• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Archives for October 2025

All topics


Articles


21 Posts

Shadow AI Is Eating the World, the Return of Hacking Team, and the Commercial Spyware Landscape

We don’t do holiday themed episodes in this house, so no tricks, but we have some treats for you. First we discuss the problem of shadow AI (1:00) and how it seems like we’re just repeating the mistakes of previous tech waves in ignoring security until it’s too late. Then we dig into a new […]

By Dennis Fisher

October 30, 2025 | 1 min read

AIPodcast

With AI and Security, ‘Everyone is Still Learning’

For many organizations, the biggest potential risk that arises from the use of AI tools is the leakage or mishandling of sensitive data. 

By Dennis Fisher

October 30, 2025 | 3 min read

AI

Google Chrome to Enable HTTPS Default Browsing 

In October 2026, Google will change the default settings in Chrome to include its existing “Always Use Secure Connections” feature.

By Lindsey O'Donnell-Welch

October 28, 2025 | 2 min read

ChromeGoogle

US Cybersecurity Going in Reverse, the AWS Outage, and is CISA Okay

This week saw a blessed lack of major vulnerabilities, but there was plenty of other news to dig into. We discuss the fallout from the AWS outage (0:36), the conclusions from the latest Cyberspace Solarium Commission report (4:37), and the effects of CISA’s shakeup on the private sector (14:07), and the continued effects of the F5 incident […]

By Dennis Fisher

October 24, 2025 | 1 min read

GovernmentPodcast

New Lazarus Group Campaign Targets EU Defense Companies

The suspected objective of the Lazarus group was the exfiltration of proprietary information and manufacturing expertise, particularly pertaining to UAV technology. 

By Dennis Fisher

October 24, 2025 | 3 min read

North Korea

US Facing ‘Unprecedented Setback’ in Cyber Policy Priorities: CSC Report

“For the first time, there has been a substantial reversal of the advances made in previous years,” warned the Cyberspace Solarium Commission report.

By Lindsey O'Donnell-Welch

October 22, 2025 | 3 min read

Cyberspace Solarium Commission
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2025 Decipher
  • Articles
  • Video

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by