Decipher Security Podcast
1) Fancy Tools From Fancy Bear, Another Proxy Network Takedown, and A Look Ahead
This week's news includes a reappearance by an old favorite, APT28, aka Fancy Bear, which is back with some nasty new implants and tools it is deploying against targets in Ukraine (2:10), and we also ...Show More
2) The Wild, Wild World of Exploits With Caitlin Condon
The process of developing and deploying exploits is a complex and controversial one and it's often a black box to outside observers. To help shine a light on how this all works, Caitlin Condon of Vuln...Show More
3) The Zero Day Landscape, Tycoon 2FA Disruption, and KEVology
Every day is zero day, and this week we talked about the new Google Threat Intelligence Group report on the zero day exploit landscape in 2025 (2:22) and who's exploiting what, then we discuss Microso...Show More
4) We Need to Talk About KEV With Tod Beardsley
Tod Beardsley, VP of security research at runZero and former KEV section chief at CISA, joins Dennis Fisher to talk about the evolution of the Known Exploited Vulnerabilities catalog, how much value d...Show More
5) Cisco SD-WAN Zero Day, Google Disrupts Chinese Campaign, and More Cyber on The Pitt
This week Lindsey rejoins Dennis to talk about the attacks targeting a zero day in Cisco's Catalyst SD-WAN Controller (2:17), Google's disruption of a China-linked cyber espionage campaign targeting t...Show More
6) China Targets Dell Flaw, New Ivanti Exploitation, and Cyber Shenanigans on The Pitt!
It's a light news week, but we have some fun content for you! This week, we talk about our latest hacker movie episode--STAR WARS--which is up on the site and all of our feeds now (0:25), then we...Show More
7) The Hacker Movie Canon: Star Wars
STAR WARS isn't just one of the more successful and iconic movies of all time and the basis for a worldwide sci-fi empire, it's also a true hacker story. Wade Baker and Rich Mogull, two Star...Show More
8) Six Zero Days From Microsoft, One From Apple, and a CSI: Cyber Throwback
This week was a cornucopia of zero days. We talk about the six (!) actively exploited vulnerabilities that Microsoft patched this week in its February update (2:46), then we discuss the one that Apple...Show More
9) How to Stay Ahead of Attackers With watchTowr's Ryan Dewhurst
Attackers are moving faster and faster every day, and the challenge of keeping pace is a daunting one. But it's not impossible. watchTowr's Ryan Dewhurst joins Dennis Fisher to talk about how the "mag...Show More
10) Dumping Edge Security Devices, the SystemBC Botnet, and the Joy of Joybubbles
This week we talk about the new CISA Binding Operational Directive that sets a deadline for removing end of support edge security devices from federal government networks (1:15), then we discuss the n...Show More