• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • Apple
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X
  • microsoft
    Malware

    Microsoft Uncovers New Malicious Campaign Targeting Developers

    This campaign is an offshoot of the more familiar and pervasive fake job interview and phony tech worker scams that have been coming from North Korea for several years.

    By Dennis Fisher

    February 25, 2026 | 3 min read

    Read more
  • Google

    Google Disrupts ‘Prolific, Elusive’ China-Linked Actor

    Google said it has found 53 victims that have been impacted by the group, which it has tracked since 2017.

    By Decipher

    February 25, 2026 | 2 min read

    Read more
  • us flag
    Exploit

    Former US Defense Contractor Sentenced to Jail For Selling Exploits

    In a parallel Tuesday announcement, the Treasury Department also sanctioned the exploit broker network that had acquired the tools.

    By Decipher

    February 25, 2026 | 3 min read

    Read more
Go to previous slide
Go to slide 1
Go to slide 2
Go to slide 3
Go to next slide

Microsoft Uncovers New Malicious Campaign Targeting Developers

February 25, 2026 | 3 min read


Google Disrupts ‘Prolific, Elusive’ China-Linked Actor

February 25, 2026 | 2 min read


Former US Defense Contractor Sentenced to Jail For Selling Exploits

February 25, 2026 | 3 min read


Go to slide 1
Go to slide 2
Go to slide 3

Playlist


China Targets Dell Flaw, New Ivanti Exploitation, and Cyber Shenanigans on The Pitt!

February 20, 2026 | 1 min read

HackersPodcastVulnerability

Deciphering Star Wars

February 18, 2026 | 1 min read

PodcastVideo

Six Zero Days From Microsoft, One From Apple, and a CSI: Cyber Throwback

February 13, 2026 | 1 min read

AppleMicrosoftPodcastVulnerability

How to Stay Ahead of Attackers With watchTowr’s Ryan Dewhurst

February 9, 2026 | 1 min read

AIMalwareVideo

Topics


AI
General
Intrusions
Law Enforcement

The Latest

Google Disrupts ‘Prolific, Elusive’ China-Linked Actor

Decipher
February 25, 2026

Google said it has found 53 victims that have been impacted by the group, which it has tracked since 2017.

Read More Google Disrupts ‘Prolific, Elusive’ China-Linked Actor

us flag

Former US Defense Contractor Sentenced to Jail For Selling Exploits

Decipher
February 25, 2026

In a parallel Tuesday announcement, the Treasury Department also sanctioned the exploit broker network that had acquired the tools.

Read More Former US Defense Contractor Sentenced to Jail For Selling Exploits

exploitation

Researchers Warn of ‘Widespread’ Ivanti EPMM Exploitation 

Decipher
February 19, 2026

Exploitation of CVE-2026-1281 and CVE-2026-1340 is “widespread and mostly automated,” according to Unit 42 researchers.

Read More Researchers Warn of ‘Widespread’ Ivanti EPMM Exploitation 

china flag

Chinese Actors Exploited Dell RecoverPoint for VMs Flaw Since 2024

Decipher
February 18, 2026

The hardcoded credential vulnerability (CVE-2026-22769) exists in Dell RecoverPoint for Virtual Machines and has been exploited since mid-2024.

Read More Chinese Actors Exploited Dell RecoverPoint for VMs Flaw Since 2024

Apple Patches iOS Zero Day CVE-2026-20700

Dennis Fisher
February 12, 2026

That vulnerability also was patched in macOS, but the active exploitation that Apple disclosed was against iOS only.

Read More Apple Patches iOS Zero Day CVE-2026-20700

Microsoft Fixes Six Exploited Bugs in February Patch Tuesday Updates

Decipher
February 11, 2026

The exploited vulnerabilities in question exist across various products, from Microsoft Word to Windows Shell.

Read More Microsoft Fixes Six Exploited Bugs in February Patch Tuesday Updates

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by