Decipher Security Podcast
4.4(9)

Decipher Security Podcast

by Decipher

351 episodesLatest todayEN

Every week, Dennis Fisher and Lindsey O'Donnell-Welch, the editors of Decipher, bring you exclusive, in-depth conversations with security researchers, CISOs, founders, and security experts to hellp you understand the threat landscape and better protect your organizations.

Hosts

  • Dennis Fisher
  • Lindsey O’Donnell-Welch

Decipher

Recent reviews on Apple Podcasts (1)
  • Like it but HORRIBLE audio issues

    Particularly in ep12 there are multiple examples where there are people talking over one another and then periods of silence. There’s some very annoying background noise like someone has a TV or Radio on while recording. Dudes. Clean it up... 🙃

    taroliw ·

View all reviews on Apple Podcasts

Episodes (351)

  1. AI Has a Security Measurement Problem | Gary McGraw

    May 13, 202638m

    Few people (if any) have spent more time thinking about and working on the hard problems in security and software than Gary McGraw, and he also happens to have a PhD in cognitive science and computer science and has been

  2. Inside the $285M Drift Protocol Heist | Ari Redbord

    May 11, 202634m

    Ari Redbord, Global Head of Policy at TRM Labs, talks about the insane background behind the $285 million Drift Protocol crypto heist, how law enforcement agencies are investigating ransomware-linked cryptocurrency walle

  3. The Canvas Attack, Ivanti and Palo Alto Exploits, and Dirty Frag

    May 8, 202641m

    If we needed any more evidence that the internet was a mistake, this week provided it. We kick things off with a discussion of the Canvas breach that has affected thousands of schools worldwide, then we dig into the disc

  4. Fighting Cybercrime With Global Intelligence | Will Dixon

    May 6, 202644m

    Will Dixon has seen the evolution of cybercrime as both a GCHQ intelligence officer and a private sector executive and analyst, and has seen the way these groups operate up close. He joins Dennis to talk about the ongoin

  5. The fast16 Mystery, Stuxnet, and the History of Cyber Espionage | Juan Andres Guerrero-Saade

    May 4, 20261h 8m

    JAGS joins Dennis Fisher to unpack the complex history of fast16, a highly targeted cyber espionage platform that goes back as far as 2005, many years before Stuxnet, and was deployed against targets in Iran. JAGS has be

  6. cPanel Exploits, Copy Fail, and the History of Branded Bugs

    May 1, 202642m

    The security news was out of hand this week, so we had to pick our spots. We start with the nasty cPanel/WHM vulnerability that affects tens of millions of domains in shared hosting environments, then we discuss the C op

  7. Defeating Online Scams and Disrupting the Cybercrime Chain | Ariana Mirian

    Apr 28, 202650m

    Ariana Mirian, cofounder of startup Beesafe, joins Dennis to talk about the mechanics of online romance and finance scams, how the scammers draw in victims over weeks or months, and why user awareness isn't the complete

  8. The Vercel Intrusion and What is Happening at CISA

    Apr 24, 202639m

    This week we dig deep into the Vercel intrusion that emerged last weekend, how it happened, what the response was, and what the downstream effects may be for defenders. Then we talk about CISA's bizarre delayed response

  9. Claude Mythos, Automated Bug Hunting, and AI Eating Everything

    Apr 17, 202632m

    It's been A WEEK. Security news never sleeps, and neither does AI, so Dennis and Lindsey dive into all of the storylines coming from the Claude Mythos and Project Glasswing announcements, how organizations will deal with

  10. The Era of AI-Led Vulnerability Research With Tom Ptacek

    Apr 13, 202655m

    Dennis sits down with Tom Ptacek of Fly.io, a veteran security researcher, founder, and observer of the vulnerability landscape, to talk about the recent wave of AI-assisted vulnerability discovery and exploit developmen

  11. Mapping the Cybercrime Ecosystem With Andrew Northern of Censys

    Apr 7, 202633m

    The internet is dark and full of terrors, but thanks to folks such as Andrew Northern, a principal security researcher at internet-mapping pioneer Censys, it doesn't have to be, Andrew joins Dennis to talk about the cybe

