• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Author Bio


Dennis Fisher

Editor

Dennis Fisher is an award-winning journalist and author. He is one of the co-founders of Decipher and Threatpost and has been writing about cybersecurity since 2000. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. He is the author of 2.5 novels and once met Shaq. Contact: dennis at decipher.sc.

dennis@decipher.sc

Featured Articles


Why WarGames is Still Predicting the Future 40 Years Later

WarGames may be 42 years old but its prescience about our current technocracy and race to take humans out of the loop is as clear as ever

By Dennis Fisher

October 17, 2025 | 1 min read

AIVideo

Breaking Down the F5 Breach

In the wake of the disclosure of a serious intrusion at F5 that reportedly lasted about a year, we talk about the details of the disclosure, the potential link to Chinese state actors, the fallout from the attackers’ access to source code and bug reports, and what this could mean in the long term. 

By Dennis Fisher

October 16, 2025 | 1 min read

Data breachPodcast

AI Attack and Defense With Adam Meyers and Elia Zaitsev of CrowdStrike

Have you heard about this AI thing? It’s wild. Turns out, attackers are using it for all kinds of things we’d rather not have them doing. Dennis Fisher is joined by two experts from CrowdStrike–Adam Meyers, head of counter adversary operations, and Elia Zaitsev, CTO–to talk about how both defenders and attackers are leveraging AI […]

By Dennis Fisher

October 15, 2025 | 1 min read

AIVideo

F5: Attacker Accessed BIG-IP Source Code, Bug Data

The company discovered the intrusion in August but did not say when the attackers first gained access to F5’s systems or how long they had access.

By Dennis Fisher

October 17, 2025 | 2 min read

Data breachF5

More Cl0p Clues and Huge Apple Bug Bounty Changes

This week brings some new insights into the origins and length of the Cl0p extortion attacks tied to the Oracle E-Business Suite vulnerability, big surges in scanning for Cisco ASA, Palo Alto, and Fortinet devices, and a huge upgrade to Apple bug bounty payouts.

By Dennis Fisher

October 10, 2025 | 1 min read

Data breachPodcastRansomware
Fiber optic cables

Data Connects Scanning Surges for Cisco, Fortinet, PAN Devices

Researchers say that all three campaigns are being driven at least in part by one threat actor. 

By Dennis Fisher

October 8, 2025 | 2 min read

Malware
  • «
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Interim pages omitted …
  • Page 8
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2025 Decipher
  • Articles
  • Video

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by