Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

DiDAX: Innovating DNA-based data applications

Claude Opus 4.6 discovers over 500 high-severity flaws across major open source libraries

Reddit sees AI search as its next big opportunity

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » These are the cybersecurity stories we’ll be jealous of in 2025
Startups

These are the cybersecurity stories we’ll be jealous of in 2025

userBy userDecember 26, 2025No Comments8 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

It’s the end of the year. That means it’s time to celebrate the best cybersecurity stories we’ve never published before. Since 2023, TechCrunch has been collectively looking back at the year’s best articles in cybersecurity.

Even for those who are not familiar with it, the concept is simple. There are currently dozens of journalists reporting on cybersecurity in English. We publish tons of articles about cybersecurity, privacy, and surveillance every week. And many of them are great, so please read them. We are here to recommend the ones we like the most. So please keep in mind that this is a very subjective and incomplete list after all.

Anyway, let’s get started. — Lorenzo Franceschi-Bicchierai

Shane Harris has told how he was killed after grooming a senior Iranian hacker as a source.

Sometimes there’s a hacker story that feels like it could be a movie or TV show as soon as you start reading it. This is the case with Shane Harris’ very personal story about his months-long correspondence with a top Iranian hacker.

In 2016, a reporter for The Atlantic came into contact with someone who claimed to be working as a hacker for Iranian intelligence, where he was involved in major operations including the downing of a U.S. drone and the now-infamous hack into oil giant Saudi Aramco, in which Iranian hackers wiped the company’s computers. Harris was understandably skeptical, but as he continued to talk to the hacker, he revealed his real name and began to believe him. When the hacker died, Harris was able to piece together the true story, which somehow turned out to be less believable than the hacker had led Harris to believe.

This fascinating story is also a great behind-the-scenes look at the challenges cybersecurity reporters face when dealing with sources who claim to have a great story to share.

The Washington Post revealed a secret order to Apple asking British authorities for permission to spy on users’ encrypted data.

In January, the British government secretly issued a court order requiring Apple to build a backdoor that would allow police to access customers’ iCloud data around the world. Because of the global gag order, we only learned about it in the first place because the Washington Post reported the news. It would be the first of its kind, and if successful, it would be a major defeat for tech giants, which have spent the past decade locking themselves out of users’ own data to avoid being forced to provide it to governments.

Apple subsequently stopped offering opt-in, end-to-end encrypted cloud storage to UK customers in response to demand. But breaking the news brought the secret order into the public eye, allowing both Apple and critics to scrutinize Britain’s surveillance powers in a way that had never been tested in public. The story sparked months of diplomatic wrangling between Britain and the United States, with Downing Street withdrawing the request, only to reinstate it a few months later.

The Atlantic’s “Trump administration accidentally emailed war plans” is the year’s best headline

The story was the kind of fly-in access some reporters dream of, but it unfolded in real time as The Atlantic’s editor-in-chief was unwittingly added to a signal group of U.S. government officials discussing war plans on cell phones.

A screenshot of a leaked Signal chat reads (via Pete Hegseth): "Here are the details (per timeline): Currently clean in terms of OPSEC. Godspeed to our warriors." Next, JD Vance says: "I pray for victory."
“We are now clean on OPSEC,” Defense Secretary Pete Hegseth said. They weren’t. Image credit: The Atlantic (screenshot)Image credit: The Atlantic (screenshot)

Reading a discussion about where the U.S. military should drop bombs, and then seeing a news report about a missile hitting the ground on the other side of the world, confirmed what he needed to know: Jeffrey Goldberg was indeed talking to real Trump administration officials, as he had suspected, and that this was all on the record and reportable.

And he did, paving the way for a months-long investigation into (and criticism of) the government’s operational security practices in what has been called the biggest government operational security misstep in history. The unraveling of the situation ultimately revealed security flaws, including the use of copy clones of Signal, further compromising the government’s ostensibly secure communications.

Brian Krebs tracked down the administrator of a prolific hacker group as a teenager in Jordan

Brian Krebs is one of the most seasoned cybersecurity reporters, having specialized for years in tracking down online breadcrumbs that lead to the uncovering of the identities of notorious cybercriminals. In this case, Krebs was able to discover the identity of Ray, the hacker’s online handle. Ray is part of a notoriously sophisticated and persistent teenage cybercrime group known as the Scattered LAPSUS$ Hunters.

Krebs’ quest was very successful, and he was able to speak with someone very close to the hacker (I won’t spoil the entire article here). I was then able to speak with the hacker himself, and he confessed to his crimes and claimed that he was trying to escape from a life of cybercrime.

