Decipher Security Podcast

Decipher

The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.

  • 55 minutes 57 seconds
    The Era of AI-Led Vulnerability Research With Tom Ptacek

    Dennis sits down with Tom Ptacek of Fly.io, a veteran security researcher, founder, and observer of the vulnerability landscape, to talk about the recent wave of AI-assisted vulnerability discovery and exploit development, specifically from the use of frontier models such as Claude Mythos. Tom has strong opinions on what's coming and how human researchers and defenders need to respond.


    Tom's post: https://sockpuppet.org/blog/2026/03/30/vulnerability-research-is-cooked/

    13 April 2026, 1:54 pm
  • 33 minutes 47 seconds
    Mapping the Cybercrime Ecosystem With Andrew Northern of Censys

    The internet is dark and full of terrors, but thanks to folks such as Andrew Northern, a principal security researcher at internet-mapping pioneer Censys, it doesn't have to be, Andrew joins Dennis to talk about the cybercrime ecosystem, getting his start in security on a tiny team with huge responsibilities, and the value of a strong mentor.

    7 April 2026, 4:00 am
  • 51 minutes 24 seconds
    The Rapid Rise of AI Exploit Development and More Axios Compromise Effects

    It's been quite a week in security news, and Dennis and Lindsey dig into the continued effects of the axios supply chain attack, the incredibly fast adoption of AI tools for vulnerability research and what that means for software makers and defenders, and what the future holds for vulnerability research and exploit development.

    Security Theater in Austin: https://material.security/theater-2026#theater-live-event

    3 April 2026, 4:00 am
  • 25 minutes 41 seconds
    Axios NPM Supply Chain Attack

    Dennis and Lindsey dig into what we know do far about the supply chain attack on the axios NPM package, including how the attacker gained access to the maintainer's account, the window of exposure for the malicious packages, the behavior of the RAT that's installed on victims' machines, and what the downstream effects may be.


    Links

    Huntress post: https://www.huntress.com/blog/supply-chain-compromise-axios-npm-package

    Socket analysis: https://socket.dev/blog/axios-npm-package-compromised

    31 March 2026, 9:03 pm
  • 51 minutes
    RSA Recap: Dancing Robots, AI Everywhere, and the Future of Security

    Fresh off the plane from RSA, Dennis fills Lindsey in on everything she missed (and didn't miss) at this year's conference (0:23), from the insanity of the expo floor (4:06) to the appearance of a line of synchronized robots or spacemen or something (8:18), to some very interesting conversations about the hyper speed of AI malware development and what's coming next for defenders (27:25).

    27 March 2026, 3:13 pm
  • 43 minutes 6 seconds
    RSA 2026 Preview

    With the RSA Conference on the horizon, Dennis and Lindsey are here with a preview of the conference's more interesting sessions and keynotes, a discussion of the recent and ancient history of the conference, and a quick game: Is this a security vendor or a prescription drug name?

    20 March 2026, 10:00 am
  • 52 minutes 37 seconds
    Mark Watney Is a Space Hacker in The Martian

    Sure, space pirate is a cool title, but what about space hacker? Way cooler! With the imminent release of Project Hail Mary, Wendy Nather joins Dennis Fisher to dig into the nutrient-rich narrative soil that produced a modern classic that truly epitomizes the hacker ethos. We are the greatest podcasters on Mars!

    18 March 2026, 1:48 pm
  • 15 minutes 50 seconds
    Fancy Tools From Fancy Bear, Another Proxy Network Takedown, and A Look Ahead

    This week's news includes a reappearance by an old favorite, APT28, aka Fancy Bear, which is back with some nasty new implants and tools it is deploying against targets in Ukraine (2:10), and we also have another law enforcement disruption of a residential proxy network, this one known as SocksEscort, which had victims all over the globe (7:45). Lastly, we talk about some of the upcoming episodes, including a new hacker movie podcast and our RSA preview that's coming next week.


    Links


    APT28 reappears: https://decipher.sc/2026/03/10/apt28-reemerges-with-modern-espionage-arsenal-code-tied-to-2010s-operations/

    SocksEscort takedown: https://decipher.sc/2026/03/12/us-europol-crack-down-on-socksescort-residential-proxy-network/

    13 March 2026, 1:43 pm
  • 46 minutes 5 seconds
    The Wild, Wild World of Exploits With Caitlin Condon

    The process of developing and deploying exploits is a complex and controversial one and it's often a black box to outside observers. To help shine a light on how this all works, Caitlin Condon of VulnCheck joins Dennis Fisher for a deep dive into the zero day exploit landscape, what goes into exploit development, and what actually qualifies as a functional exploit.

    10 March 2026, 1:17 pm
  • 19 minutes 14 seconds
    The Zero Day Landscape, Tycoon 2FA Disruption, and KEVology

    Every day is zero day, and this week we talked about the new Google Threat Intelligence Group report on the zero day exploit landscape in 2025 (2:22) and who's exploiting what, then we discuss Microsoft's disruption of the Tycoon 2FA cybercrime operation (9:51), and finally we talk about the KEVology report from runZero and our new podcast with Tod Beardsley (13:25).

    6 March 2026, 2:56 pm
  • 47 minutes 9 seconds
    We Need to Talk About KEV With Tod Beardsley

    Tod Beardsley, VP of security research at runZero and former KEV section chief at CISA, joins Dennis Fisher to talk about the evolution of the Known Exploited Vulnerabilities catalog, how much value defenders should place on a specific bug being in the KEV, and his new KEVology report that breaks down all of the data in the KEV and sifts through it for specific insights for defenders.




    2 March 2026, 2:28 pm
  • More Episodes? Get the App