{"id":38825,"date":"2020-12-21T16:38:00","date_gmt":"2020-12-21T16:38:00","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31865\/Some-Of-2020s-More-Interesting-Security-Stories.html"},"modified":"2020-12-21T16:38:00","modified_gmt":"2020-12-21T16:38:00","slug":"some-of-2020s-more-interesting-security-stories","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/some-of-2020s-more-interesting-security-stories\/","title":{"rendered":"Some Of 2020&#8217;s More Interesting Security Stories"},"content":{"rendered":"<div readability=\"32\">\n<div><picture class=\"responsive-image lazyloader--lazy lazyloader--lowres\"><source media=\"(min-width: 1000px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/5fda353b5fc7540096575628\/lede\/1608136462009-newspapers.jpeg?crop=1xw:0.9328xh;0xw,0.0658xh&amp;resize=20:*\"><source media=\"(min-width: 700px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/5fda353b5fc7540096575628\/lede\/1608136462009-newspapers.jpeg?crop=1xw:0.9328xh;0xw,0.0658xh&amp;resize=20:*\"><source media=\"(min-width: 0px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/5fda353b5fc7540096575628\/lede\/1608136462009-newspapers.jpeg?crop=1xw:0.9328xh;0xw,0.0658xh&amp;resize=20:*\"><img class=\"responsive-image__img\" alt=\"newspapers\"><\/picture><\/div>\n<p>Image:&nbsp;Leon Neal\/Getty Images<\/p>\n<\/div>\n<div data-component=\"BodyComponentRenderer\" readability=\"95.209583276775\"><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>The end of the year is usually a good time for retrospection and one of our favorite traditions: digging into the archives and recognizing the best cybersecurity stories of the year. Stories so good, we wish we had written them ourselves.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>Without further ado, here&#8217;s the annual Motherboard\u2019s Cyber Jealousy list.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0\"><\/p>\n<p><strong><a href=\"https:\/\/www.wired.com\/story\/confessions-marcus-hutchins-hacker-who-saved-the-internet\/\"><span>The Confessions of Marcus Hutchins, the Hacker Who Saved the Internet<\/span><\/a><\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\"><\/p>\n<p><strong>By: Andy Greenberg<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32.316865417376\"><\/p>\n<p><a href=\"https:\/\/www.vice.com\/en\/topic\/marcus-hutchins\"><span>Marcus Hutchins<\/span><\/a> may very well be one of the most famous hackers and cybersecurity researchers of the last few years. He helped stop the chaotic and disruptive WannaCry worm, and then got ensnared in an unexpected criminal case that saw him admit to writing banking malware when he was a teenager. Against all odds, <a href=\"https:\/\/www.vice.com\/en\/article\/9kxewv\/malwaretech-wannacry-ransomware-sentencing\"><span>the judge let him off the hook<\/span><\/a>, arguing that Marcus had already paid the price during the trial and showed real remorse. We all knew one day someone would write a kickass profile of Marcus, also known as MalwareTech, and Andy Greenberg at <em>Wired<\/em> knocked it out of the park.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0\"><\/p>\n<p><strong><a href=\"https:\/\/www.reuters.com\/article\/us-apple-fbi-icloud-exclusive-idUSKBN1ZK1CT\"><span>Exclusive: Apple dropped plan for encrypting backups after FBI complained<\/span><\/a><\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\"><\/p>\n<p><strong>By: Joseph Menn<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"36\"><\/p>\n<p>Believe it or not, this story came out this year, even though January of 2020 feels like 10 years ago. Joseph Menn, who always has one or two truly shocking scoops a year, reported that the FBI convinced Apple to block its plan to encrypt its backup service iCloud. The folks at Cupertino were planning to make backups end-to-end encrypted, much like their messaging and video chat services iMessage and FaceTime. But then the feds changed their minds. This shows how cops and law enforcement agents can get around end-to-end encryption tapping into backups, which most people have enabled by default&#8230;and how Apple sometimes is happy to cave to the government.