Date Author Title

SUPPLY CHAIN

2023-07-18Johannes UllrichExploit Attempts for "Stagil navigation for Jira Menus & Themes" CVE-2023-26255 and CVE-2023-26256
2019-10-24Johannes UllrichYour Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment?

SUPPLY

2026-03-30/a>Kenneth HartmanTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Compromise, TeamPCP Runs Dual Ransomware Operations, and AstraZeneca Data Released
2026-03-28/a>Kenneth HartmanTeamPCP Supply Chain Campaign: Update 003 - Operational Tempo Shift as Campaign Enters Monetization Phase With No New Compromises in 48 Hours
2026-03-27/a>Kenneth HartmanTeamPCP Supply Chain Campaign: Update 002 - Telnyx PyPI Compromise, Vect Ransomware Mass Affiliate Program, and First Named Victim Claim
2026-03-26/a>Kenneth HartmanTeamPCP Supply Chain Campaign: Update 001 - Checkmarx Scope Wider Than Reported, CISA KEV Entry, and Detection Tools Available
2023-07-18/a>Johannes UllrichExploit Attempts for "Stagil navigation for Jira Menus & Themes" CVE-2023-26255 and CVE-2023-26256
2019-10-24/a>Johannes UllrichYour Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment?

CHAIN

2026-03-30/a>Kenneth HartmanTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Compromise, TeamPCP Runs Dual Ransomware Operations, and AstraZeneca Data Released
2026-03-28/a>Kenneth HartmanTeamPCP Supply Chain Campaign: Update 003 - Operational Tempo Shift as Campaign Enters Monetization Phase With No New Compromises in 48 Hours
2026-03-27/a>Kenneth HartmanTeamPCP Supply Chain Campaign: Update 002 - Telnyx PyPI Compromise, Vect Ransomware Mass Affiliate Program, and First Named Victim Claim
2026-03-26/a>Kenneth HartmanTeamPCP Supply Chain Campaign: Update 001 - Checkmarx Scope Wider Than Reported, CISA KEV Entry, and Detection Tools Available
2024-07-16/a>Jan Kopriva"Reply-chain phishing" with a twist
2023-07-18/a>Johannes UllrichExploit Attempts for "Stagil navigation for Jira Menus & Themes" CVE-2023-26255 and CVE-2023-26256
2022-09-19/a>Russ McReeChainsaw: Hunt, search, and extract event log records
2019-10-24/a>Johannes UllrichYour Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment?
2017-06-02/a>Xavier MertensPhishing Campaigns Follow Trends
2016-11-23/a>Tom WebbMapping Attack Methodology to Controls