• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • General
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Archives for August 2025

All topics


Articles


10 Posts

UNC6395 Expands Data Theft Campaign to Email OAuth Tokens

Google researchers discovered the new attacks and are advising all customers to treat any authentication tokens for those integrations as compromised.

By Dennis Fisher

September 2, 2025 | 2 min read

Data breachGoogle

US Gov Links Private Chinese Firms to Salt Typhoon Hacks

Salt Typhoon has not been observed exploiting zero-day flaws, but instead targeting known bugs in exposed network edge devices - some of which are years old.

By Lindsey O'Donnell-Welch

August 27, 2025 | 3 min read

ChinaSalt Typhoon

Citrix CVE-2025-7775 Under Active Attack

The vulnerability (CVE-2025-7775) is a buffer overflow that can lead to remote code execution and attackers were already targeting it before the public disclosure.

By Dennis Fisher

September 2, 2025 | 2 min read

Citrix

DoJ Seizes $2.8M Linked to Zeppelin Ransomware

The DoJ raked back $2.8 million in crypto, as well as cash and a stolen vehicle, belonging to an alleged operator of the Zeppelin ransomware.

By Lindsey O'Donnell-Welch

August 18, 2025 | 2 min read

Ransomware

CISA, Microsoft Warn of Exchange CVE-2025-53786 Risk

CISA has issued an emergency directive regarding the recently disclosed and somewhat weird vulnerability in Microsoft Exchange hybrid deployments (CVE-2025-53786), ordering all civilian federal agencies to address the flaw by Aug. 11.

By Dennis Fisher

August 28, 2025 | 2 min read

GovernmentMicrosoft

The Emerging Ecosystem Dedicated to AI Accountability

A new ecosystem of security researchers is emerging, looking to sniff out data security and privacy issues in AI systems and grappling with issues like a lack of transparency into and understanding of LLMs.

By Lindsey O'Donnell-Welch

August 11, 2025 | 6 min read

AI
  • Page 1
  • Page 2
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2025 Decipher
  • Articles
  • Video

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by