• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

All topics


Intrusions


24 Posts

US Cybersecurity Going in Reverse, the AWS Outage, and is CISA Okay

This week saw a blessed lack of major vulnerabilities, but there was plenty of other news to dig into. We discuss the fallout from the AWS outage (0:36), the conclusions from the latest Cyberspace Solarium Commission report (4:37), and the effects of CISA’s shakeup on the private sector (14:07), and the continued effects of the F5 incident […]

By Dennis Fisher

October 24, 2025 | 1 min read

GovernmentPodcast

New Lazarus Group Campaign Targets EU Defense Companies

The suspected objective of the Lazarus group was the exfiltration of proprietary information and manufacturing expertise, particularly pertaining to UAV technology. 

By Dennis Fisher

October 24, 2025 | 3 min read

North Korea

Breaking Down the F5 Breach

In the wake of the disclosure of a serious intrusion at F5 that reportedly lasted about a year, we talk about the details of the disclosure, the potential link to Chinese state actors, the fallout from the attackers’ access to source code and bug reports, and what this could mean in the long term. 

By Dennis Fisher

October 16, 2025 | 1 min read

Data breachPodcast

F5: Attacker Accessed BIG-IP Source Code, Bug Data

The company discovered the intrusion in August but did not say when the attackers first gained access to F5’s systems or how long they had access.

By Dennis Fisher

October 17, 2025 | 2 min read

Data breachF5

More Cl0p Clues and Huge Apple Bug Bounty Changes

This week brings some new insights into the origins and length of the Cl0p extortion attacks tied to the Oracle E-Business Suite vulnerability, big surges in scanning for Cisco ASA, Palo Alto, and Fortinet devices, and a huge upgrade to Apple bug bounty payouts.

By Dennis Fisher

October 10, 2025 | 1 min read

Data breachPodcastRansomware

Oracle Clop Data Theft Campaign Started Months Ago

The Clop extortion campaign on Oracle customers last week stemmed from months of intrusion activity tracking back to July 10.

By Lindsey O'Donnell-Welch

October 9, 2025 | 2 min read

Clop
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2025 Decipher
  • Articles
  • Video

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by