Date Author Title

SOURCE CODE THEFT

2026-04-08Kenneth HartmanTeamPCP Supply Chain Campaign: Update 007 - Cisco Source Code Stolen via Trivy-Linked Breach, Google GTIG Tracks TeamPCP as UNC6780, and CISA KEV Deadline Arrives with No Standalone Advisory

SOURCE

2026-04-08/a>Kenneth HartmanTeamPCP Supply Chain Campaign: Update 007 - Cisco Source Code Stolen via Trivy-Linked Breach, Google GTIG Tracks TeamPCP as UNC6780, and CISA KEV Deadline Arrives with No Standalone Advisory
2025-10-08/a>Xavier MertensPolymorphic Python Malware
2022-09-21/a>Xavier MertensPhishing Campaigns Use Free Online Resources
2020-03-26/a>Xavier MertensVery Large Sample as Evasion Technique?
2017-11-25/a>Guy BruneauBenefits associated with the use of Open Source Software
2016-11-25/a>Xavier MertensFree Software Quick Security Checklist
2016-02-22/a>Xavier MertensReducing False Positives with Open Data Sources
2014-04-26/a>Guy BruneauNew Project by Linux Foundation - Core Infrastructure Initiative
2013-03-27/a>Rob VandenBrinkSourcefire VRT Community ruleset is live
2012-07-11/a>Rick WannerExcellent Security Education Resources
2011-01-29/a>Mark HofmanSourceforge attack

CODE

2026-04-08/a>Kenneth HartmanTeamPCP Supply Chain Campaign: Update 007 - Cisco Source Code Stolen via Trivy-Linked Breach, Google GTIG Tracks TeamPCP as UNC6780, and CISA KEV Deadline Arrives with No Standalone Advisory
2026-02-27/a>Xavier MertensFake Fedex Email Delivers Donuts!
2026-02-04/a>Xavier MertensMalicious Script Delivering More Maliciousness
2026-01-22/a>Xavier MertensIs AI-Generated Code Secure?
2026-01-21/a>Xavier MertensAutomatic Script Execution In Visual Studio Code
2026-01-20/a>Xavier MertensAdd Punycode to your Threat Hunting Routine
2025-12-05/a>Xavier MertensAutoIT3 Compiled Scripts Dropping Shellcodes
2025-11-12/a>Johannes UllrichUnicode: It is more than funny domain names.
2025-08-27/a>Xavier MertensInteresting Technique to Launch a Shellcode
2025-03-10/a>Xavier MertensShellcode Encoded in UUIDs
2024-12-31/a>Xavier MertensNo Holiday Season for Attackers
2024-08-23/a>Jesse La GrewPandas Errors: What encoding are my logs in?
2024-08-19/a>Xavier MertensDo you Like Donuts? Here is a Donut Shellcode Delivered Through PowerShell/Python
2023-12-06/a>Guy BruneauRevealing the Hidden Risks of QR Codes [Guest Diary]
2023-07-28/a>Xavier MertensShellCode Hidden with Steganography
2023-03-16/a>Xavier MertensSimple Shellcode Dissection
2023-03-07/a>Johannes UllrichHackers Love This VSCode Extension: What You Can Do to Stay Safe
2022-11-04/a>Xavier MertensRemcos Downloader with Unicode Obfuscation
2022-09-14/a>Xavier MertensEasy Process Injection within Python
2022-05-30/a>Xavier MertensNew Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme (CVE-2022-30190)
2022-02-26/a>Guy BruneauUsing Snort IDS Rules with NetWitness PacketDecoder
2022-01-22/a>Xavier MertensMixed VBA & Excel4 Macro In a Targeted Excel Sheet
2022-01-20/a>Xavier MertensRedLine Stealer Delivered Through FTP
2022-01-06/a>Xavier MertensMalicious Python Script Targeting Chinese People
2022-01-05/a>Xavier MertensCode Reuse In the Malware Landscape
2021-12-10/a>Xavier MertensPython Shellcode Injection From JSON Data
2021-10-20/a>Xavier MertensThanks to COVID-19, New Types of Documents are Lost in The Wild
2021-08-20/a>Xavier MertensWaiting for the C2 to Show Up
2021-02-13/a>Guy BruneauvSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html
2021-01-18/a>Didier StevensDoc & RTF Malicious Document
2020-10-14/a>Xavier MertensNicely Obfuscated Python RAT
2020-09-02/a>Xavier MertensPython and Risky Windows API Calls
2020-08-06/a>Xavier MertensA Fork of the FTCode Powershell Ransomware
2020-07-27/a>Didier StevensAnalyzing Metasploit ASP .NET Payloads
2019-12-12/a>Xavier MertensCode & Data Reuse in the Malware Ecosystem
2019-10-27/a>Didier StevensUsing scdbg to Find Shellcode
2019-07-08/a>Didier StevensMachine Code? No!
2019-07-04/a>Didier StevensMachine Code?
2019-05-31/a>Didier StevensRetrieving Second Stage Payload with Ncat
2019-05-30/a>Didier StevensAnalyzing First Stage Shellcode
2019-05-06/a>Didier StevensText and Text
2019-05-01/a>Xavier MertensAnother Day, Another Suspicious UDF File
2019-04-23/a>Didier StevensMalicious VBA Office Document Without Source Code
2019-03-24/a>Didier StevensDecoding QR Codes with Python
2019-02-25/a>Didier StevensSextortion Email Variant: With QR Code
2019-01-02/a>Didier StevensMaldoc with Nonfunctional Shellcode
2018-09-24/a>Didier StevensAnalyzing Encoded Shellcode with scdbg
2018-09-08/a>Didier StevensVideo: Using scdbg to analyze shellcode
2018-09-03/a>Didier StevensAnother quickie: Using scdbg to analyze shellcode
2018-08-31/a>Jim ClausingQuickie: Using radare2 to disassemble shellcode
2018-06-04/a>Rob VandenBrinkDigging into Authenticode Certificates
2017-04-16/a>Johannes UllrichTool to Detect Active Phishing Attacks Using Unicode Look-Alike Domains
2016-11-24/a>Didier StevensExtracting Shellcode From JavaScript
2016-11-18/a>Didier StevensVBA Shellcode and Windows 10
2016-09-26/a>Didier StevensVBA and P-code
2015-09-21/a>Xavier MertensDetecting XCodeGhost Activity
2015-03-30/a>Didier StevensYARA Rules For Shellcode
2013-10-25/a>Johannes UllrichPHP.net compromise aftermath: Why Code Signing Beats Hashes
2013-08-04/a>Johannes UllrichBBCode tag "[php]" used to inject php code
2013-02-16/a>Lorna HutchesonFedora RedHat Vulnerabilty Released
2012-07-19/a>Mark BaggettA Heap of Overflows?
2012-04-26/a>Richard PorterPacketstorm Security and Metasploit have Exploit code for MS12-027
2012-04-25/a>Daniel WesemannBlacole's shell code
2012-03-16/a>Russ McReeMS12-020 RDP vulnerabilities: Patch, Mitigate, Detect
2012-03-11/a>Johannes UllrichAn Analysis of Jester's QR Code Attack. (Guest Diary)
2011-08-11/a>Guy BruneauBlackBerry Enterprise Server Critical Update
2011-08-03/a>Johannes UllrichMalicious Images: What's a QR Code
2011-03-07/a>Bojan ZdrnjaOracle padding attacks (Codegate crypto 400 writeup)
2010-05-12/a>Rob VandenBrinkAdobe Shockwave Update
2010-03-10/a>Rob VandenBrinkMicrosoft Security Advisory 981374 - Remote Code Execution Vulnerability for IE6 and IE7
2010-02-08/a>Adrien de BeaupreWhen is a 0day not a 0day? Fake OpenSSh exploit, again.
2009-08-08/a>Guy BruneauXML Libraries Data Parsing Vulnerabilities
2009-05-29/a>Lorna HutchesonVMWare Patches Released
2008-07-22/a>Mari Nichols‘Cold Boot’ Attack Utility Tools
2008-06-10/a>Swa FrantzenRansomware keybreaking

