• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • Apple
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Microsoft
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

All topics


Vulnerability


21 Posts

The Wild, Wild World of Exploits With Caitlin Condon

The process of developing and deploying exploits is a complex and controversial one and it’s often a black box to outside observers. To help shine a light on how this all works, Caitlin Condon of VulnCheck joins Dennis Fisher for a deep dive into the zero day exploit landscape, what goes into exploit development, and […]

By Dennis Fisher

March 10, 2026 | 1 min read

AIVideoVulnerability

Google: Commercial Surveillance Vendors Dominated Zero-Day Exploitation in 2025 

Out of 42 unique zero days tracked by Google in 2025, 18 were attributed to CSVs, while 15 were linked to state-sponsored espionage groups.

By Decipher

March 9, 2026 | 3 min read

GoogleVulnerability

Q&A: Tod Beardsley on How to Use CISA’s KEV Catalog

Without context, the KEV catalog is just a very large collection of data. Tod Beardsley is the former CISA KEV section chief, and he recently released a paper called KEVology that provides key context and evaluates the value of certain enrichment signals.

By Dennis Fisher

March 3, 2026 | 4 min read

CISAVulnerability

We Need to Talk About KEV With Tod Beardsley

Tod Beardsley, VP of security research at runZero and former KEV section chief at CISA, joins Dennis Fisher to talk about the evolution of the Known Exploited Vulnerabilities catalog, how much value defenders should place on a specific bug being in the KEV, and his new KEVology report that breaks down all of the data […]

By Dennis Fisher

March 2, 2026 | 1 min read

VideoVulnerability

Cisco, NSA Warn of Attacks Targeting Catalyst SD-WAN Zero Day

Cisco released software updates on Feb. 25 to fix the vulnerability, which affects both on-premises and cloud deployments of the Catalyst SD-WAN Controller. 

By Dennis Fisher

February 26, 2026 | 2 min read

CiscoVulnerability

China Targets Dell Flaw, New Ivanti Exploitation, and Cyber Shenanigans on The Pitt!

It’s a light news week, but we have some fun content for you! This week, we talk about our latest hacker movie episode–STAR WARS–which is up on the site and all of our feeds now (0:25), then we dig into a nasty hard-coded. credential bug in Dell RecoverPoint for Virtual Machines that Chinese threat actors are exploiting […]

By Dennis Fisher

February 20, 2026 | 1 min read

HackersPodcastVulnerability
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by