• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

All topics


Ransomware


11 Posts

More Cl0p Clues and Huge Apple Bug Bounty Changes

This week brings some new insights into the origins and length of the Cl0p extortion attacks tied to the Oracle E-Business Suite vulnerability, big surges in scanning for Cisco ASA, Palo Alto, and Fortinet devices, and a huge upgrade to Apple bug bounty payouts.

By Dennis Fisher

October 10, 2025 | 1 min read

Data breachPodcastRansomware

The Cl0p-Oracle Extortion Emails, Red Hat Breach, and Sad Government News

Dennis and Lindsey dissect a busy week in security news, starting with the Cl0p group’s extortion campaign against Oracle customers (3:24), then moving into the Crimson Collective’s claimed breach of some of Red Hat GitLab’s repos (12:41), and finally the consequences of the expiration of th CISA legislation and de-funding of the MS-ISAC (22:46). We also […]

By Dennis Fisher

October 3, 2025 | 1 min read

Data breachPodcastRansomware

Akira Ransomware Actors Target SonicWall SSLVPN

This aggressive approach aligns with Akira's historical tactics of exploiting VPN infrastructure as an initial access vector.

By Dennis Fisher

September 29, 2025 | 2 min read

Ransomware

Three Takeaways From the EU Airport Outages

The incident is a pointed example of how an intrusion at a key point in the software supply chain can have a wide range of downstream effects.

By Dennis Fisher

September 24, 2025 | 3 min read

MalwareRansomware

Two British Teens Charged Over Scattered Spider Hacks

Two British teenagers have been arrested by UK authorities for their alleged ties to the Scattered Spider cybercriminal collective. 

By Lindsey O'Donnell-Welch

September 19, 2025 | 3 min read

Data breachRansomware

NPM Package Compromises, Sen. Wyden’s Ransomware Letter, and Apple’s Memory Safety Advance

Dennis and Lindsey discuss the targeted compromises of NPM packages (1:00) and the pointed letter that Sen. Ron Wyden sent to the FTC chairman asking for Microsoft to be held liable for the Ascension ransomware attack last year (11:45) before finally touching on Apple’s new memory safety technology for new iPhones (20:43).

By Dennis Fisher

September 11, 2025 | 1 min read

MicrosoftRansomware
  • Page 1
  • Page 2
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2025 Decipher
  • Articles
  • Video

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by