• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • General
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Archives for September 2025

All topics


Articles


23 Posts

VMware Patches Bug Exploited By State Actors

The vulnerability (CVE-2025-41244) is easily exploitable, although it requires existing privileges on the target product.

By Dennis Fisher

September 30, 2025 | 2 min read

China

Microsoft Releases New Agentic AI Tools

The foundation of the new offerings is MIcrosoft Sentinel, the company’s security platform, that now includes the availability of the massive Sentinel data lake.

By Dennis Fisher

September 30, 2025 | 2 min read

AIMicrosoft

Akira Ransomware Actors Target SonicWall SSLVPN

This aggressive approach aligns with Akira's historical tactics of exploiting VPN infrastructure as an initial access vector.

By Dennis Fisher

September 29, 2025 | 2 min read

Ransomware

Cisco Warns of Attacks on Two ASA Flaws

Cisco’s Talos threat intelligence team said this campaign is the work of an actor it tracks as UAT4356, an APT team that has previously targeted ASA devices.

By Dennis Fisher

September 29, 2025 | 3 min read

Malware

The Hacker Movie Canon: Sneakers

The world isn’t run by weapons anymore, or energy, or money. It’s run by little ones and zeroes, little bits of data. It’s all just electrons. Daniel Cuthbert joins Dennis Fisher to dive into an all-tiime, undisputed hacker movie classic, the 1992 masterpiece, Sneakers. We dissect the movie’s genesis, its technical accuracy and prescience, and discuss […]

By Dennis Fisher

September 25, 2025 | 1 min read

Video

GitHub Aims to Improve npm Security After Malware Campaigns

GitHub said the changes will help "fortify the security of the software supply chain" after a recent surge of attacks targeting the npm ecosystem.

By Lindsey O'Donnell-Welch

September 24, 2025 | 4 min read

Open sourcesupply chain
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2025 Decipher
  • Articles
  • Video

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by