• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • Applw
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

All topics


Vulnerabilities


32 Posts

Chinese Actors Exploited Dell RecoverPoint for VMs Flaw Since 2024

The hardcoded credential vulnerability (CVE-2026-22769) exists in Dell RecoverPoint for Virtual Machines and has been exploited since mid-2024.

By Decipher

February 18, 2026 | 2 min read

DellExploitationZero Day

Six Zero Days From Microsoft, One From Apple, and a CSI: Cyber Throwback

This week was a cornucopia of zero days. We talk about the six (!) actively exploited vulnerabilities that Microsoft patched this week in its February update (2:46), then we discuss the one that Apple fixed in iOS 26.3, a vulnerability that has been used in what the company calls an “extremely sophisticated attack” against a few individuals (7:24). […]

By Dennis Fisher

February 13, 2026 | 1 min read

AppleMicrosoftPodcastVulnerability

Apple Patches iOS Zero Day CVE-2026-20700

That vulnerability also was patched in macOS, but the active exploitation that Apple disclosed was against iOS only.

By Dennis Fisher

February 12, 2026 | 1 min read

AppleVulnerability

Microsoft Fixes Six Exploited Bugs in February Patch Tuesday Updates

The exploited vulnerabilities in question exist across various products, from Microsoft Word to Windows Shell.

By Decipher

February 11, 2026 | 3 min read

MicrosoftPatch Tuesday

US Gov Directive Cracks Down on Unsupported Edge Devices 

CISA said potential exploitation of flaws in unsupported edge devices creates "a significant threat to federal property."

By Decipher

February 5, 2026 | 2 min read

CISAEdge Devices

Fortinet and WinRAR Exploitation, Google’s IPIDEA Disruption, and Our Favorite Cybersecurity Creators

It was a busy week in the cybers! Today we start with the targeted exploitation of another Fortinet vulnerability (CVE-2026-24858) that enables simple authentication bypass (1:15), then we discuss Google’s disruption of a large residential proxy network called IPIDEA that has been abused by hundreds of threat actors (5:40), then we talk about the continued attacks on an older WinRAR […]

By Dennis Fisher

January 30, 2026 | 1 min read

GooglePodcastVulnerability
  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 6
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by