• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • Applw
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

All topics


Articles


86 Posts

Challenges Remain in Evaluating Ransomware Crackdowns

While law enforcement disruptions certainly have a positive impact, there are deep-rooted difficulties in measuring substantial long-term changes.

By Lindsey O'Donnell-Welch

August 11, 2025 | 6 min read

law enforcementRansomware

Microsoft Finds Secret Blizzard Targeting Foreign Diplomats

Microsoft has uncovered a long-running campaign by a threat group affiliated with Russian intelligence that has targeted diplomats working in Russia with a custom tool called ApolloShadow that enables the group to maintain persistence on victims’ devices as part of a cyberespionage operation. The group is known as Secret Blizzard and Microsoft’s researchers found that […]

By Dennis Fisher

August 11, 2025 | 2 min read

MicrosoftRussia

Chinese Attackers Target SharePoint CVE-2025-53770

Three separate Chinese threat groups are exploiting a set of recently disclosed vulnerabilities in on-premises Microsoft SharePoint installations, and Microsoft and CISA are urging companies that haven’t yet updated their installations to do so as quickly as possible.  Microsoft first published information about the two flaws (CVE-2025-53770 and CVE-2025-53771) on July 19 after seeing active […]

By Dennis Fisher

August 11, 2025 | 2 min read

ChinaMicrosoft

‘Nothing’s Going to Last Forever’: An Oral History of the L0pht, Part 4

As the 1990s drew to a close, the curtain was coming down on the L0pht, as well. Security companies were helping to fuel the first dot-com boom, and venture capitalists and investors took the place of the law enforcement agencies that once circled the group. The L0pht members considered their options: continue as an independent […]

By Dennis Fisher

August 11, 2025 | 8 min read

HackersL0pht

Thirty Minutes Or Less: An Oral History of the L0pht, Part 3

By the beginning of 1998, the national media had decided that cybersecurity was something worth paying attention to and the members of the L0pht were ready and willing to help explain the issues and weaknesses that all of this new technology brought with it. Pieces in The Washington Post, Wired, and many other outlets raised […]

By Dennis Fisher

August 11, 2025 | 8 min read

HackersL0pht

‘Microsoft Was Freaking Out’: An Oral History of the L0pht, Part 2

As the L0pht began to coalesce and become more well-known in the security community, the dynamics of the group evolved, too. The loft space in Boston’s South End became a hangout and meeting spot for local hackers, and as some of the members flourished, others began to pull back from the group. At the same […]

By Dennis Fisher

July 24, 2025 | 10 min read

HackersL0pht
  • «
  • Page 1
  • Interim pages omitted …
  • Page 12
  • Page 13
  • Page 14
  • Page 15
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by