• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

All topics


General


39 Posts

Google Disrupts IPIDEA Residential Proxy Network

Google researchers observed more than 550 individual threat groups using IPIDEA exit nodes during a one-week period earlier this month. 

By Dennis Fisher

January 29, 2026 | 3 min read

GoogleMalware

The RedVDS Takedown, Yet Another Chinese APT Emerges, and the StackWarp AMD Bug

This week, we talk about how Microsoft disrupted a long-running, large-scale cybercrime-as-a-service platform called RedVDS that has been active since 2019 and was used in high-volume phishing and BEC scams (1:00), then we discuss the research from Cisco Talos on another (!) Chinese APT called UAT-8837 that is targeting critical infrastructure organizations in North America […]

By Dennis Fisher

January 16, 2026 | 1 min read

MicrosoftPodcast

A New Chinese APT Takes the Stage

Active since at least 2022, UAT-7290 demonstrates a significant capacity for conducting deep-seated espionage while simultaneously functioning as an initial access group.

By Dennis Fisher

January 9, 2026 | 2 min read

China

IBM Warns of Critical Auth Bypass Bug in API Connect

IBM published updates for the affected versions of API Connect on Jan. 2., and urged organizations to update affected versions as soon as possible.

By Dennis Fisher

January 6, 2026 | 1 min read

IBM

Serious MongoDB Flaw CVE-2025-14847 Under Exploitation

MongoDB disclosed the vulnerability (CVE-2025-14847) on Dec. 19 and a few days later, a public exploit for it appeared online.

By Dennis Fisher

December 29, 2025 | 1 min read

MongoDBVulnerability

Broad Exploit Activity Targets React2Shell Flaw

The vulnerability was disclosed publicly on Dec. 3 and researchers and threat intelligence teams immediately began seeing opportunistic and targeted exploitation attempts.

By Dennis Fisher

December 9, 2025 | 3 min read

ReactVulnerability
  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 7
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by