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0.68354430379747\"><\/p>\n<p><strong><a href=\"https:\/\/www.nbcnews.com\/tech\/security\/iphone-spyware-lets-cops-log-suspects-passcodes-when-cracking-doesn-n1209296\"><span>iPhone spyware lets police log suspects&#8217; passcodes when cracking doesn&#8217;t work<\/span><\/a><\/strong>&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\"><\/p>\n<p><strong>By: Olivia Solon<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32.422178988327\"><\/p>\n<p>The tech from iPhone crackers <a href=\"https:\/\/www.vice.com\/en\/topic\/grayshift\"><span>GrayShift<\/span><\/a> is not really controversial in and of itself. The company&#8217;s GrayKey product is designed to unlock modern iOS devices, in the same sort of way Cellebrite had cornered the market for unlocking all sorts of other phones. But the Hide UI feature is different: in one possible situation, it could surreptitiously record a user&#8217;s password when law enforcement gives the phone back to them. This is so authorities don&#8217;t need to try and guess the password, and capture it instead.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0\"><\/p>\n<p><strong><a href=\"https:\/\/www.wsj.com\/articles\/federal-agencies-use-cellphone-location-data-for-immigration-enforcement-11581078600\">Federal Agencies Use Cellphone Location Data for Immigration Enforcement<\/a><\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27\"><\/p>\n<p><strong>By: Byron Tau and Michelle Hackman<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29.402337228715\"><\/p>\n<p>This <em>Wall Street Journal <\/em>piece was the first to show that U.S. law enforcement agencies are simply buying their way to granular location data harvested from smartphones. It reported that ICE was using the data to find and arrest people, and named one of the central companies in this industry, Venntel. This piece made us so obsessed with the location data industry that we started a nearly year long series of articles, including one that showed that the <a href=\"https:\/\/www.vice.com\/en\/article\/jgqm5x\/us-military-location-data-xmode-locate-x\"><span>U.S. military and contractors buy similar data<\/span><\/a>, and another that CBP had <a href=\"https:\/\/www.vice.com\/en\/article\/k7qyv3\/customs-border-protection-venntel-location-data-dhs\"><span>spent nearly half a million dollars<\/span><\/a> on buying access to location data.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0.6\"><\/p>\n<p><strong><a href=\"https:\/\/web.br.de\/interaktiv\/ocean-lotus\/en\/\"><span>Lined up in the sights of Vietnamese hackers<\/span><\/a>:<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p><strong>By: Hakan Tanriverdi, Max Zierer, Ann-Kathrin Wetter, Kai Biermann, Thi Do Nguyen<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33.978102189781\"><\/p>\n<p>This piece on hacking group Ocean Lotus shows not only what journalists can do when they apply themselves to more technical analysis, but also how media outlets can effectively present that sort of information to readers. The piece shows, step-by-step, how an email may actually be carrying malware. This was truly a genre-defining story, a mix between a technical security research paper and a journalistic endeavor. One of the best stories of the year, and perhaps of the last few years. Kudos to our friend <a href=\"https:\/\/twitter.com\/hatr\"><span>Hakan Tanrivendi<\/span><\/a> and his colleagues.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"1.2\"><\/p>\n<p><strong><a href=\"https:\/\/www.cyberscoop.com\/pentagon-cyber-command-trolling-russian-chinese-hackers-cartoons\/\"><span>How the Pentagon is trolling Russian, Chinese hackers with cartoons<\/span><\/a>:&nbsp;<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\"><\/p>\n<p><strong>By: Shannon Vavra<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"36\"><\/p>\n<p>\u201cWe don\u2019t want something they can put on T-shirts,\u201d the U.S. official said, referring to imagery of a bumbling bear that U.S. agencies have portrayed Russian hackers as in publicly distributed comic-strip-style pictures. \u201cWe want something that\u2019s in a PowerPoint their boss sees and he loses his shit on them.\u201d What a couple of quotes! This piece, of course, is funny, but it also highlights a dramatic and important shift from U.S. agencies around cybersecurity: while Russian hackers are very familiar with trolling their opponents, U.S. officials are trying their own stuff too.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0\"><\/p>\n<p><strong><a href=\"https:\/\/www.wired.com\/story\/hackers-mom-broke-into-prison-wardens-computer\/\"><span>How a Hacker&#8217;s Mom Broke Into a Prison\u2014and the Warden&#8217;s Computer<\/span><\/a><\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\"><\/p>\n<p><strong>By: Lily Hay Newman<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32\"><\/p>\n<p>The headline alone seems like it comes from an Onion article, and yet, it&#8217;s all a true story. A bizarre tale of hacking, prisons, and a mother at the center of it all.