As an independent outlet, 404 Media has used far more resources this year to achieve more impactful journalism than most mainstream media outlets. One of its biggest victories was exposing and effectively shutting down a massive air travel surveillance system that was wiretapped and operated in obscurity by federal agencies.

404 Media reported that a little-known data broker founded by the airline industry called Airline Reporting Corporation sells access to 5 billion airline tickets and itineraries containing the names and financial details of ordinary Americans, allowing government agencies such as ICE, the State Department, and the IRS to track people without a warrant.

ARC, which is owned by United Airlines, American Airlines, Delta Air Lines, Southwest Airlines, JetBlue Airways and others, announced it would end its warrantless data program after months of reporting by 404 Media and intense pressure from lawmakers.

Wired builds the 3D-printed gun Luigi Mangione allegedly used to kill a medical executive to test the legality of ‘ghost guns’

The murder of UnitedHealthcare CEO Brian Thompson in December 2024 was one of the biggest stories of the year. The main suspect in the murder, Luigi Mangione, was arrested and charged with using a “ghost gun” soon after. This is a 3D-printed gun that has no serial number, was secretly manufactured without any background checks, and is virtually unknown to the government.

Drawing on past reporting experience with 3D-printed weapons, Wired set out to test how easy it would be to make a 3D-printed gun while navigating a patchwork legal (and ethical) landscape. The reporting process is exquisitely told, and the video that follows the story is wonderful and chilling.

NPR detailed a federal whistleblower’s account of how DOGE obtained sensitive government data and the threats he faced

DOGE (Department of Government Efficiency) made one of the biggest headlines of the year, alleging that a group of Elon Musk’s henchmen breached the federal government and overcame security protocols and red tape as part of a mass exfiltration of national data. NPR has done some of the best investigative reporting exposing the resistance of federal employees trying to stop the theft of the government’s most sensitive data.

In one article detailing a whistleblower’s official disclosure shared with members of Congress, a senior IT official at the National Labor Relations Board told lawmakers that while seeking help in investigating DOGE’s activities, “according to the cover letter that accompanied the official disclosure, we discovered a printed letter inside an envelope taped to the front door that contained threatening language, sensitive personal information, and an overhead photo of someone walking a dog.”

Mother Jones uncovers an exposed data set of tracking surveillance victims including world leaders, Vatican enemies, and perhaps you.

Any article that starts with a journalist saying, “I found something that made me want to take my pants off,” knows it’s going to be a fun read. Gabriel Geiger discovered a dataset from a mysterious surveillance company called First Wap. It contained records of thousands of people around the world whose phones had been tracked.

Spanning 2007 to 2015, this dataset allowed Geiger to identify dozens of celebrities whose phones had been tracked, including a former Syrian first lady, the president of a private military contractor, a Hollywood actor, and an enemy of the Vatican. In this article, we explored the shadowy world of phone surveillance by exploiting Signaling System No. 7 (SS7), an obscurely named protocol that has long been known to enable malicious tracking.

Wired reports on the investigation behind a series of ‘swatting’ attacks on hundreds of schools across the country

Swatting has been a problem for many years. What started as a bad joke has turned into a real threat, resulting in at least one death. Swatting is a type of hoax in which someone (often a hacker) calls emergency services and tricks authorities into sending an armed SWAT team to the home of the target of the hoax. They often impersonate themselves as targets and pretend to be about to commit a violent crime.

In this feature, Wired’s Andy Greenberg gave us a look at many of the characters in the story, including the call operators who must deal with this problem. And he also introduced the prolific swatter known as Towswatts, who tormented businesses and schools across the country for months with false (but very believable) threats of violence, and the hacker who took it upon himself to track Towswatts.


Source link

#Aceleradoras #CapitalRiesgo #EcosistemaStartup #Emprendimiento #InnovaciónEmpresarial #Startups
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCritical vulnerability in LangChain core exposes secrets via serialization injection
Next Article Winter constellations that are easy to find even for beginners
user
  • Website

Related Posts

Reddit sees AI search as its next big opportunity

February 5, 2026

Amazon and Google are winning the AI ​​capital spending race, but what is the prize?

February 5, 2026

Elon Musk is serious about orbiting data centers

February 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

DiDAX: Innovating DNA-based data applications

Claude Opus 4.6 discovers over 500 high-severity flaws across major open source libraries

Reddit sees AI search as its next big opportunity

Amazon and Google are winning the AI ​​capital spending race, but what is the prize?

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.