• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

All topics


Articles


77 Posts

Decipher is Everyone

We’re optimists, and that’s reflected in the mission statement we coined when we first launched in 2018: Security without fear.

By Dennis Fisher

September 3, 2025 | 2 min read

Hackers

UNC6395 Expands Data Theft Campaign to Email OAuth Tokens

Google researchers discovered the new attacks and are advising all customers to treat any authentication tokens for those integrations as compromised.

By Dennis Fisher

September 2, 2025 | 2 min read

Data breachGoogle

US Gov Links Private Chinese Firms to Salt Typhoon Hacks

Salt Typhoon has not been observed exploiting zero-day flaws, but instead targeting known bugs in exposed network edge devices - some of which are years old.

By Lindsey O'Donnell-Welch

August 27, 2025 | 3 min read

ChinaSalt Typhoon

Citrix CVE-2025-7775 Under Active Attack

The vulnerability (CVE-2025-7775) is a buffer overflow that can lead to remote code execution and attackers were already targeting it before the public disclosure.

By Dennis Fisher

September 2, 2025 | 2 min read

Citrix

DoJ Seizes $2.8M Linked to Zeppelin Ransomware

The DoJ raked back $2.8 million in crypto, as well as cash and a stolen vehicle, belonging to an alleged operator of the Zeppelin ransomware.

By Lindsey O'Donnell-Welch

August 18, 2025 | 2 min read

Ransomware

CISA, Microsoft Warn of Exchange CVE-2025-53786 Risk

CISA has issued an emergency directive regarding the recently disclosed and somewhat weird vulnerability in Microsoft Exchange hybrid deployments (CVE-2025-53786), ordering all civilian federal agencies to address the flaw by Aug. 11.

By Dennis Fisher

August 28, 2025 | 2 min read

GovernmentMicrosoft
  • «
  • Page 1
  • Interim pages omitted …
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by