• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X
  • financial impact
    Ransomware

    Marks and Spencer’s Profit Drop: The Financial Toll of Cyberattacks

    The financial impacts of cyberattacks are hard to measure – but they lend critical context to conversations around security risk at the boardroom level.

    By Lindsey O’Donnell-Welch

    November 14, 2025 | 4 min read

    Read more
  • lighthouse phishing kit
    Google

    Google Wants to Snuff Out ‘Lighthouse’ Phishing Kit

    Google is taking legal action “designed to dismantle the core infrastructure” of the Lighthouse phishing-as-a-service operation.

    By Lindsey O’Donnell-Welch

    November 12, 2025 | 2 min read

    Read more
  • goanywhere flaw
    APT

    APT Targets Cisco and Citrix Zero Days

    The chain of discovery began with Amazon’s security honeypot service, MadPot, which detected exploitation attempts for the Citrix Bleed Two vulnerability (CVE-2025-5777) before its public disclosure

    By Dennis Fisher

    November 12, 2025 | 2 min read

    Read more
Go to previous slide
Go to slide 1
Go to slide 2
Go to slide 3
Go to next slide

Marks and Spencer’s Profit Drop: The Financial Toll of Cyberattacks

November 14, 2025 | 4 min read


Google Wants to Snuff Out ‘Lighthouse’ Phishing Kit

November 12, 2025 | 2 min read


APT Targets Cisco and Citrix Zero Days

November 12, 2025 | 2 min read


Go to slide 1
Go to slide 2
Go to slide 3

Playlist


Lighthouse Phishing Kit Takedown, Zero Day Mysteries, and Measuring Cyber Attack Costs

November 14, 2025 | 1 min read

Podcast

The Hacker Movie Canon: The Social Network

November 13, 2025 | 1 min read

HackersVideo

Yahoo’s Sean Zadig on How to Raise a Hacker Safely and How Maybe AI Isn’t Changing Everything

November 5, 2025 | 1 min read

AIHackersVideo

Shadow AI Is Eating the World, the Return of Hacking Team, and the Commercial Spyware Landscape

October 30, 2025 | 1 min read

AIPodcast

Topics


AI
General
Intrusions
Law Enforcement

The Latest

lighthouse phishing kit

Google Wants to Snuff Out ‘Lighthouse’ Phishing Kit

Lindsey O'Donnell-Welch
November 12, 2025

Google is taking legal action “designed to dismantle the core infrastructure” of the Lighthouse phishing-as-a-service operation.

Read More Google Wants to Snuff Out ‘Lighthouse’ Phishing Kit

goanywhere flaw

APT Targets Cisco and Citrix Zero Days

Dennis Fisher
November 12, 2025

The chain of discovery began with Amazon’s security honeypot service, MadPot, which detected exploitation attempts for the Citrix Bleed Two vulnerability (CVE-2025-5777) before its public disclosure

Read More APT Targets Cisco and Citrix Zero Days

microsoft

Microsoft Warns of Exploited Windows Kernel Zero-Day 

Lindsey O'Donnell-Welch
November 11, 2025

The important-severity flaw (CVE-2025-62215) has been exploited, said Microsoft.

Read More Microsoft Warns of Exploited Windows Kernel Zero-Day 

Q&A: Sean Zadig of Yahoo on Employing AI in Security

Dennis Fisher
November 6, 2025

There are plenty of challenges and pitfalls for security teams looking to deploy AI tools and Zadig said Yahoo is taking a measured, careful approach. This is a condensed and edited portion of our discussion.

Read More Q&A: Sean Zadig of Yahoo on Employing AI in Security

Fiber optic cables

Google: Threat Actors Testing AI During Malware Execution

Lindsey O'Donnell-Welch
November 5, 2025

Threat actors are now using LLMs in malware during execution, as a way to alter the malware’s behavior to enable detection evasion and more.

Read More Google: Threat Actors Testing AI During Malware Execution

With AI and Security, ‘Everyone is Still Learning’

Dennis Fisher
October 30, 2025

For many organizations, the biggest potential risk that arises from the use of AI tools is the leakage or mishandling of sensitive data. 

Read More With AI and Security, ‘Everyone is Still Learning’

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2025 Decipher
  • Articles
  • Video

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by