• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X
  • MongoDB

    Serious MongoDB Flaw CVE-2025-14847 Under Exploitation

    MongoDB disclosed the vulnerability (CVE-2025-14847) on Dec. 19 and a few days later, a public exploit for it appeared online.

    By Dennis Fisher

    December 29, 2025 | 1 min read

    Read more
  • Podcast

    Is Kevin McCallister the Greatest Hacker in Movie History?

    There may not be any computers in Home Alone, but few movie characters embody the old-school hacker ethos like Kevin McCallister does.

    By Dennis Fisher

    December 22, 2025 | 1 min read

    Read more
  • goanywhere flaw

    Threat Actors Target Unpatched Cisco AsyncOS Zero-Day

    Threat actors are exploiting an unpatched zero-day vulnerability in Cisco AsyncOS software.

    By Lindsey O’Donnell-Welch

    December 17, 2025 | 2 min read

    Read more
Go to previous slide
Go to slide 1
Go to slide 2
Go to slide 3
Go to next slide

Serious MongoDB Flaw CVE-2025-14847 Under Exploitation

December 29, 2025 | 1 min read


Is Kevin McCallister the Greatest Hacker in Movie History?

December 22, 2025 | 1 min read


Threat Actors Target Unpatched Cisco AsyncOS Zero-Day

December 17, 2025 | 2 min read


Go to slide 1
Go to slide 2
Go to slide 3

Playlist


Russian Targeting of Edge Devices. Cisco AsyncOS Zero Day, and React2Shell Won’t Go Away

December 19, 2025 | 1 min read

PodcastRussia

The Hacker Movie Canon: Die Hard

December 17, 2025 | 1 min read

HackersPodcastVideo

More React Bugs Reaction, the Challenge of Vulnerability Management, and CI Attacks

December 12, 2025 | 1 min read

From CIA Officer to a Career in Cybersecurity With Erin Whitmore

December 10, 2025 | 1 min read

CISOVideo

Topics


AI
General
Intrusions
Law Enforcement

The Latest

Is Kevin McCallister the Greatest Hacker in Movie History?

Dennis Fisher
December 22, 2025

There may not be any computers in Home Alone, but few movie characters embody the old-school hacker ethos like Kevin McCallister does.

Read More Is Kevin McCallister the Greatest Hacker in Movie History?

goanywhere flaw

Threat Actors Target Unpatched Cisco AsyncOS Zero-Day

Lindsey O'Donnell-Welch
December 17, 2025

Threat actors are exploiting an unpatched zero-day vulnerability in Cisco AsyncOS software.

Read More Threat Actors Target Unpatched Cisco AsyncOS Zero-Day

ai

Russian Hackers Target Misconfigured Edge Devices in ‘Concerning Evolution’ For Critical Infrastructure Attacks

Lindsey O'Donnell-Welch
December 16, 2025

Amazon researchers highlighted a “tactical pivot” by Russian GRU hackers who have been moving away from zero-day and N-day exploitation.

Read More Russian Hackers Target Misconfigured Edge Devices in ‘Concerning Evolution’ For Critical Infrastructure Attacks

The Enduring Hacker Legacy of Heat

Dennis Fisher
December 16, 2025

It was 30 years ago this week that Michael Mann’s masterpiece Heat hit theaters like a semi T-boning an armored car. In addition to being a masterful heist movie and insightful depiction of the toll that obsession can exact, Heat is also a criminally underrated hacker movie.

Read More The Enduring Hacker Legacy of Heat

Broad Exploit Activity Targets React2Shell Flaw

Dennis Fisher
December 8, 2025

The vulnerability was disclosed publicly on Dec. 3 and researchers and threat intelligence teams immediately began seeing opportunistic and targeted exploitation attempts.

Read More Broad Exploit Activity Targets React2Shell Flaw

Government, Private Sector Officials Mull Telecom Security Woes

Lindsey O'Donnell-Welch
December 4, 2025

A year after Salt Typhoon’s telecom hack, private and public sector officials discussed next steps.

Read More Government, Private Sector Officials Mull Telecom Security Woes

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
...
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by