#deciphersec search results

"If anyone tells you that they’ve solved this, they’re lying." With AI and Security, 'Everyone is Still Learning' decipher.sc/2025/10/30/wit… #decipher #deciphersec


"We want to do the right thing but also want to make ourselves more efficient. We want to ensure our people are still innovating." With AI and Security, ‘Everyone is Still Learning’ decipher.sc/2025/10/30/wit… #decipher #deciphersec


Q&A: Sean Zadig of Yahoo on Employing AI in Security decipher.sc/2025/11/06/qa-… #decipher #deciphersec


“We are only now starting to see this type of activity, but expect it to increase in the future.” Google: Threat Actors Testing AI During Malware Execution decipher.sc/2025/11/05/goo… #decipher #deciphersec


It's All Just Electrons: The Enduring Legacy of Sneakers decipher.sc/2025/10/21/its… #decipher #deciphersec


Mac Malware Campaign Uses Fake GitHub Pages, LastPass Lure decipher.sc/2025/09/22/mac… #decipher #deciphersec


The flaw (CVE-2025-61882) is remotely exploitable without authentication. Oracle Patches E-Business Suite Zero-Day Amid Clop Extortion Attacks decipher.sc/2025/10/06/ora… #decipher #deciphersec


Two British Teens Charged Over Scattered Spider Hacks decipher.sc/2025/09/18/two… #decipher #deciphersec


"We believe that it is likely that Operation DreamJob was aimed at stealing proprietary information, and manufacturing know-how, regarding UAVs." @ESETresearch New Lazarus Group Campaign Targets EU Defense Companies decipher.sc/2025/10/23/new… #decipher #deciphersec


“Cisco assesses that this campaign is connected to the ArcaneDoor activity identified in early 2024." Cisco Warns of Attacks on Two ASA Flaws decipher.sc/2025/09/25/cis… #decipher #deciphersec


Google Chrome to Enable HTTPS Default Browsing  decipher.sc/2025/10/28/goo… #decipher #deciphersec


US Indicts LockerGoga, MegaCortex, Nefilim Ransomware Admin decipher.sc/2025/09/09/us-… #decipher #deciphersec


Why WarGames is Still Predicting the Future 40 Years Later decipher.sc/2025/10/17/why… #decipher #deciphersec


New research from @ESETresearch on a Lazarus Group campaign using the ScoringMathTea RAT and the familiar fake job lures. New Lazarus Group Campaign Targets EU Defense Companies decipher.sc/2025/10/23/new… #decipher #deciphersec


Senator Flags Microsoft’s Role in the Ascension Ransomware Hack decipher.sc/2025/09/10/sen… #decipher #deciphersec


Senator Flags Microsoft’s Role in the Ascension Ransomware Hack decipher.sc/2025/09/10/sen… #decipher #deciphersec


Default HTTPS browsing has been a long time in the making, with Google introducing alerts warning that HTTP websites are “Not Secure” in 2018 and then defaulting to HTTPS in 2021. Google Chrome to Enable HTTPS Default Browsing  decipher.sc/2025/10/28/goo… #decipher #deciphersec


Google Chrome to Enable HTTPS Default Browsing  decipher.sc/2025/10/28/goo… #decipher #deciphersec


Q&A: Sean Zadig of Yahoo on Employing AI in Security decipher.sc/2025/11/06/qa-… #decipher #deciphersec


Google: Threat Actors Testing AI During Malware Execution decipher.sc/2025/11/05/goo… #decipher #deciphersec


“We are only now starting to see this type of activity, but expect it to increase in the future.” Google: Threat Actors Testing AI During Malware Execution decipher.sc/2025/11/05/goo… #decipher #deciphersec


"We want to do the right thing but also want to make ourselves more efficient. We want to ensure our people are still innovating." With AI and Security, ‘Everyone is Still Learning’ decipher.sc/2025/10/30/wit… #decipher #deciphersec


For people of A Certain Age, the risk of shadow AI may bring back memories of the late 1900s and early 2000s when WiFi was a thing but not yet the thing. With AI and Security, ‘Everyone is Still Learning’ decipher.sc/2025/10/30/wit… #decipher #deciphersec


Researchers have developed a new version of a hardware-based attack that can compromise an Android phone through the browser using a technique that can flip bits in memory by causing small electrical charge leaks in a chip: decipher.sc/rowhammer-andr… #decipher #deciphersec

DecipherSec's tweet image. Researchers have developed a new version of a hardware-based attack that can compromise an Android phone through the browser using a technique that can flip bits in memory by causing small electrical charge leaks in a chip: decipher.sc/rowhammer-andr… #decipher #deciphersec

“We’re still building new technology on an old foundation that’s insecure...that’s why I feel my job still isn’t done” -- CA Veracode’s @weldpond warns senators of today’s security vulnerabililties vera.cd/2H03jkd #deciphersec

Veracode's tweet image. “We’re still building new technology on an old foundation that’s insecure...that’s why I feel my job still isn’t done” -- CA Veracode’s @weldpond warns senators of today’s security vulnerabililties vera.cd/2H03jkd #deciphersec

Criminals employ various tricks to make their phishing sites look legitimate, from using the same color palette & images to creating fake domains that look very similar to legitimate websites .duo.sc/2rnNi1H via @DecipherSec @FYRashid #deciphersec

pfpt_johnhaden's tweet image. Criminals employ various tricks to make their phishing sites look legitimate, from using the same color palette & images to creating fake domains that look very similar to legitimate websites .duo.sc/2rnNi1H via @DecipherSec @FYRashid #deciphersec

Criminals employ various tricks to make their phishing sites look legitimate, from using the same color palette & images to creating fake domains that look very similar to legitimate websites .duo.sc/2rnNi1H via @DecipherSec @FYRashid #deciphersec

_sabrinafaire's tweet image. Criminals employ various tricks to make their phishing sites look legitimate, from using the same color palette & images to creating fake domains that look very similar to legitimate websites .duo.sc/2rnNi1H via @DecipherSec @FYRashid #deciphersec

Criminals employ various tricks to make their phishing sites look legitimate, from using the same color palette & images to creating fake domains that look very similar to legitimate websites .duo.sc/2rnNi1H via @DecipherSec @FYRashid #deciphersec

sdemarzio75's tweet image. Criminals employ various tricks to make their phishing sites look legitimate, from using the same color palette & images to creating fake domains that look very similar to legitimate websites .duo.sc/2rnNi1H via @DecipherSec @FYRashid #deciphersec

New version of old Bandook #malware discovered in a wave of attacks against organizations in government, financial services, energy, and other industries in numerous countries. decipher.sc/new-signed-ver… #decipher #deciphersec @DecipherSec

incognito_app's tweet image. New version of old Bandook #malware discovered in a wave of attacks against organizations in government, financial services, energy, and other industries in numerous countries. decipher.sc/new-signed-ver… #decipher #deciphersec @DecipherSec


On the Large BGP Leak that hit European Mobile Carriers and rerouted data to China & Russia. We’ve seen this before says @Wired buff.ly/2Myg8dv buff.ly/2MBLqAc #decipher #deciphersec via @DrPippaM

lastelecos's tweet image. On the Large BGP Leak that hit European Mobile Carriers and rerouted data to China & Russia. We’ve seen this before says @Wired buff.ly/2Myg8dv buff.ly/2MBLqAc #decipher #deciphersec via @DrPippaM

Loading...

Something went wrong.


Something went wrong.


United States Trends