• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • Apple
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Microsoft
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Author Bio


Dennis Fisher

Editor

Dennis Fisher is an award-winning journalist and author. He is one of the co-founders of Decipher and Threatpost and has been writing about cybersecurity since 2000. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. He is the author of 2.5 novels and once met Shaq. Contact: dennis at decipher.sc.

dennis@decipher.sc

Featured Articles


The Wild, Wild World of Exploits With Caitlin Condon

The process of developing and deploying exploits is a complex and controversial one and it’s often a black box to outside observers. To help shine a light on how this all works, Caitlin Condon of VulnCheck joins Dennis Fisher for a deep dive into the zero day exploit landscape, what goes into exploit development, and […]

By Dennis Fisher

March 10, 2026 | 1 min read

AIVideoVulnerability

APT28 Reemerges with Modern Espionage Arsenal, Code Tied to 2010s Operations

The modern Sednit arsenal is centered on two highly-developed implants, deployed systematically in tandem to ensure persistent access.

By Dennis Fisher

March 9, 2026 | 3 min read

Russia

Mister Decipher’s Neighborhood

It's a beautiful day in the neighborhood for hacking! Come along on a magical adventure as Mr. Decipher teaches you about the dangers of brute-force attacks!

By Dennis Fisher

March 9, 2026 | 1 min read

AIVideo

The Zero Day Landscape, Tycoon 2FA Disruption, and KEVology

Every day is zero day, and this week we talked about the new Google Threat Intelligence Group report on the zero day exploit landscape in 2025 (2:22) and who’s exploiting what, then we discuss Microsoft’s disruption of the Tycoon 2FA cybercrime operation (9:51), and finally we talk about the KEVology report from runZero and our […]

By Dennis Fisher

March 6, 2026 | 1 min read

CISAGoogleMicrosoftPodcast

Microsoft, Europol Disrupt Tycoon 2FA Phishing Service

The comprehensive effort, which involved seizing 330 active domains, cuts off a critical pipeline for account takeovers that targeted over 500,000 organizations and sent tens of millions of fraudulent emails monthly.

By Dennis Fisher

March 4, 2026 | 3 min read

MalwareMicrosoft

Q&A: Tod Beardsley on How to Use CISA’s KEV Catalog

Without context, the KEV catalog is just a very large collection of data. Tod Beardsley is the former CISA KEV section chief, and he recently released a paper called KEVology that provides key context and evaluates the value of certain enrichment signals.

By Dennis Fisher

March 3, 2026 | 4 min read

CISAVulnerability
  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 17
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by