• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • Apple
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Microsoft
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

All topics


Articles


96 Posts

APT28 Reemerges with Modern Espionage Arsenal, Code Tied to 2010s Operations

The modern Sednit arsenal is centered on two highly-developed implants, deployed systematically in tandem to ensure persistent access.

By Dennis Fisher

March 9, 2026 | 3 min read

Russia

Mister Decipher’s Neighborhood

It's a beautiful day in the neighborhood for hacking! Come along on a magical adventure as Mr. Decipher teaches you about the dangers of brute-force attacks!

By Dennis Fisher

March 9, 2026 | 1 min read

AIVideo

Google: Commercial Surveillance Vendors Dominated Zero-Day Exploitation in 2025 

Out of 42 unique zero days tracked by Google in 2025, 18 were attributed to CSVs, while 15 were linked to state-sponsored espionage groups.

By Decipher

March 9, 2026 | 3 min read

GoogleVulnerability

Microsoft, Europol Disrupt Tycoon 2FA Phishing Service

The comprehensive effort, which involved seizing 330 active domains, cuts off a critical pipeline for account takeovers that targeted over 500,000 organizations and sent tens of millions of fraudulent emails monthly.

By Dennis Fisher

March 4, 2026 | 3 min read

MalwareMicrosoft

Q&A: Tod Beardsley on How to Use CISA’s KEV Catalog

Without context, the KEV catalog is just a very large collection of data. Tod Beardsley is the former CISA KEV section chief, and he recently released a paper called KEVology that provides key context and evaluates the value of certain enrichment signals.

By Dennis Fisher

March 3, 2026 | 4 min read

CISAVulnerability

Cisco, NSA Warn of Attacks Targeting Catalyst SD-WAN Zero Day

Cisco released software updates on Feb. 25 to fix the vulnerability, which affects both on-premises and cloud deployments of the Catalyst SD-WAN Controller. 

By Dennis Fisher

February 26, 2026 | 2 min read

CiscoVulnerability
  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 16
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by