THEFT

2026-04-08/a>Kenneth HartmanTeamPCP Supply Chain Campaign: Update 007 - Cisco Source Code Stolen via Trivy-Linked Breach, Google GTIG Tracks TeamPCP as UNC6780, and CISA KEV Deadline Arrives with No Standalone Advisory
2026-04-03/a>Kenneth HartmanTeamPCP Supply Chain Campaign: Update 006 - CERT-EU Confirms European Commission Cloud Breach, Sportradar Details Emerge, and Mandiant Quantifies Campaign at 1,000+ SaaS Environments
2026-04-01/a>Kenneth HartmanTeamPCP Supply Chain Campaign: Update 005 - First Confirmed Victim Disclosure, Post-Compromise Cloud Enumeration Documented, and Axios Attribution Narrows
2026-03-30/a>Kenneth HartmanTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Compromise, TeamPCP Runs Dual Ransomware Operations, and AstraZeneca Data Released
2026-03-28/a>Kenneth HartmanTeamPCP Supply Chain Campaign: Update 003 - Operational Tempo Shift as Campaign Enters Monetization Phase With No New Compromises in 48 Hours
2026-03-27/a>Kenneth HartmanTeamPCP Supply Chain Campaign: Update 002 - Telnyx PyPI Compromise, Vect Ransomware Mass Affiliate Program, and First Named Victim Claim
2026-03-26/a>Kenneth HartmanTeamPCP Supply Chain Campaign: Update 001 - Checkmarx Scope Wider Than Reported, CISA KEV Entry, and Detection Tools Available
2021-05-29/a>Guy BruneauSpear-phishing Email Targeting Outlook Mail Clients
2019-01-30/a>Russ McReeCR19-010: The United States vs. Huawei
2008-10-15/a>Rick WannerDay 15 - Containing the Damage From a Lost or Stolen Laptop
2006-09-29/a>Kevin ListonA Report from the Field