• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Archives for October 2025

All topics


Articles


21 Posts

The Hacker Movie Canon: Real Genius

Mitch, there’s something you need to know. Compared to you, most people have the IQ of a carrot. Real Genius has it all: ’80s movie icon Val Kilmer at his coolest, a brilliant hacker named Laszlo living in a closet, a giant space laser, and the absolute embodiment of the hacker ethos. Join us as we […]

By Dennis Fisher

October 22, 2025 | 1 min read

Podcast

It’s All Just Electrons: The Enduring Legacy of Sneakers

"The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes, little bits of data. It's all just electrons."

By Dennis Fisher

October 21, 2025 | 1 min read

PodcastVideo

Why WarGames is Still Predicting the Future 40 Years Later

WarGames may be 42 years old but its prescience about our current technocracy and race to take humans out of the loop is as clear as ever

By Dennis Fisher

October 17, 2025 | 1 min read

AIVideo

Breaking Down the F5 Breach

In the wake of the disclosure of a serious intrusion at F5 that reportedly lasted about a year, we talk about the details of the disclosure, the potential link to Chinese state actors, the fallout from the attackers’ access to source code and bug reports, and what this could mean in the long term. 

By Dennis Fisher

October 16, 2025 | 1 min read

Data breachPodcast

AI Attack and Defense With Adam Meyers and Elia Zaitsev of CrowdStrike

Have you heard about this AI thing? It’s wild. Turns out, attackers are using it for all kinds of things we’d rather not have them doing. Dennis Fisher is joined by two experts from CrowdStrike–Adam Meyers, head of counter adversary operations, and Elia Zaitsev, CTO–to talk about how both defenders and attackers are leveraging AI […]

By Dennis Fisher

October 15, 2025 | 1 min read

AIVideo

F5: Attacker Accessed BIG-IP Source Code, Bug Data

The company discovered the intrusion in August but did not say when the attackers first gained access to F5’s systems or how long they had access.

By Dennis Fisher

October 17, 2025 | 2 min read

Data breachF5
  • «
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2025 Decipher
  • Articles
  • Video

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by