• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Archives for November 2025

All topics


Articles


9 Posts

Lighthouse Phishing Kit Takedown, Zero Day Mysteries, and Measuring Cyber Attack Costs

This week was a bit of a throwback to olden times, with the disclosure by Amazon threat intelligence of  zero days in Cisco and Citrix products that were exploited by an unnamed APT, and Google using legal action to disrupt the Lighthouse phishing service operation. We dig into those two stories, plus we discuss the […]

By Dennis Fisher

November 14, 2025 | 1 min read

Podcast

Marks and Spencer’s Profit Drop: The Financial Toll of Cyberattacks

The financial impacts of cyberattacks are hard to measure - but they lend critical context to conversations around security risk at the boardroom level.

By Lindsey O'Donnell-Welch

November 14, 2025 | 4 min read

RansomwareSecurity Risk

The Hacker Movie Canon: The Social Network

“You know, you really don’t need a forensics team to get to the bottom of this. If you guys were the inventors of Facebook, you’d have invented Facebook.” Melanie Ensign joins Dennis Fisher and Lindsey O’Donnell-Welch to discuss David Fincher’s massively successful 2010 film, The Social Network, a movie that opens a window into the […]

By Dennis Fisher

November 13, 2025 | 1 min read

HackersVideo

Google Wants to Snuff Out ‘Lighthouse’ Phishing Kit

Google is taking legal action "designed to dismantle the core infrastructure" of the Lighthouse phishing-as-a-service operation.

By Lindsey O'Donnell-Welch

November 12, 2025 | 2 min read

GooglePhishing

APT Targets Cisco and Citrix Zero Days

The chain of discovery began with Amazon's security honeypot service, MadPot, which detected exploitation attempts for the Citrix Bleed Two vulnerability (CVE-2025-5777) before its public disclosure

By Dennis Fisher

November 12, 2025 | 2 min read

APTCisco

Microsoft Warns of Exploited Windows Kernel Zero-Day 

The important-severity flaw (CVE-2025-62215) has been exploited, said Microsoft.

By Lindsey O'Donnell-Welch

November 11, 2025 | 2 min read

MicrosoftPatch TuesdayWindows
  • Page 1
  • Page 2
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2025 Decipher
  • Articles
  • Video

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by