• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

All topics


Articles


62 Posts

Threat Actors Target Unpatched Cisco AsyncOS Zero-Day

Threat actors are exploiting an unpatched zero-day vulnerability in Cisco AsyncOS software.

By Lindsey O'Donnell-Welch

December 17, 2025 | 2 min read

Russian Hackers Target Misconfigured Edge Devices in ‘Concerning Evolution’ For Critical Infrastructure Attacks

Amazon researchers highlighted a "tactical pivot" by Russian GRU hackers who have been moving away from zero-day and N-day exploitation.

By Lindsey O'Donnell-Welch

December 16, 2025 | 2 min read

Edge DevicesRussiaSandworm

The Enduring Hacker Legacy of Heat

It was 30 years ago this week that Michael Mann's masterpiece Heat hit theaters like a semi T-boning an armored car. In addition to being a masterful heist movie and insightful depiction of the toll that obsession can exact, Heat is also a criminally underrated hacker movie.

By Dennis Fisher

December 16, 2025 | 1 min read

HackersVideo

Broad Exploit Activity Targets React2Shell Flaw

The vulnerability was disclosed publicly on Dec. 3 and researchers and threat intelligence teams immediately began seeing opportunistic and targeted exploitation attempts.

By Dennis Fisher

December 9, 2025 | 3 min read

ReactVulnerability

Government, Private Sector Officials Mull Telecom Security Woes

A year after Salt Typhoon's telecom hack, private and public sector officials discussed next steps.

By Lindsey O'Donnell-Welch

December 4, 2025 | 4 min read

telecom

Critical Flaw CVE-2025-55182 Affects React Server Components

All developers using React Server Components are urged to upgrade immediately, and some apps that don’t include React Server Function endpoints could be vulnerable, as well.

By Dennis Fisher

December 3, 2025 | 2 min read

ReactVulnerability
  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 11
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2025 Decipher
  • Articles
  • Video

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by