• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

All topics


Podcast


19 Posts

The Enduring Hacker Legacy of Heat

It was 30 years ago this week that Michael Mann's masterpiece Heat hit theaters like a semi T-boning an armored car. In addition to being a masterful heist movie and insightful depiction of the toll that obsession can exact, Heat is also a criminally underrated hacker movie.

By Dennis Fisher

December 16, 2025 | 1 min read

HackersVideo

React2Shell, Typhoon Attacks, and Why Our Infrastructure is So Vulnerable

Dennis and Lindsey react (!) to the React2Shell vulnerability disclosure and the quick exploitation of it by Chinese threat actors, then discuss the continues intrusions into critical infrastructure by the Salt Typhoon actors and this week’s congressional hearing on telecom network security. Finally, we talk about some upcoming hacker movie episodes, including Die Hard and maybe Home Alone!

By Dennis Fisher

December 5, 2025 | 1 min read

Podcast

DoJ Sanctions, the SEC Abandons the SolarWinds Action, and the FCC Reverses Course on Telecom Security

It’s an acronym-filled, government-only bonanza this week! We discuss the DoJ sanctioning Russian bulletproof hosting provider Media Land (0:53), the SEC dropping its enforcement action against SolarWinds and its CISO (13:25), and the FCC reversing course on a longstanding security rule for telecom providers (26:00).

By Dennis Fisher

November 21, 2025 | 1 min read

Podcast

Lighthouse Phishing Kit Takedown, Zero Day Mysteries, and Measuring Cyber Attack Costs

This week was a bit of a throwback to olden times, with the disclosure by Amazon threat intelligence of  zero days in Cisco and Citrix products that were exploited by an unnamed APT, and Google using legal action to disrupt the Lighthouse phishing service operation. We dig into those two stories, plus we discuss the […]

By Dennis Fisher

November 14, 2025 | 1 min read

Podcast

Q&A: Sean Zadig of Yahoo on Employing AI in Security

There are plenty of challenges and pitfalls for security teams looking to deploy AI tools and Zadig said Yahoo is taking a measured, careful approach. This is a condensed and edited portion of our discussion.

By Dennis Fisher

November 6, 2025 | 4 min read

Shadow AI Is Eating the World, the Return of Hacking Team, and the Commercial Spyware Landscape

We don’t do holiday themed episodes in this house, so no tricks, but we have some treats for you. First we discuss the problem of shadow AI (1:00) and how it seems like we’re just repeating the mistakes of previous tech waves in ignoring security until it’s too late. Then we dig into a new […]

By Dennis Fisher

October 30, 2025 | 1 min read

AIPodcast
  • «
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by