Decipher Security Podcast
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
Episodes
7 episodes
China Targets Dell Flaw, New Ivanti Exploitation, and Cyber Shenanigans on The Pitt!
It's a light news week, but we have some fun content for you! This week, we talk about our latest hacker movie episode--STAR WARS--which is up on the site and all of our feeds now (...
•
18:58
The Hacker Movie Canon: Star Wars
STAR WARS isn't just one of the more successful and iconic movies of all time and the basis for a worldwide sci-fi empire, it's also a true hacker story. Wade Baker and Rich Mogull, two Star Wars scholars, join Dennis Fisher to break down the E...
•
1:04:56
Six Zero Days From Microsoft, One From Apple, and a CSI: Cyber Throwback
This week was a cornucopia of zero days. We talk about the six (!) actively exploited vulnerabilities that Microsoft patched this wee...
•
17:59
How to Stay Ahead of Attackers With watchTowr's Ryan Dewhurst
Attackers are moving faster and faster every day, and the challenge of keeping pace is a daunting one. But it's not impossible. watchTowr's Ryan Dewhurst joins Dennis Fisher to talk about how the "magic" of computers first captured his imaginat...
•
49:38
Dumping Edge Security Devices, the SystemBC Botnet, and the Joy of Joybubbles
This week we talk about the new CISA Binding Operational Directive that sets a deadline for removing end of support edge security devices fro...
•
16:56
Fortinet and WinRAR Exploitation, Google's IPIDEA Disruption, and Our Favorite Cybersecurity Creators
It was a busy week in the cybers! Today we start with the targeted exploitation of another Fortinet vulnerability (CVE-2026-24858) t...
•
20:55
The RedVDS Takedown, Yet Another Chinese APT Emerges, and the StackWarp AMD Bug
This week, we talk about how Microsoft disrupted a long-running, large-scale cybercrime-as-a-service platform called RedVDS that has been active since 2019 and was used in high-volume phishing and BEC scams (1:00), then we discuss the research ...
•
16:40