, let’s get into it. — Lorenzo Franceschi-Bicchierai.

Every once in a while, there’s a hacker story that once you start reading, you think it could be a movie or a TV show. Such is the case with Shane Harris’s very personal story of his months-long correspondence with a top Iranian hacker.

In 2016, The Atlantic reporter contacted a person who claimed to work as a hacker for Iran’s intelligence services, where he claimed to have worked on major operations such as the downing of a US drone and the now-infamous hack against oil giant Saudi Aramco, where Iranian hackers wiped the company’s computers. Harris was rightfully skeptical, but as he continued to talk to the hacker, who eventually revealed his real name, Harris began to believe him. When the hacker died, Harris was able to piece together the real story, which somehow turned out to be more incredible than the hacker had led him to believe.

The compelling story is also a great behind-the-scenes look at the challenges cybersecurity journalists face when dealing with sources who claim to have great stories to share.

In January, the UK government secretly issued a court order to Apple requiring the company to create a backdoor so police could access the iCloud data of any customer in the world. Due to a worldwide gag order, it was just because The Washington Post news that we learned the order was there all along. The requirement was the first of its kind and – if successful – would be a major defeat for tech giants that have spent the past decade locking themselves out of their users’ data so they can’t be forced to provide it to governments.

Apple then stopped offering encrypted cloud storage to its UK customers in response to demand. But with the news, the secret order was released to the public and allowed both Apple and critics to scrutinize the UK’s surveillance powers in a way that has not previously been tried in public. The story sparked a months-long diplomatic row between the United Kingdom and the United States, with Downing Street rejecting the request – only to try again several months later.

This story was the kind of instant access some reporters would dream of, but The Atlantic’s editor played out in real time after he was unwittingly added to a Signal group of senior US government officials. with a senior US government official discussing war plans on their cell phones.

“Right now we’re clean on OPSEC,” Defense Secretary Pete Hegseth said, but they weren’t.

Reading the discussion about where the US military should drop bombs — and then seeing news reports of missiles hitting the ground on the other side of the world — was confirmation that Jeffrey Goldberg should have known that he was, as he suspected, in a real conversation with real Trump administration officials, and it was all recorded and reportable.

And so he did, paving the way for a months-long investigation (and criticism) of the government’s operational security practices, in what has been called the largest government’s fault in history. The disclosure of the situation finally revealed the security loopholes involved in its use a disable signal clone which further compromised the government’s apparently secure communications.

Brian Krebs is one of the most veteran cyber security reporters and for years has specialized in tracking down online crumbs that lead him to uncover the identities of notorious cyber criminals. In this case, Krebs was able to find the real identity behind the online handle of a hacker, Rey, who belongs to the notorious group of advanced teenage cybercrimes calling themselves the Scattered LAPSUS$ Hunters.

Krebs’ search was so successful that he was able to speak to a person very close to the hacker—we won’t spoil the entire article here—and then the hacker himself, who confessed to his crimes and claimed he was trying to escape a life of crime in cyberspace.

Independent media outlet 404 Media has achieved more journalistic impact this year than most mainstream media with far more resources. One of her biggest victories was uncovering and effectively shutting down a massive air travel surveillance system used by federal agencies and operating in plain sight.

404 Media reported that a little-known data broker founded by the airline industry called the Airlines Reporting Corporation was selling access to five billion airline tickets and travel itineraries, including names and financial information of ordinary Americans, allowing government agencies like ICE, the State Department and the IRS to track people without a warrant.

ARC, which is owned by United, American, Delta, Southwest, JetBlue and other airlines, said it would shut down the warrantless data plan after 404 Monthly media report and intense pressure from legislators.

The December 2024 assassination of UnitedHealthcare CEO Brian Thompson was one of the biggest stories of the year. Luigi Maggione, the prime suspect in the killing, was arrested soon after and charged with using a “phantom gun,” a three-dimensional weapon that had no serial numbers and was privately manufactured without a background check — essentially a weapon the government has no idea exists.

Wired, using it previous experience reporting on 3D printed weaponssought to test how easy it would be to make a 3D-printed weapon while navigating the tangled legal (and ethical) landscape. The reporting process was excellently told and the video accompanying the story is excellent and chilling.

DOGE, or the Department of Government Efficiency, was one of the biggest stories of the year as Elon Musk’s gang of lackeys tore through the federal government, tearing down security protocols and red tape as part of a massive grab of citizens’ data. NPR had some of the best investigative reporting exposing the resistance movement of federal workers trying to prevent the theft of the government’s most sensitive data.

In a story detailing a whistleblower’s official disclosure as shared with members of Congress, a senior IT official at the National Labor Relations Board told lawmakers that while seeking help investigating DOGE’s activity, he “found a typed letter in an envelope taped to his door, which included threatening language and sensitive personal information about his dog. its official unveiling.”

Any story begins with says a journalist found something that made them “feel like I’m going to crap my pants,” you know it’s going to be a fun read. Gabriel Geiger found a dataset from a mysterious tracking company called First Wap that contained records of thousands of people from around the world whose phone locations had been tracked.

The data set, spanning 2007 to 2015, allowed Geiger to identify dozens of high-profile individuals whose phones were monitored, including a former first lady of Syria, the head of a private military contractor, a Hollywood actor and an enemy of the Vatican. This story explored the shadowy world of phone surveillance by exploiting Signaling System No. 7, or SS7, an obscurely named protocol long known to enable malicious surveillance.

Swatting has been a problem for years. What started as a bad joke has become a real threat, which has backfired at least one death. Swatting is a type of hoax where someone—often a hacker—calls the emergency services and tricks the authorities into sending an armed SWAT team to the home of the hoaxer’s target, often pretending to be the target themselves and pretending to be about to commit a violent crime.

In this feature, Wired’s Andy Greenberg put a face to the many characters that are part of these stories, such as the call operators who have to deal with this problem. And it also described a prolific hacker known as Torswats who for months had been plaguing operators and schools across the country with fake—but highly believable—threats of violence, as well as a hacker who took it upon himself to track down Torswats.

cyber security Cybersecurity envied hacker Hacking infosec journalism Stories
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTop 14 agtech, food tech startups from the Disrupt Startup Battlefield
Next Article Treat yourself: The best smart glasses to buy with your holiday gift money
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Money transfer app Duc has exposed thousands of driver’s licenses and passports to the open web

2 April 2026

Apple releases security patch for older iPhones and iPads to protect against DarkSword attacks

2 April 2026

WhatsApp is alerting hundreds of users who installed a fake app made by a government-run spyware maker

1 April 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Money transfer app Duc has exposed thousands of driver’s licenses and passports to the open web

2 April 2026

Different teams start with different VCs

2 April 2026

Tesla’s cheaper vehicles aren’t helping its declining sales

2 April 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Doss raises $55 million for AI inventory management that connects to ERP

24 March 2026

Despite stiff competition, Kalshi, Polymarket CEOs back $35m VC fund projections

23 March 2026

Amid legal turmoil, Kalshi is temporarily banned in Nevada

20 March 2026
Startups

Different teams start with different VCs

YC’s troubled startup Delve’s reputation just got worse

StrictlyVC San Francisco is less than a month away

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.