Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Apple fixes bug used by police to extract deleted chat messages from iPhones

Cathie Woods’ ARK makes first major investment in startup Lucra — and it’s not AI

OpenAI partners with Infosys to bring AI tools to more businesses

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    OpenAI partners with Infosys to bring AI tools to more businesses

    22 April 2026

    Unauthorized group gained access to Anthropic’s proprietary Mythos cyber tool, report claims

    22 April 2026

    NSA Spies Reportedly Using Anthropic’s Mythos, Despite Pentagon Controversy

    21 April 2026

    It’s not just one thing – it’s another thing

    21 April 2026

    OpenAI takes aim at Anthropic with a boosted Codex that gives it more power on your desktop

    20 April 2026
  • Apps

    X makes it more expensive to publish links through its API

    22 April 2026

    Apple’s Cal AI crackdown signals it still controls the App Store

    22 April 2026

    GRAI believes that AI can make music more social, not replace artists

    21 April 2026

    WhatsApp is testing a premium subscription, but it’s mostly cosmetic

    21 April 2026

    Spotify is launching the ability to buy physical books in the US and the UK

    20 April 2026
  • Crypto

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025
  • Fintech

    Cash App targets a new type of customer: children aged 6 to 12 years

    22 April 2026

    Revolut eyes up to $200 billion valuation in potential IPO

    22 April 2026

    Once close enough for a takeover, Stripe and Airwallex are now going after each other

    18 April 2026

    Airwallex is set to take on Stripe and the rest of the payments industry — in the physical world

    16 April 2026

    Cash app launches ‘pay later’ feature for P2P transfers

    3 April 2026
  • Hardware

    Apple’s John Ternus will run one of the most powerful companies in the world. work is a minefield

    22 April 2026

    Tim Cook steps down as Apple CEO: Here’s a look at his 15-year legacy, from new products and services to China expansion

    22 April 2026

    Who is John Ternus, the new CEO of Apple?

    21 April 2026

    Tim Cook steps down as Apple CEO, while John Ternus takes over

    21 April 2026

    Amazon Unveils Slimmer Fire TV Stick HD, Opens Ember Artline TVs for Pre-Order

    16 April 2026
  • Media & Entertainment

    YouTube extends its AI similarity detection technology to celebrities

    21 April 2026

    Deezer says 44% of songs uploaded to its platform every day are created with artificial intelligence

    20 April 2026

    Netflix plans to add a vertical video stream, use AI for recommendations

    17 April 2026

    Netflix co-founder and chairman Reed Hastings is stepping down from the board

    17 April 2026

    All we like is soulfulness

    16 April 2026
  • Security

    Apple fixes bug used by police to extract deleted chat messages from iPhones

    22 April 2026

    As US spy laws expire, lawmakers divided over protecting Americans from warrantless surveillance

    22 April 2026

    Ransomware dealer pleads guilty to helping ransomware gang

    21 April 2026

    App host Vercel says it was hacked and customer data stolen

    21 April 2026

    Mastodon says its flagship server has been hit by a DDoS attack

    20 April 2026
  • Startups

    Cathie Woods’ ARK makes first major investment in startup Lucra — and it’s not AI

    22 April 2026

    AI research lab NeoCognition offers $40 million to build agents that learn like humans

    22 April 2026

    You’ve heard of hybrid cars. Now meet a hybrid cement plant.

    19 April 2026

    Loop raises $95 million to build supply chain artificial intelligence that predicts disruptions

    18 April 2026

    Sources: Runner in talks to raise $2B+ at $50B valuation as business grows

    18 April 2026
  • Transportation

    Redwood Materials lays off 10% in restructuring to pursue energy storage business

    22 April 2026

    Amazon taps Sweden’s Einride for its electric big rigs

    21 April 2026

    The Rivian factory was hit by a tornado before the R2 was released

    20 April 2026

    TechCrunch Mobility: Uber enters the era of assetmaxxing

    20 April 2026

    Uber will now collect your returns from your doorstep

    17 April 2026
  • Venture

    Anthropic rejects VC funding that values ​​it at $800B+, for now

    16 April 2026

    Financial risk management platform Pillar raises $20 million in rounds led by a16z

