Decipher's Avatar

Decipher

@deciphersec.bsky.social

Security without fear since 2018. https://decipher.sc https://www.youtube.com/@DecipherSec https://www.buzzsprout.com/228511/supporters/new

100 Followers  |  195 Following  |  114 Posts  |  Joined: 18.07.2025  |  1.7665

Latest posts by deciphersec.bsky.social on Bluesky

Sometimes I post paywalled Post articles. Usually I post marketing ones, free with account creation unless you have one. Sometimes I post free archive versions, which you also can figure out how to find without me.
This week is not the time to shout at me for posting a version that pays reporters.

03.02.2026 19:48 β€” πŸ‘ 18    πŸ” 3    πŸ’¬ 3    πŸ“Œ 0
Preview
The Noise in the Silence: Unmasking CISA's Hidden KEV Ransomware Updates In 2025, 59 KEV entries silently flipped to β€œknown ransomware use.” GreyNoise uncovers the hidden flips, why they matter, and a new feed to track them.

Some very interesting data analysis from our friends at @greynoise.io on the silent changes CISA makes to the KEV catalog regarding exploitation by ransomware gangs.
www.greynoise.io/blog/unmaski...

03.02.2026 16:29 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

With perfect pitch, Joe Engressia Jr, aka #Joybubbles, discovered that he could whistle specific tones into a phone handset and bend the analog network to his will

(If you’re noticing a similarity between Engressia and the character Whistler in Sneakers, that’s not a coincidence)

03.02.2026 00:10 β€” πŸ‘ 15    πŸ” 8    πŸ’¬ 1    πŸ“Œ 0
Preview
Phreaks and Geeks: Joybubbles and the Pre-History of Hacking - Decipher The proto hacker whose innate ability, curiosity, and absolute joy in the act of discovery is conveyed so artfully in the new documentary Joybubbles.

We don't write about movies often but when we do, we write about hacker movies, like JOYBUBBLES from @charmingstranger.com at @sundance.org

decipher.sc/2026/02/02/p...

02.02.2026 20:20 β€” πŸ‘ 10    πŸ” 4    πŸ’¬ 0    πŸ“Œ 1
Preview
Google Mandiant: ShinyHunters Attacks Target SaaS Platforms Via SSO, MFA Abuse - Decipher The series of incidents detailed by Mandiant researchers started in early to mid-January, and included a previously disclosed campaign involving Okta customers.

Google Mandiant researchers said the campaign has successfully used voice phishing and credential harvesting sites to pilfer both single sign-on (SSO) credentials and multi-factor authentication (MFA) codes.

decipher.sc/2026/02/02/g...

02.02.2026 19:10 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Ivanti Discloses Exploited Critical EPMM Flaws - Decipher The vulnerabilities (CVE-2026-1281 and CVE-2026-1340) could lead to unauthenticated remote code execution if successfully exploited.

It's not Friday without an actively exploited bug!

decipher.sc/2026/01/30/i...

30.01.2026 19:05 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Fortinet and WinRAR Exploitation, Google's IPIDEA Disruption, and Our Favorite Cybersecurity Creators

🚨 New @deciphersec.bsky.social podcast is up!

πŸͺ² New Fortinet SSO auth bypass exploitation
πŸͺ² Attacks on old WinRAR flaw
πŸ–₯️ Google disrupts IPIDEA proxy network

πŸ“Ή And shoutouts to some fave creators: @ryanaraine.bsky.social @johnhammond.bsky.social @mattjay.com

open.spotify.com/episode/5k9x...

30.01.2026 15:52 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 0    πŸ“Œ 1
Preview
Google Disrupts IPIDEA Residential Proxy Network - Decipher Google researchers observed more than 550 individual threat groups using IPIDEA exit nodes during a one-week period earlier this month.

decipher.sc/2026/01/29/g...

29.01.2026 16:08 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Message from "Signal Support"

Dear User, this is Signal Security
Support ChatBot.

Our system has detected a recent login attempt to your account from an unrecognized device or location. As a security measure, we have blocked this attempt and sent a verification code via
SMS to your registered phone number.

If this was NOT you: To secure your account and block this unauthorized access, please reply to this message with the verification code
you just received.

If this WAS you:
You can safely ignore this message. The login attempt will be automatically approved shortly. 

