• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • Apple
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

All topics


Articles


87 Posts

Is Kevin McCallister the Greatest Hacker in Movie History?

There may not be any computers in Home Alone, but few movie characters embody the old-school hacker ethos like Kevin McCallister does.

By Dennis Fisher

December 22, 2025 | 1 min read

PodcastVideo

Threat Actors Target Unpatched Cisco AsyncOS Zero-Day

Threat actors are exploiting an unpatched zero-day vulnerability in Cisco AsyncOS software.

By Lindsey O'Donnell-Welch

December 17, 2025 | 2 min read

Russian Hackers Target Misconfigured Edge Devices in ‘Concerning Evolution’ For Critical Infrastructure Attacks

Amazon researchers highlighted a "tactical pivot" by Russian GRU hackers who have been moving away from zero-day and N-day exploitation.

By Lindsey O'Donnell-Welch

December 16, 2025 | 2 min read

Edge DevicesRussiaSandworm

The Enduring Hacker Legacy of Heat

It was 30 years ago this week that Michael Mann's masterpiece Heat hit theaters like a semi T-boning an armored car. In addition to being a masterful heist movie and insightful depiction of the toll that obsession can exact, Heat is also a criminally underrated hacker movie.

By Dennis Fisher

December 16, 2025 | 1 min read

HackersVideo

Broad Exploit Activity Targets React2Shell Flaw

The vulnerability was disclosed publicly on Dec. 3 and researchers and threat intelligence teams immediately began seeing opportunistic and targeted exploitation attempts.

By Dennis Fisher

December 9, 2025 | 3 min read

ReactVulnerability

Government, Private Sector Officials Mull Telecom Security Woes

A year after Salt Typhoon's telecom hack, private and public sector officials discussed next steps.

By Lindsey O'Donnell-Welch

December 4, 2025 | 4 min read

telecom
  • «
  • Page 1
  • Interim pages omitted …
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Interim pages omitted …
  • Page 15
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by