    15 April 2026

    Vercel CEO Guillermo Rauch signals IPO readiness as AI agents drive revenue

    14 April 2026

    Nvidia-backed SiFive hits $3.65 billion valuation for open AI chips

    11 April 2026

    How to make the Startup Battlefield Top 20 — and what each company gets regardless

    10 April 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»These are the cybersecurity stories we envied in 2025
Security

These are the cybersecurity stories we envied in 2025

techtost.comBy techtost.com26 December 202508 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
These Are The Cybersecurity Stories We Envied In 2025
Share
Facebook Twitter LinkedIn Pinterest Email

It’s the end of the year. That means it’s time to celebrate the best cybersecurity stories we didn’t publish. From 2023, TechCrunch has looked back at the year’s best stories in cybersecurity.

If you’re not familiar, the concept is simple. There are now dozens of journalists covering cybersecurity in the English language. There are tons of stories about cybersecurity, privacy, and surveillance published every week. And many of them are great, and you should read them. We’re here to recommend the ones we liked best, so keep in mind that this is a very subjective and, at the end of the day, incomplete list.

Anyway, let’s get into it. — Lorenzo Franceschi-Bicchierai.

Every once in a while, there’s a hacker story that once you start reading, you think it could be a movie or a TV show. Such is the case with Shane Harris’s very personal story of his months-long correspondence with a top Iranian hacker.

In 2016, The Atlantic reporter contacted a person who claimed to work as a hacker for Iran’s intelligence services, where he claimed to have worked on major operations such as the downing of a US drone and the now-infamous hack against oil giant Saudi Aramco, where Iranian hackers wiped the company’s computers. Harris was rightfully skeptical, but as he continued to talk to the hacker, who eventually revealed his real name, Harris began to believe him. When the hacker died, Harris was able to piece together the real story, which somehow turned out to be more incredible than the hacker had led him to believe.

The compelling story is also a great behind-the-scenes look at the challenges cybersecurity journalists face when dealing with sources who claim to have great stories to share.

In January, the UK government secretly issued a court order to Apple requiring the company to create a backdoor so police could access the iCloud data of any customer in the world. Due to a worldwide gag order, it was just because The Washington Post news that we learned the order was there all along. The requirement was the first of its kind and – if successful – would be a major defeat for tech giants that have spent the past decade locking themselves out of their users’ data so they can’t be forced to provide it to governments.

Apple then stopped offering encrypted cloud storage to its UK customers in response to demand. But with the news, the secret order was released to the public and allowed both Apple and critics to scrutinize the UK’s surveillance powers in a way that has not previously been tried in public. The story sparked a months-long diplomatic row between the United Kingdom and the United States, with Downing Street rejecting the request – only to try again several months later.

This story was the kind of instant access some reporters would dream of, but The Atlantic’s editor played out in real time after he was unwittingly added to a Signal group of senior US government officials. with a senior US government official discussing war plans on their cell phones.

“Right now we’re clean on OPSEC,” Defense Secretary Pete Hegseth said, but they weren’t.

Reading the discussion about where the US military should drop bombs — and then seeing news reports of missiles hitting the ground on the other side of the world — was confirmation that Jeffrey Goldberg should have known that he was, as he suspected, in a real conversation with real Trump administration officials, and it was all recorded and reportable.

And so he did, paving the way for a months-long investigation (and criticism) of the government’s operational security practices, in what has been called the largest government’s fault in history. The disclosure of the situation finally revealed the security loopholes involved in its use a disable signal clone which further compromised the government’s apparently secure communications.

Brian Krebs is one of the most veteran cyber security reporters and for years has specialized in tracking down online crumbs that lead him to uncover the identities of notorious cyber criminals. In this case, Krebs was able to find the real identity behind the online handle of a hacker, Rey, who belongs to the notorious group of advanced teenage cybercrimes calling themselves the Scattered LAPSUS$ Hunters.

Krebs’ search was so successful that he was able to speak to a person very close to the hacker—we won’t spoil the entire article here—and then the hacker himself, who confessed to his crimes and claimed he was trying to escape a life of crime in cyberspace.

Independent media outlet 404 Media has achieved more journalistic impact this year than most mainstream media with far more resources. One of her biggest victories was uncovering and effectively shutting down a massive air travel surveillance system used by federal agencies and operating in plain sight.

