• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • Apple
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Microsoft
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

All topics


Vulnerability


31 Posts

The Era of AI-Led Vulnerability Research With Tom Ptacek

Dennis sits down with Tom Ptacek of Fly.io, a veteran security researcher, founder, and observer of the vulnerability landscape, to talk about the recent wave of AI-assisted vulnerability discovery and exploit development, specifically from the use of frontier models such as Claude Mythos. Tom has strong opinions on what’s coming and how human researchers and […]

By Dennis Fisher

April 13, 2026 | 1 min read

AIPodcastVulnerability

Fix the Dang Software: Claude Mythos and Vulnerability Research

Claude Mythos Preview is making huge waves in the world of vulnerability discovery and exploit development. And it’s not even publicly available! We asked hacker and Luta Security CEO Katie Moussouris and AI and machine learning security pioneer Gary McGraw what AI-enabled bug hunting means for researchers, defenders, and enterprise security teams.

By Lindsey O'Donnell-Welch

April 10, 2026 | 1 min read

AIVideoVulnerability

Fortinet CVE-2026-35616 Actively Exploited

The company published an advisory on Saturday and urged all customers who are running affected versions of the software to install the hotfix as quickly as possible. The bug affects versions 7.4.5 and 7.4.6 of FortiClient EMS. 

By Dennis Fisher

April 6, 2026 | 1 min read

FortinetVulnerability

Command Injection Bug in OpenAI Codex Exposed GitHub OAuth Tokens

The bug is a command injection issue and lies in the way that Codex processed GitHub branch names during the execution of tasks.

By Dennis Fisher

March 30, 2026 | 3 min read

AIOpenAIVulnerability

The Wild, Wild World of Exploits With Caitlin Condon

The process of developing and deploying exploits is a complex and controversial one and it’s often a black box to outside observers. To help shine a light on how this all works, Caitlin Condon of VulnCheck joins Dennis Fisher for a deep dive into the zero day exploit landscape, what goes into exploit development, and […]

By Dennis Fisher

March 10, 2026 | 1 min read

AIVideoVulnerability

Google: Commercial Surveillance Vendors Dominated Zero-Day Exploitation in 2025 

Out of 42 unique zero days tracked by Google in 2025, 18 were attributed to CSVs, while 15 were linked to state-sponsored espionage groups.

By Decipher

March 9, 2026 | 3 min read

GoogleVulnerability
  • «
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Interim pages omitted …
  • Page 6
  • »

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by