• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • Applw
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X
  • Apple

    Apple Patches iOS Zero Day CVE-2026-20700

    That vulnerability also was patched in macOS, but the active exploitation that Apple disclosed was against iOS only.

    By Dennis Fisher

    February 12, 2026 | 1 min read

    Read more
  • Microsoft

    Microsoft Fixes Six Exploited Bugs in February Patch Tuesday Updates

    The exploited vulnerabilities in question exist across various products, from Microsoft Word to Windows Shell.

    By Decipher

    February 11, 2026 | 3 min read

    Read more
  • Singapore

    Singapore Says China-Linked Threat Actors Targeted Telecom Sector

    UNC3886 is a Chinese espionage group known for targeting defense, tech, and telecom organizations across both the U.S. and Asia-Pacific-Japan regions.

    By Decipher

    February 9, 2026 | 2 min read

    Read more
Go to previous slide
Go to slide 1
Go to slide 2
Go to slide 3
Go to next slide

Apple Patches iOS Zero Day CVE-2026-20700

February 12, 2026 | 1 min read


Microsoft Fixes Six Exploited Bugs in February Patch Tuesday Updates

February 11, 2026 | 3 min read


Singapore Says China-Linked Threat Actors Targeted Telecom Sector

February 9, 2026 | 2 min read


Go to slide 1
Go to slide 2
Go to slide 3

Playlist


How to Stay Ahead of Attackers With watchTowr’s Ryan Dewhurst

February 9, 2026 | 1 min read

AIMalwareVideo

Dumping Edge Security Devices, the SystemBC Botnet, and the Joy of Joybubbles

February 6, 2026 | 1 min read

Podcast

Fortinet and WinRAR Exploitation, Google’s IPIDEA Disruption, and Our Favorite Cybersecurity Creators

January 30, 2026 | 1 min read

GooglePodcastVulnerability

The RedVDS Takedown, Yet Another Chinese APT Emerges, and the StackWarp AMD Bug

January 16, 2026 | 1 min read

MicrosoftPodcast

Topics


AI
General
Intrusions
Law Enforcement

The Latest

Microsoft Fixes Six Exploited Bugs in February Patch Tuesday Updates

Decipher
February 11, 2026

The exploited vulnerabilities in question exist across various products, from Microsoft Word to Windows Shell.

Read More Microsoft Fixes Six Exploited Bugs in February Patch Tuesday Updates

Singapore Says China-Linked Threat Actors Targeted Telecom Sector

Decipher
February 9, 2026

UNC3886 is a Chinese espionage group known for targeting defense, tech, and telecom organizations across both the U.S. and Asia-Pacific-Japan regions.

Read More Singapore Says China-Linked Threat Actors Targeted Telecom Sector

ai

US Gov Directive Cracks Down on Unsupported Edge DevicesĀ 

Decipher
February 5, 2026

CISA said potential exploitation of flaws in unsupported edge devices creates “a significant threat to federal property.”

Read More US Gov Directive Cracks Down on Unsupported Edge DevicesĀ 

New SystemBC Botnet Activity Targets Systems Worldwide

Dennis Fisher
February 4, 2026

The SystemBC botnet malware has become a critical component in the modern threat landscape, often preceding a full-scale ransomware deployment.

Read More New SystemBC Botnet Activity Targets Systems Worldwide

Phreaks and Geeks: Joybubbles and the Pre-History of Hacking

Dennis Fisher
February 2, 2026

The proto hacker whose innate ability, curiosity, and absolute joy in the act of discovery is conveyed so artfully in the new documentary Joybubbles.

Read More Phreaks and Geeks: Joybubbles and the Pre-History of Hacking

intrusion

Google Mandiant: ShinyHunters Attacks Target SaaS Platforms Via SSO, MFA Abuse

Decipher
February 2, 2026

The series of incidents detailed by Mandiant researchers started in early to mid-January, and included a previously disclosed campaign involving Okta customers.

Read More Google Mandiant: ShinyHunters Attacks Target SaaS Platforms Via SSO, MFA Abuse

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by