Thank you for helping us keep your
account secure.

Message from "Signal Support" Dear User, this is Signal Security Support ChatBot. Our system has detected a recent login attempt to your account from an unrecognized device or location. As a security measure, we have blocked this attempt and sent a verification code via SMS to your registered phone number. If this was NOT you: To secure your account and block this unauthorized access, please reply to this message with the verification code you just received. If this WAS you: You can safely ignore this message. The login attempt will be automatically approved shortly. Thank you for helping us keep your account secure.

Signal will never message you like this.

If you get a message like this, SOMEONE IS TRYING TO HACK YOUR SIGNAL.

DO NOT GIVE THEM THAT CODE.

26.01.2026 02:16 β€” πŸ‘ 1996    πŸ” 1307    πŸ’¬ 16    πŸ“Œ 12
Preview
Fortinet Warns of Critical Flaw After FortiCloud SSO Exploitation - Decipher Fortinet is rolling out updates for CVE-2026-24858, with fixes for some versions available as of Tuesday, and others in releases that are upcoming at an unspecified date.

More Fortinet targeting.
decipher.sc/2026/01/28/f...

28.01.2026 20:27 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Cybercrime and APT Groups Exploiting WinRAR Bug - Decipher Exploitation of CVE-2025-8088 in the wild began before disclosure, with attacks confirmed as early as July 18, 2025.

decipher.sc/2026/01/27/c...

27.01.2026 17:06 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Microsoft Releases Emergency Patch for CVE-2026-21509 - Decipher The vulnerability (CVE-2026-21509) requires user interaction for an attack to succeed, with the most likely vector being an attacker sending a malicious Office file to a victim, who then opens it.

decipher.sc/2026/01/26/m...

27.01.2026 14:43 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 1
Security Update Guide - Microsoft Security Response Center

Wow - Office security feature bypass patched OOB after active exploitation detected. Path now - CVE-2026-21509. At least the Preview Pane isn't an attack vector. msrc.microsoft.com/update-guide...

26.01.2026 17:40 β€” πŸ‘ 8    πŸ” 6    πŸ’¬ 0    πŸ“Œ 1
Preview
Fortinet FortiGate Devices Targeted in New Campaign - Decipher This activity shares some similarities with a campaign that researchers at Arctic Wolf identified in December. That campaign started soon after Fortinet disclosed two authentication bypass flaws (CVE-...

UPDATE: Fortinet has published some info on these attacks and the new path they're using.

decipher.sc/2026/01/22/f...

22.01.2026 21:12 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Cisco Fixes Unified Communications RCE Flaw Under AttackΒ  - Decipher Threat actors are attempting to exploit the Cisco remote code execution flaw (CVE-2026-20045) in the wild, according to a new security advisory.

The remote code execution flaw (CVE-2026-20045) exists in Cisco’s lineup of products for voice, video, and mobility services for endpoints and applications.

decipher.sc/2026/01/22/c...

22.01.2026 16:51 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Fortinet FortiGate Devices Targeted in New Campaign - Decipher This activity shares some similarities with a campaign that researchers at Arctic Wolf identified in December. That campaign started soon after Fortinet disclosed two authentication bypass flaws (CVE-...

decipher.sc/2026/01/22/f...

22.01.2026 15:35 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
High-Risk Authentication Bypass Flaw Found in Telnetd - Decipher The flaw is in the way that the telnetd server handles some specific user-supplied data. An attacker who exploits this vulnerability would be able to bypass the authentication path and gain root privi...

decipher.sc/2026/01/21/h...

21.01.2026 20:30 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 1
oss-security - GNU InetUtils Security Advisory: remote authentication by-pass in telnetd

This is how you start a security advisory: "If you are tired of modern age vulnerabilities, and remember the good
old times on bugtraq, I hope you will appreciate this one."

www.openwall.com/lists/oss-se...

21.01.2026 15:21 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
UK Warns of DoS Attacks by Russian Hacktivist Group NoName057(16)Β  - Decipher The network was linked to various attacks in 2023 and 2024, including ones against Swedish authorities and bank websites, and a wave of 14 different attacks on more than 250 German companies.

decipher.sc/2026/01/20/u...