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0\"><\/p>\n<p><strong><a href=\"https:\/\/www.reuters.com\/article\/us-india-cyber-mercenaries-exclusive\/exclusive-obscure-indian-cyber-firm-spied-on-politicians-investors-worldwide-idUSKBN23G1GQ\"><span>Obscure Indian cyber firm spied on politicians, investors worldwide<\/span><\/a><\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p><strong>By: Jack Stubbs, Raphael Satter, Christopher Bing<\/strong>&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"35\"><\/p>\n<p>For years, several groups of security researchers and journalists have lifted the veil, in painfully detailed stories of abuse, on what some call the Hacking as a Service industry. That part of the cybersecurity world where mercenary companies provide surveillance tech and hacking tools to pretty much any government that is willing to pay. This story, on the other hand, names\u2014for the first time\u2014a company that takes things a step further: this shady Indian startup was conducting hacking operations on behalf of companies who wanted to steal competitor&#8217;s secrets.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0\"><\/p>\n<p><strong><a href=\"https:\/\/news.yahoo.com\/secret-trump-order-gives-cia-more-powers-to-launch-cyberattacks-090015219.html\"><span>Secret Trump order gives CIA more powers to launch cyberattacks<\/span><\/a><\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p><strong>By: Zach Dorfman, Kim Zetter, Jenna McLaughlin and Sean D. Naylor<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>Very few stories a year reveal details of classified cyber operations conducted by governments\u2014let alone the US government. This story by a legitimate dream team of reporters does precisely that.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0\"><\/p>\n<p><strong><a href=\"https:\/\/www.wsj.com\/articles\/airbnb-executive-resigned-last-year-over-chinese-request-for-more-data-sharing-11605896753\"><span>Airbnb Executive Resigned Last Year Over Chinese Request for More Data Sharing<\/span><\/a><\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27\"><\/p>\n<p><strong>By: Dustin Volz and Kirsten Grind<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"26.733333333333\"><\/p>\n<p>We all know how much China has been able to throw its weight at American tech companies, from <a href=\"https:\/\/www.theverge.com\/2018\/7\/18\/17587304\/apple-icloud-china-user-data-state-run-telecom-privacy-security#:~:text=Apple%20originally%20announced%20its%20move,location%20for%20their%20cloud%20data.\"><span>forcing Apple to store Chinese citizens iCloud data within the country<\/span><\/a>, to tempting Google so much to convince the company to work on developing <a href=\"https:\/\/theintercept.com\/2018\/08\/08\/google-censorship-china-blacklist\/\"><span>a censored version of its search engine<\/span><\/a>. This story is a bit more wild: Airbnb&#8217;s former &#8220;chief trust officer,&#8221; a former FBI deputy director, resigned from the job because he was concerned about how much data Airbnb shared with the Chinese government. Truly a bombshell.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0\"><\/p>\n<p><strong><a href=\"https:\/\/risky.biz\/RB603\/\"><span>Risky Biz&#8217;s Patrick Gray interviews CISA&#8217;s Chris Krebs<\/span><\/a><\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"35\"><\/p>\n<p>Patrick&#8217;s podcast is a must listen pretty much every week, if anything for him and Adam Boileau&#8217;s always sharp and smart analysis of the week&#8217;s news. In this case, however, Patrick deserves kudos for talking to Chris Krebs, the architect of the Cybersecurity and Infrastructure Security Agency, just a few days before the election he helped secure\u2014and a couple of weeks before Donald Trump fired him via tweet for stating the truth about the election. Patrick is an exceptional interviewer and this is a great example of that.&nbsp;&nbsp;&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"1.0980392156863\"><\/p>\n<p><strong><a href=\"https:\/\/us18.campaign-archive.com\/?u=e1ad6038c994abec17dafb116&amp;id=66bb15a479\"><span>This week in security, Zack Whitaker&#8217;s newsletter<\/span><\/a>&nbsp;<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34.251781472684\"><\/p>\n<p>There are very few newsletters we subscribe to. There are even fewer that we actually want to read and open. Zack Whittaker&#8217;s is one of those. <a href=\"https:\/\/twitter.com\/zackwhittaker\"><span>Whittaker<\/span><\/a>, the security editor at TechCrunch, provides a cogent, to the point summary of the most important and interesting cybersecurity news of the past week. But he does it with humour and clarity, and usually there&#8217;s a picture of a cat at the bottom, which is always a plus.