• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • Apple
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Microsoft
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

All topics


Articles


96 Posts

Cloudflare Details Salesloft Drift Breach

This incident is the latest to stem from an intrusion at Salesloft in which attackers used OAuth tokens to target Salesloft customers’ Salesforce integrations.

By Dennis Fisher

September 3, 2025 | 3 min read

CloudData breach

Decipher is Everyone

We’re optimists, and that’s reflected in the mission statement we coined when we first launched in 2018: Security without fear.

By Dennis Fisher

September 3, 2025 | 2 min read

Hackers

UNC6395 Expands Data Theft Campaign to Email OAuth Tokens

Google researchers discovered the new attacks and are advising all customers to treat any authentication tokens for those integrations as compromised.

By Dennis Fisher

September 2, 2025 | 2 min read

Data breachGoogle

US Gov Links Private Chinese Firms to Salt Typhoon Hacks

Salt Typhoon has not been observed exploiting zero-day flaws, but instead targeting known bugs in exposed network edge devices - some of which are years old.

By Lindsey O'Donnell-Welch

August 27, 2025 | 3 min read

ChinaSalt Typhoon

Citrix CVE-2025-7775 Under Active Attack

The vulnerability (CVE-2025-7775) is a buffer overflow that can lead to remote code execution and attackers were already targeting it before the public disclosure.

By Dennis Fisher

September 2, 2025 | 2 min read

Citrix

DoJ Seizes $2.8M Linked to Zeppelin Ransomware

The DoJ raked back $2.8 million in crypto, as well as cash and a stolen vehicle, belonging to an alleged operator of the Zeppelin ransomware.

By Lindsey O'Donnell-Welch

August 18, 2025 | 2 min read

Ransomware
  • «
  • Page 1
  • Interim pages omitted …
  • Page 12
  • Page 13
  • Page 14
  • Page 15
  • Page 16
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by