20.01.2026 15:37 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
The RedVDS Takedown, Yet Another Chinese APT Emerges, and the StackWarp AMD Bug This week, we talk about how Microsoft disrupted a long-running, large-scale cybercrime-as-a-service platform called RedVDS that has been active since 2019 and was used in high-volume phishing and BEC...

🚨 This week's podcast is up now! In this episode we break down:

βœ… The RedVDS cybercrime platform takedown by
@security.microsoft.com
βœ… New @talosintelligence.com research on UAT-8837 Chinese APT activity
βœ… The very cool StackWarp bug by @rayiizzz.bsky.social and team

decipher.sc/podcasts/the...

16.01.2026 18:24 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
UAT-8837 targets critical infrastructure sectors in North America Cisco Talos is closely tracking UAT-8837, a threat actor we assess with medium confidence is a China-nexus advanced persistent threat (APT) actor.

A Chinese APT group has focused last year on compromising critical infrastructure across North America.

Cisco has linked multiple intrusions to a group it tracks as UAT-8837.

blog.talosintelligence.com/uat-8837/

15.01.2026 14:06 β€” πŸ‘ 5    πŸ” 4    πŸ’¬ 2    πŸ“Œ 0
Preview
Microsoft Disrupts RedVDS Cybercrime Platform - Decipher The takedown marks a significant blow to the cybercrime-as-a-service ecosystem, which fuels large-scale, automated fraud.

β€œMicrosoft tracks the threat actor who develops and operates RedVDS as Storm-2470. We have observed multiple cybercriminal actors, including Storm-0259, Storm-2227, Storm-1575, Storm-1747."
decipher.sc/2026/01/14/m...

14.01.2026 17:50 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
β€˜We Fail a Lot’: How Two Security Pioneers Keep Innovating - Decipher From their roles as the driving forces behind pioneering web appsec firm WhiteHat Security to building out enterprise security programs to breaking large portions of the web, Jeremiah Grossman and Rob...

decipher.sc/2026/01/13/w...

13.01.2026 18:09 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
The Future of Vulnerability Management With Jeremiah Grossman and Robert "RSnake" Hansen
YouTube video by Decipher The Future of Vulnerability Management With Jeremiah Grossman and Robert "RSnake" Hansen

Our latest podcast is out and it's a very fun and insightful conversation with Jeremiah Grossman and Robert Hansen on vulnerability management, building a new platform from scratch at Root Evidence, and very fast cars 🏎️

youtu.be/5eSgyYSEP0s?...

13.01.2026 15:05 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 1
Post image

Coming up tomorrow on the podcast: Jeremiah Grossman
and Robert Hansen join @dennisf.bsky.social to talk about Jeremiah's car collection. Oh, and some vulnerability management stuff they're building at Root Evidence. Subscribe here: www.youtube.com/@DecipherSec

12.01.2026 16:43 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Whoa this looks rad. Might be good for one of our hacker movie podcasts!

09.01.2026 20:14 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
A New Chinese APT Debuts and React2Shell Attacks Spike Security Without Fear

First podcast of 2026 is up! πŸŽ™οΈ

βœ… New Chinese APT UAT-7290 gets busy
βœ… Attacks against CVE-2025-55182 React2Shell πŸ“ˆ
βœ… News about upcoming podcast guests (spoiler alert!)

decipher.sc/podcasts/a-n...

09.01.2026 15:42 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 1
Preview
A New Chinese APT Takes the Stage - Decipher Active since at least 2022, UAT-7290 demonstrates a significant capacity for conducting deep-seated espionage while simultaneously functioning as an initial access group.

decipher.sc/2026/01/08/a...

08.01.2026 16:22 β€” πŸ‘ 1    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
React2Shell Attacks Continue to Build - Decipher After a peak of more than 430,000 attack sessions in late December, daily volumes targeting React2Shell have stabilized in the 300,000 to 400,000 range.

Research from @greynoise.io shows a sustained attack volume in the 300k-400k per day range against CVE-2025-55182 React2Shell bug.
decipher.sc/2026/01/07/r...

08.01.2026 15:12 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Listen to our buddies. (They actually are our buddies, which is cool, right??)

06.01.2026 18:31 β€” πŸ‘ 1    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

@deciphersec is following 19 prominent accounts