TeamPCP Compromises Telnyx: WAV Steganography, Windows Persistence, and the Credential Chain Continues

Phoenix Security Vulnerability Intelligence infographic: TeamPCP Compromises Telnyx — Day 7 Campaign Update, March 27, 2026. Domino chain showing falling tools: npm, KICS, VS Code, LiteLLM, WAV Steganography, Windows msbuild.exe, Kubernetes lateral movement — knocked down by a robotic arm labelled TeamPCP. Key threats listed: audiomon.service persistence, WAV XOR payload, Windows Startup folder, K8s lateral movement. Affected products: telnyx PyPI 4.87.1/4.87.2, litellm, trivy-action, Checkmarx-action. CVE: None. Attack vector: PyPI supply chain and C2 download. Bottom banner: Patch immediately. Rotate all credentials. Block C2 83.142.209.203. Remove audomon.service and msbuild.exe.

Day 7 Campaign Update · March 27, 2026 | Phoenix Security Vulnerability Intelligence


Executive Summary

On March 27, 2026 — seven days into the most consequential software supply chain campaign on record — TeamPCP struck again. The threat actor, also tracked as DeadCatx3, PCPcat, and ShellForce, published two backdoored versions of telnyx to PyPI without corresponding GitHub releases or tags. Telnyx is a telecommunications API SDK with approximately 742,000–790,000 monthly downloads; its SDK handles telephony credentials, session tokens, and API keys by design, making it a high-value target with maximum credential density per compromised host.

The telnyx payload shares the byte-for-byte identical RSA-4096 public key as the litellm compromise three days earlier, providing unambiguous attribution to TeamPCP. But the attacker has not stood still. Every major delivery and evasion mechanism has been redesigned: the 34,000-character inline payload from litellm is replaced by a 4,428-character thin dropper; the real 332-line credential harvester is now hidden inside a WAV audio file, fetched at runtime from a bare IP-address C2 server, invisible to static analysis. Windows targeting — absent from every prior TeamPCP campaign wave — appears for the first time, with a native binary extracted from a second WAV file and installed in the Startup folder masquerading as msbuild.exe.

The credential chain driving these attacks is propagating. TeamPCP’s March 24 litellm compromise harvested PyPI publishing tokens from thousands of CI/CD pipelines that import LiteLLM. Three days later, one of those stolen tokens enabled direct publication to telnyx’s PyPI account, bypassing GitHub entirely. Each compromised package produces credentials that unlock the next target. PyPI quarantined both malicious versions within approximately three hours of discovery by Endor Labs. Version 4.87.0, published March 26, is the last known-clean release.

TL;DR for Engineering Teams

What it is: Supply chain compromise of telnyx versions 4.87.1 and 4.87.2 on PyPI. Thin dropper in telnyx/_client.py fetches a 332-line credential harvester hidden inside a WAV audio file. Attributed to TeamPCP via identical RSA-4096 key. No CVE assigned.

Where it bites: Any Python environment with telnyx==4.87.1 or telnyx==4.87.2 installed. Payload fires at import time on both Linux/macOS (FetchAudio) and Windows (setup). Version 4.87.1 had a NameError typo that killed the payload — 4.87.2 fixed it sixteen minutes later.

Why it matters: New WAV steganography delivery makes the payload invisible to static analysis and most content filters. Windows targeting added for the first time. Kubernetes lateral movement deploys privileged pods across every node. Persistence via audiomon.service polls C2 every 45–55 minutes.

Patch status: Both versions quarantined by PyPI. Last known-clean version: telnyx 4.87.0 (published March 26, 2026, verified clean by Endor Labs).

Immediate action: Check pip show telnyx. Downgrade to 4.87.0 immediately if running 4.87.1 or 4.87.2. Block 83.142.209.203 at network perimeter. Remove audiomon.service and ~/.config/audiomon/. Delete Startup/msbuild.exe on Windows. Rotate all credentials accessible to the affected host.

Vulnerability Overview

FieldValue
VendorBerriAI / telnyx maintainers
Producttelnyx (PyPI package)
Vulnerability TypeSupply chain compromise / credential theft / K8s lateral movement / Windows persistence
CWECWE-829 (Inclusion of Functionality from Untrusted Control Sphere)
CVENot assigned
Attack VectorNetwork (PyPI package installation — fires at import time)
Active ExploitationConfirmed — credentials exfiltrated via RSA-wrapped AES bundle
AttributionTeamPCP (DeadCatx3 / PCPcat / ShellForce / CipherForce)
Exposure Window~3 hours: 4.87.1 at 03:51 UTC, 4.87.2 at 04:07 UTC, quarantine ~07:00 UTC
C2 Infrastructure83.142.209.203:8080 (bare IP, HTTP)
Persistence Mechanismaudiomon.service (Linux/macOS), msbuild.exe in Startup folder (Windows)

Technical Anatomy

Root Cause: Stolen PyPI Token via Credential Cascade

There are no GitHub commits, tags, or releases for versions 4.87.1 or 4.87.2. The attacker bypassed telnyx’s automated release pipeline entirely and published using a stolen PyPI API token. Telnyx does not use PyPI Trusted Publishers (OIDC-based publishing) — it relies on a long-lived API token. Anyone holding that token can publish from any machine, anywhere.