404 Media reported that a little-known data broker founded by the airline industry called the Airlines Reporting Corporation was selling access to five billion airline tickets and travel itineraries, including names and financial information of ordinary Americans, allowing government agencies like ICE, the State Department and the IRS to track people without a warrant.

ARC, which is owned by United, American, Delta, Southwest, JetBlue and other airlines, said it would shut down the warrantless data plan after 404 Monthly media report and intense pressure from legislators.

The December 2024 assassination of UnitedHealthcare CEO Brian Thompson was one of the biggest stories of the year. Luigi Maggione, the prime suspect in the killing, was arrested soon after and charged with using a “phantom gun,” a three-dimensional weapon that had no serial numbers and was privately manufactured without a background check — essentially a weapon the government has no idea exists.

Wired, using it previous experience reporting on 3D printed weaponssought to test how easy it would be to make a 3D-printed weapon while navigating the tangled legal (and ethical) landscape. The reporting process was excellently told and the video accompanying the story is excellent and chilling.

DOGE, or the Department of Government Efficiency, was one of the biggest stories of the year as Elon Musk’s gang of lackeys tore through the federal government, tearing down security protocols and red tape as part of a massive grab of citizens’ data. NPR had some of the best investigative reporting exposing the resistance movement of federal workers trying to prevent the theft of the government’s most sensitive data.

In a story detailing a whistleblower’s official disclosure as shared with members of Congress, a senior IT official at the National Labor Relations Board told lawmakers that while seeking help investigating DOGE’s activity, he “found a typed letter in an envelope taped to his door, which included threatening language and sensitive personal information about his dog. its official unveiling.”

Any story begins with says a journalist found something that made them “feel like I’m going to crap my pants,” you know it’s going to be a fun read. Gabriel Geiger found a dataset from a mysterious tracking company called First Wap that contained records of thousands of people from around the world whose phone locations had been tracked.

The data set, spanning 2007 to 2015, allowed Geiger to identify dozens of high-profile individuals whose phones were monitored, including a former first lady of Syria, the head of a private military contractor, a Hollywood actor and an enemy of the Vatican. This story explored the shadowy world of phone surveillance by exploiting Signaling System No. 7, or SS7, an obscurely named protocol long known to enable malicious surveillance.

Swatting has been a problem for years. What started as a bad joke has become a real threat, which has backfired at least one death. Swatting is a type of hoax where someone—often a hacker—calls the emergency services and tricks the authorities into sending an armed SWAT team to the home of the hoaxer’s target, often pretending to be the target themselves and pretending to be about to commit a violent crime.

In this feature, Wired’s Andy Greenberg put a face to the many characters that are part of these stories, such as the call operators who have to deal with this problem. And it also described a prolific hacker known as Torswats who for months had been plaguing operators and schools across the country with fake—but highly believable—threats of violence, as well as a hacker who took it upon himself to track down Torswats.

cyber security Cybersecurity envied hacker Hacking infosec journalism Stories
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTop 14 agtech, food tech startups from the Disrupt Startup Battlefield
Next Article Treat yourself: The best smart glasses to buy with your holiday gift money
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Apple fixes bug used by police to extract deleted chat messages from iPhones

22 April 2026

As US spy laws expire, lawmakers divided over protecting Americans from warrantless surveillance

22 April 2026

Unauthorized group gained access to Anthropic’s proprietary Mythos cyber tool, report claims

22 April 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Apple fixes bug used by police to extract deleted chat messages from iPhones

22 April 2026

Cathie Woods’ ARK makes first major investment in startup Lucra — and it’s not AI

22 April 2026

OpenAI partners with Infosys to bring AI tools to more businesses

22 April 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Cash App targets a new type of customer: children aged 6 to 12 years

22 April 2026

Revolut eyes up to $200 billion valuation in potential IPO

22 April 2026

Once close enough for a takeover, Stripe and Airwallex are now going after each other

18 April 2026
Startups

Cathie Woods’ ARK makes first major investment in startup Lucra — and it’s not AI

AI research lab NeoCognition offers $40 million to build agents that learn like humans

You’ve heard of hybrid cars. Now meet a hybrid cement plant.

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.