• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • Apple
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Microsoft
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

All topics


Video


32 Posts

The Wild, Wild World of Exploits With Caitlin Condon

The process of developing and deploying exploits is a complex and controversial one and it’s often a black box to outside observers. To help shine a light on how this all works, Caitlin Condon of VulnCheck joins Dennis Fisher for a deep dive into the zero day exploit landscape, what goes into exploit development, and […]

By Dennis Fisher

March 10, 2026 | 1 min read

AIVideoVulnerability

Mister Decipher’s Neighborhood

It's a beautiful day in the neighborhood for hacking! Come along on a magical adventure as Mr. Decipher teaches you about the dangers of brute-force attacks!

By Dennis Fisher

March 9, 2026 | 1 min read

AIVideo

We Need to Talk About KEV With Tod Beardsley

Tod Beardsley, VP of security research at runZero and former KEV section chief at CISA, joins Dennis Fisher to talk about the evolution of the Known Exploited Vulnerabilities catalog, how much value defenders should place on a specific bug being in the KEV, and his new KEVology report that breaks down all of the data […]

By Dennis Fisher

March 2, 2026 | 1 min read

VideoVulnerability

Deciphering Star Wars

STAR WARS isn’t just one of the ore successful and iconic movies of all time and the basis for a worldwide sci-fi empire, it’s also a true hacker story. Wade Baker and Rich Mogull, two Star Wars scholars, join Dennis Fisher to break down the Empire’s pathetic perimeter defenses, R2D2’s arc as a wily hacker, […]

By Dennis Fisher

February 18, 2026 | 1 min read

PodcastVideo

How to Stay Ahead of Attackers With watchTowr’s Ryan Dewhurst

Attackers are moving faster and faster every day, and the challenge of keeping pace is a daunting one. But it’s not impossible. watchTowr’s Ryan Dewhurst joins Dennis Fisher to talk about how the “magic” of computers first captured his imagination when he was young, how defenders can learn from attackers’ tactics and adapt, and how […]

By Dennis Fisher

February 9, 2026 | 1 min read

AIMalwareVideo

The Future of Vulnerability Management With Jeremiah Grossman and Robert “RSnake” Hansen

Jeremiah Grossman and Robert Hansen, two of the more influential and accomplished leaders and entrepreneurs in the cybersecurity community, have seen and done it all in their careers. From their roles as the driving forces behind pioneering web appsec firm WhiteHat Security to building out enterprise security programs to breaking large portions of the web […]

By Dennis Fisher

January 13, 2026 | 1 min read

VideoVulnerability
  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 6
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by