• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • Apple
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

All topics


Malware


10 Posts

How to Stay Ahead of Attackers With watchTowr’s Ryan Dewhurst

Attackers are moving faster and faster every day, and the challenge of keeping pace is a daunting one. But it’s not impossible. watchTowr’s Ryan Dewhurst joins Dennis Fisher to talk about how the “magic” of computers first captured his imagination when he was young, how defenders can learn from attackers’ tactics and adapt, and how […]

By Dennis Fisher

February 9, 2026 | 1 min read

AIMalwareVideo

Google Disrupts IPIDEA Residential Proxy Network

Google researchers observed more than 550 individual threat groups using IPIDEA exit nodes during a one-week period earlier this month. 

By Dennis Fisher

January 29, 2026 | 3 min read

GoogleMalware

Microsoft Disrupts RedVDS Cybercrime Platform

The takedown marks a significant blow to the cybercrime-as-a-service ecosystem, which fuels large-scale, automated fraud.

By Dennis Fisher

January 14, 2026 | 3 min read

AIMalwareMicrosoft

New MuddyWater Campaign Hits Israeli Targets

The victims in Israel span multiple industries, including technology, engineering, manufacturing, local government, and education.

By Dennis Fisher

December 1, 2025 | 2 min read

IranIsraelMalware

New Shai Hulud NPM Worm Emerges

Researchers from Wiz are currently tracking more than 25,000 affected repositories across approximately 350 unique users.

By Dennis Fisher

November 24, 2025 | 2 min read

Malwarenpm

Data Connects Scanning Surges for Cisco, Fortinet, PAN Devices

Researchers say that all three campaigns are being driven at least in part by one threat actor. 

By Dennis Fisher

October 8, 2025 | 2 min read

Malware
  • Page 1
  • Page 2
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by