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\"><\/span><\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31865\/Some-Of-2020s-More-Interesting-Security-Stories.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[9113],"class_list":["post-38825","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentprivacyusadata-lossconference"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Some Of 2020&#039;s More Interesting Security Stories 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/some-of-2020s-more-interesting-security-stories\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Some Of 2020&#039;s More Interesting Security Stories 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/some-of-2020s-more-interesting-security-stories\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-21T16:38:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"432\" \/>\n\t<meta property=\"og:image:height\" content=\"435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/some-of-2020s-more-interesting-security-stories\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/some-of-2020s-more-interesting-security-stories\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Some Of 2020&#8217;s More Interesting Security Stories\",\"datePublished\":\"2020-12-21T16:38:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/some-of-2020s-more-interesting-security-stories\\\/\"},\"wordCount\":1278,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"keywords\":[\"headline,hacker,government,privacy,usa,data loss,conference\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/some-of-2020s-more-interesting-security-stories\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/some-of-2020s-more-interesting-security-stories\\\/\",\"name\":\"Some Of 2020's More Interesting Security Stories 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"datePublished\":\"2020-12-21T16:38:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/some-of-2020s-more-interesting-security-stories\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/some-of-2020s-more-interesting-security-stories\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/some-of-2020s-more-interesting-security-stories\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,privacy,usa,data loss,conference\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentprivacyusadata-lossconference\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Some Of 2020&#8217;s More Interesting Security Stories\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Some Of 2020's More Interesting Security Stories 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/some-of-2020s-more-interesting-security-stories\/","og_locale":"en_US","og_type":"article","og_title":"Some Of 2020's More Interesting Security Stories 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/some-of-2020s-more-interesting-security-stories\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-21T16:38:00+00:00","og_image":[{"width":432,"height":435,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/some-of-2020s-more-interesting-security-stories\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/some-of-2020s-more-interesting-security-stories\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Some Of 2020&#8217;s More Interesting Security Stories","datePublished":"2020-12-21T16:38:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/some-of-2020s-more-interesting-security-stories\/"},"wordCount":1278,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"keywords":["headline,hacker,government,privacy,usa,data loss,conference"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/some-of-2020s-more-interesting-security-stories\/","url":"https:\/\/www.threatshub.org\/blog\/some-of-2020s-more-interesting-security-stories\/","name":"Some Of 2020's More Interesting Security Stories 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"datePublished":"2020-12-21T16:38:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/some-of-2020s-more-interesting-security-stories\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/some-of-2020s-more-interesting-security-stories\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/some-of-2020s-more-interesting-security-stories\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,privacy,usa,data loss,conference","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentprivacyusadata-lossconference\/"},{"@type":"ListItem","position":3,"name":"Some Of 2020&#8217;s More Interesting Security Stories"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38825"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38825\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}