• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • Applw
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

All topics


Vulnerabilities


32 Posts

Lighthouse Phishing Kit Takedown, Zero Day Mysteries, and Measuring Cyber Attack Costs

This week was a bit of a throwback to olden times, with the disclosure by Amazon threat intelligence of  zero days in Cisco and Citrix products that were exploited by an unnamed APT, and Google using legal action to disrupt the Lighthouse phishing service operation. We dig into those two stories, plus we discuss the […]

By Dennis Fisher

November 14, 2025 | 1 min read

Podcast

APT Targets Cisco and Citrix Zero Days

The chain of discovery began with Amazon's security honeypot service, MadPot, which detected exploitation attempts for the Citrix Bleed Two vulnerability (CVE-2025-5777) before its public disclosure

By Dennis Fisher

November 12, 2025 | 2 min read

APTCisco

Microsoft Warns of Exploited Windows Kernel Zero-Day 

The important-severity flaw (CVE-2025-62215) has been exploited, said Microsoft.

By Lindsey O'Donnell-Welch

November 11, 2025 | 2 min read

MicrosoftPatch TuesdayWindows

Microsoft Fixes Actively Exploited Flaws in Patch Tuesday Release

Microsoft issued fixes for several actively exploited vulnerabilities in its latest patch Tuesday release.

By Lindsey O'Donnell-Welch

October 14, 2025 | 2 min read

Microsoft

Oracle Warns of E-Business Suite Bug 

A Saturday advisory from Oracle's CISO warned of a vulnerability impacting some deployments of E-Business Suite (CVE-2025-61884).

By Lindsey O'Donnell-Welch

October 12, 2025 | 2 min read

OracleVulnerability

More Cl0p Clues and Huge Apple Bug Bounty Changes

This week brings some new insights into the origins and length of the Cl0p extortion attacks tied to the Oracle E-Business Suite vulnerability, big surges in scanning for Cisco ASA, Palo Alto, and Fortinet devices, and a huge upgrade to Apple bug bounty payouts.

By Dennis Fisher

October 10, 2025 | 1 min read

Data breachPodcastRansomware
  • «
  • Page 1
  • Interim pages omitted …
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by