  12. The Rapid Rise of AI Exploit Development and More Axios Compromise Effects

    Apr 3, 202651m

    It's been quite a week in security news, and Dennis and Lindsey dig into the continued effects of the axios supply chain attack, the incredibly fast adoption of AI tools for vulnerability research and what that means for

  13. Axios NPM Supply Chain Attack

    Mar 31, 202625m

    Dennis and Lindsey dig into what we know do far about the supply chain attack on the axios NPM package, including how the attacker gained access to the maintainer's account, the window of exposure for the malicious packa

  14. RSA Recap: Dancing Robots, AI Everywhere, and the Future of Security

    Mar 27, 202651m

    Fresh off the plane from RSA, Dennis fills Lindsey in on everything she missed (and didn't miss) at this year's conference (0:23), from the insanity of the expo floor (4:06) to the appearance of a line of synchronized ro

  15. RSA 2026 Preview

    Mar 20, 202643m

    With the RSA Conference on the horizon, Dennis and Lindsey are here with a preview of the conference's more interesting sessions and keynotes, a discussion of the recent and ancient history of the conference, and a quick

  16. Mark Watney Is a Space Hacker in The Martian

    Mar 18, 202652m

    Sure, space pirate is a cool title, but what about space hacker? Way cooler! With the imminent release of Project Hail Mary, Wendy Nather joins Dennis Fisher to dig into the nutrient-rich narrative soil that produced a m

  17. Fancy Tools From Fancy Bear, Another Proxy Network Takedown, and A Look Ahead

    Mar 13, 202615m

    This week's news includes a reappearance by an old favorite, APT28, aka Fancy Bear, which is back with some nasty new implants and tools it is deploying against targets in Ukraine (2:10), and we also have another law enf

  18. The Wild, Wild World of Exploits With Caitlin Condon

    Mar 10, 202646m

    The process of developing and deploying exploits is a complex and controversial one and it's often a black box to outside observers. To help shine a light on how this all works, Caitlin Condon of VulnCheck joins Dennis F

  19. The Zero Day Landscape, Tycoon 2FA Disruption, and KEVology

    Mar 6, 202619m

    Every day is zero day, and this week we talked about the new Google Threat Intelligence Group report on the zero day exploit landscape in 2025 (2:22) and who's exploiting what, then we discuss Microsoft's disruption of t

  20. We Need to Talk About KEV With Tod Beardsley

    Mar 2, 202647m

    Tod Beardsley, VP of security research at runZero and former KEV section chief at CISA, joins Dennis Fisher to talk about the evolution of the Known Exploited Vulnerabilities catalog, how much value defenders should plac

  21. Cisco SD-WAN Zero Day, Google Disrupts Chinese Campaign, and More Cyber on The Pitt

    Feb 27, 202631m

    This week Lindsey rejoins Dennis to talk about the attacks targeting a zero day in Cisco's Catalyst SD-WAN Controller (2:17), Google's disruption of a China-linked cyber espionage campaign targeting telecom infrastructur

  22. China Targets Dell Flaw, New Ivanti Exploitation, and Cyber Shenanigans on The Pitt!

    Feb 20, 202618m

    It's a light news week, but we have some fun content for you! This week, we talk about our latest hacker movie episode-- STAR WARS --which is up on the site and all of our feeds now (0:25), then we dig into a nasty hard-

  23. The Hacker Movie Canon: Star Wars

    Feb 18, 20261h 4m

    STAR WARS isn't just one of the more successful and iconic movies of all time and the basis for a worldwide sci-fi empire, it's also a true hacker story. Wade Baker and Rich Mogull, two Star Wars scholars, join Dennis Fi

  24. Six Zero Days From Microsoft, One From Apple, and a CSI: Cyber Throwback

    Feb 13, 202617m

    This week was a cornucopia of zero days. We talk about the six (!) actively exploited vulnerabilities that Microsoft patched this week in its February update (2:46), then we discuss the one that Apple fixed in iOS 26.3 ,

  25. How to Stay Ahead of Attackers With watchTowr's Ryan Dewhurst

    Feb 9, 202649m

    Attackers are moving faster and faster every day, and the challenge of keeping pace is a daunting one. But it's not impossible. watchTowr's Ryan Dewhurst joins Dennis Fisher to talk about how the "magic" of computers fir