• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Archives for December 2025

All topics


Articles


15 Posts

Serious MongoDB Flaw CVE-2025-14847 Under Exploitation

MongoDB disclosed the vulnerability (CVE-2025-14847) on Dec. 19 and a few days later, a public exploit for it appeared online.

By Dennis Fisher

December 29, 2025 | 1 min read

MongoDBVulnerability

Is Kevin McCallister the Greatest Hacker in Movie History?

There may not be any computers in Home Alone, but few movie characters embody the old-school hacker ethos like Kevin McCallister does.

By Dennis Fisher

December 22, 2025 | 1 min read

PodcastVideo

Russian Targeting of Edge Devices. Cisco AsyncOS Zero Day, and React2Shell Won’t Go Away

As we ease into the holidays, the security news doesn’t stop coming. This week we discuss the research from AWS threat intelligence on Russian adversaries targeting a variety of network edge devices for opportunistic exploitation, then we break down attacks by a Chinese threat actor that target a new zero day in Cisco’s AsyncOS, and finally we discuss the […]

By Dennis Fisher

December 19, 2025 | 1 min read

PodcastRussia

Threat Actors Target Unpatched Cisco AsyncOS Zero-Day

Threat actors are exploiting an unpatched zero-day vulnerability in Cisco AsyncOS software.

By Lindsey O'Donnell-Welch

December 17, 2025 | 2 min read

The Hacker Movie Canon: Die Hard

Pete Baker and Zoe Lindsey join Dennis Fisher on the roof of Nakatomi Plaza to discuss one of the great action classics* and a beloved movie in the hacker community: Die Hard. Yippee ki-yay!  *Not a Christmas movie

By Dennis Fisher

December 17, 2025 | 1 min read

HackersPodcastVideo

Russian Hackers Target Misconfigured Edge Devices in ‘Concerning Evolution’ For Critical Infrastructure Attacks

Amazon researchers highlighted a "tactical pivot" by Russian GRU hackers who have been moving away from zero-day and N-day exploitation.

By Lindsey O'Donnell-Welch

December 16, 2025 | 2 min read

Edge DevicesRussiaSandworm
  • Page 1
  • Page 2
  • Page 3
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by