• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X
  • Hackers

    Phreaks and Geeks: Joybubbles and the Pre-History of Hacking

    The proto hacker whose innate ability, curiosity, and absolute joy in the act of discovery is conveyed so artfully in the new documentary Joybubbles.

    By Dennis Fisher

    February 2, 2026 | 4 min read

    Read more
  • intrusion
    ShinyHunters

    Google Mandiant: ShinyHunters Attacks Target SaaS Platforms Via SSO, MFA Abuse

    The series of incidents detailed by Mandiant researchers started in early to mid-January, and included a previously disclosed campaign involving Okta customers.

    By Decipher

    February 2, 2026 | 2 min read

    Read more
  • ivanti

    Ivanti Discloses Exploited Critical EPMM Flaws

    The vulnerabilities (CVE-2026-1281 and CVE-2026-1340) could lead to unauthenticated remote code execution if successfully exploited.

    By Decipher

    January 30, 2026 | 2 min read

    Read more
Go to previous slide
Go to slide 1
Go to slide 2
Go to slide 3
Go to next slide

Phreaks and Geeks: Joybubbles and the Pre-History of Hacking

February 2, 2026 | 4 min read


Google Mandiant: ShinyHunters Attacks Target SaaS Platforms Via SSO, MFA Abuse

February 2, 2026 | 2 min read


Ivanti Discloses Exploited Critical EPMM Flaws

January 30, 2026 | 2 min read


Go to slide 1
Go to slide 2
Go to slide 3

Playlist


Fortinet and WinRAR Exploitation, Google’s IPIDEA Disruption, and Our Favorite Cybersecurity Creators

January 30, 2026 | 1 min read

GooglePodcastVulnerability

The RedVDS Takedown, Yet Another Chinese APT Emerges, and the StackWarp AMD Bug

January 16, 2026 | 1 min read

MicrosoftPodcast

The Future of Vulnerability Management With Jeremiah Grossman and Robert “RSnake” Hansen

January 13, 2026 | 1 min read

VideoVulnerability

A New Chinese APT Debuts and React2Shell Attacks Spike

January 9, 2026 | 0 min read

Podcast

Topics


AI
General
Intrusions
Law Enforcement

The Latest

intrusion

Google Mandiant: ShinyHunters Attacks Target SaaS Platforms Via SSO, MFA Abuse

Decipher
February 2, 2026

The series of incidents detailed by Mandiant researchers started in early to mid-January, and included a previously disclosed campaign involving Okta customers.

Read More Google Mandiant: ShinyHunters Attacks Target SaaS Platforms Via SSO, MFA Abuse

Ivanti Discloses Exploited Critical EPMM Flaws

Decipher
January 30, 2026

The vulnerabilities (CVE-2026-1281 and CVE-2026-1340) could lead to unauthenticated remote code execution if successfully exploited.

Read More Ivanti Discloses Exploited Critical EPMM Flaws

Google Disrupts IPIDEA Residential Proxy Network

Dennis Fisher
January 29, 2026

Google researchers observed more than 550 individual threat groups using IPIDEA exit nodes during a one-week period earlier this month. 

Read More Google Disrupts IPIDEA Residential Proxy Network

Fiber optic cables

Fortinet Warns of Critical Flaw After FortiCloud SSO Exploitation

Decipher
January 28, 2026

Fortinet is rolling out updates for CVE-2026-24858, with fixes for some versions available as of Tuesday, and others in releases that are upcoming at an unspecified date.

Read More Fortinet Warns of Critical Flaw After FortiCloud SSO Exploitation

intrusion

Cybercrime and APT Groups Exploiting WinRAR Bug

Dennis Fisher
January 27, 2026

Exploitation of CVE-2025-8088 in the wild began before disclosure, with attacks confirmed as early as July 18, 2025.

Read More Cybercrime and APT Groups Exploiting WinRAR Bug

Microsoft Releases Emergency Patch for CVE-2026-21509

Dennis Fisher
January 26, 2026

The vulnerability (CVE-2026-21509) requires user interaction for an attack to succeed, with the most likely vector being an attacker sending a malicious Office file to a victim, who then opens it. 

Read More Microsoft Releases Emergency Patch for CVE-2026-21509

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by