The most probable acquisition vector is the litellm PyPI compromise of March 24. TeamPCP’s credential harvester sweeps environment variables, .env files, .npmrc files, and shell histories from every system that imports the compromised package. Any developer workstation or CI runner that had both litellm installed and access to the telnyx PyPI token had that token in TeamPCP’s exfiltration archive. The three-day gap between litellm and telnyx fits the operational tempo of sifting through harvested credentials and selecting the next high-value target.

Exploit Path

Step 1 — Entry point: TeamPCP published malicious telnyx wheels directly to PyPI using a stolen API token. No GitHub interaction, no CI pipeline, no code review. Users importing telnyx or any dependency that transitively imports it become victims.

Step 2 — Vulnerability trigger: All malicious code lives in a single modified file: telnyx/_client.py (7,825 lines). The legitimate SDK code ends around line 7,758. The attacker appended malicious imports (lines 4–10), a base64 decoder helper (lines 41–42), a 4,428-character base64 payload blob (line 459), and two attack functions (lines 7,761–7,825). Both attack paths are invoked at module scope, meaning execution begins the moment Python imports telnyx — before any application code runs.

Step 3 — Execution impact: On Linux/macOS, FetchAudio() spawns a detached subprocess (start_new_session=True) that decodes the inline payload and fetches the real harvester hidden inside ringtone.wav from 83.142.209.203:8080. On Windows, setup() downloads hangup.wav, extracts a native PE binary using the same XOR-key WAV steganography, and installs it as msbuild.exe in the Startup folder for persistence across reboots.

WAV Steganography: The Core Technical Innovation

The defining advancement in this attack is the use of WAV audio files as payload carriers. The WAV files (ringtone.wav on Linux/macOS, hangup.wav on Windows) are structurally valid audio files. They pass MIME-type checks, content filters, and inspection. The audio frame data, however, is not audio — it is base64-encoded, XOR-encrypted Python code.

Extraction: read WAV frames, base64 decode, take the first 8 bytes as an XOR key, XOR-decrypt the remainder. What emerges is the full 332-line Python credential harvester. To any network monitoring system watching the wire, the application downloaded a ringtone. The actual payload never exists on disk in the package and is not visible to any static analysis of the installed wheel.

Python:

with wave.open(wf, 'rb') as w:
    b = base64.b64decode(w.readframes(w.getnframes()))
    s, m = b[:8], b[8:]
    payload = bytes([m[i] ^ s[i % len(s)] for i in range(len(m))])

Aikido researcher Charlie Eriksen first documented this technique on March 22 in the TeamPCP Kubernetes wiper payload, five days before it appeared in the telnyx package. This is not an experimental tactic — it is now an established TeamPCP delivery primitive.

This architecture has significant operational implications for defenders. The package footprint is 87% smaller than litellm. The payload is updatable without republishing. If the C2 server goes dark, forensic recovery of the full attack capability breaks down. No post-incident analysis can reconstruct what payload was delivered without a contemporaneous network capture.

Stage 1: The Thin Dropper and Credential Harvester

The base64-encoded _p variable in _client.py decodes to an 85-line audioimport() script whose sole purpose is to fetch the WAV file and extract the real harvester. The harvester is a 332-line Python orchestrator covering:

CategoryTargets
SSH~/.ssh/id_rsa, id_ed25519, id_ecdsa, authorized_keys, config — all users; /etc/ssh host keys
Cloud (AWS)~/.aws/credentials, config; AWS_* env vars; EC2 IMDSv2; ECS container credentials; Secrets Manager; SSM
Cloud (GCP)~/.config/gcloud/*, application_default_credentials.json, GOOGLE_APPLICATION_CREDENTIALS
Cloud (Azure)~/.azure/ directory tree, AZURE_* env vars
Kubernetes~/.kube/config, service account tokens, all secrets across all namespaces
Docker~/.docker/config.json, /kaniko/.docker/config.json
Dev credentials.npmrc, .vault-token, .netrc, .git-credentials, .gitconfig
Database.pgpass, my.cnf, redis.conf, .mongorc.js, DATABASE/DB_/MYSQL/POSTGRES env vars
Environment files.env, .env.local, .env.production, .env.staging — searched 6 directories deep
CI/CD and IaCterraform.tfvars, terraform.tfstate, .gitlab-ci.yml, Jenkinsfile, ansible.cfg
TLS/SSL private keys*.pem, *.key, *.p12, *.pfx/etc/ssl/private, /etc/letsencrypt
Crypto walletsBitcoin wallet.dat, Ethereum keystores, Solana keypairs, Cardano signing keys, Monero, Litecoin
Shell history.bash_history, .zsh_history, .mysql_history, .psql_history
System/etc/passwd, /etc/shadow, authentication logs

Stage 2: Active Cloud Exploitation

The harvester does not stop at filesystem reads. If AWS credentials are found, it implements a full AWS SigV4 signing routine to directly query Secrets Manager (ListSecrets + GetSecretValue) and SSM Parameter Store (DescribeParameters). Secrets that exist only in managed services, never on disk, are pulled and included in the exfiltration archive.

Stage 3: Kubernetes Lateral Movement

If a Kubernetes service account token exists at /var/run/secrets/kubernetes.io/serviceaccount/token, the harvester deploys a privileged pod to every node in the cluster. Each pod runs in kube-system with privileged: true, hostPID, hostNetwork, and the host root filesystem mounted at /host. Pods tolerate all taints, ensuring they schedule on control-plane nodes as well as workers. Each pod chroots into the host filesystem to install the audiomon.service persistence implant directly on the node.

Stage 4: Encryption and Exfiltration

Collected data is encrypted with AES-256-CBC (32-byte random session key, PBKDF2 derivation), the session key wrapped with the hardcoded RSA-4096 public key using OAEP padding. The bundle is packaged as tpcp.tar.gz and POSTed to http://83.142.209.203:8080/ with the header X-Filename: tpcp.tar.gz. This C2 operates over plain HTTP on port 8080 — network inspection is possible if defenders are monitoring.

Windows Attack Path: setup()

The setup() function is the first Windows-targeting capability in the TeamPCP campaign. It builds a path to the Windows Startup folder using runtime-decoded base64 components, checks a hidden lock file (msbuild.exe.lock with a 12-hour cooldown), fetches hangup.wav from the C2, extracts a native Windows PE binary using identical XOR-key WAV steganography, drops it as msbuild.exe in the Startup folder, and launches it silently (CREATE_NO_WINDOW). The binary executes on every user login.

Persistence

On Linux/macOS, the WAV-delivered harvester installs audiomon.service (“Audio Controller”) as a systemd user service, writing the backdoor to ~/.config/audiomon/audiomon.py. The implant polls http://83.142.209.203:8080/raw every 45–55 minutes (jittered) for new WAV payloads. The kill switch is identical to litellm and the Checkmarx wave — if the response contains youtube.com, execution aborts.

Version 4.87.1: The Typo Wave

Version 4.87.1 was the attacker’s first publication attempt. A single-character typo — Setup() (capital S) instead of setup() (lowercase) — caused a Python NameError on import. Neither the Windows nor Linux attack chains executed. Sixteen minutes later at 04:07 UTC, the attacker pushed 4.87.2 with the fix. The error is consistent with the “vibe-coded” (AI-assisted, minimally reviewed) development pattern Aikido researchers observed in CanisterWorm.

Affected Versions

Telnyx (This Compromise)

ComponentVulnerableSafe VersionNotes
telnyx (PyPI)4.87.14.87.0NameError typo — payload non-functional on import
telnyx (PyPI)4.87.24.87.0Full attack chain confirmed — WAV steganography, Windows persistence, K8s lateral movement
telnyx (GitHub)Not affectedv4.87.0No malicious commits; attack bypassed GitHub entirely

Prior TeamPCP Waves — Cumulative Affected Scope

ComponentVulnerableSafeNotes
trivy-actionTags 0.0.1–0.34.2v0.35.0 (SHA: 57a97c7e)75 of 76 tags force-pushed; CVE-2026-33634 (CVSS 9.4)
setup-trivy7 tagsv0.2.6Same stealer payload
trivy binaryv0.69.4–0.69.6v0.69.3Docker Hub, GHCR, ECR
kics-github-actionAll 35 tagsVerify SHACompromised via cx-plugins-releases
ast-github-actionv2.3.28 confirmedVerify SHAAll tags suspected per Wiz
litellm (PyPI)1.82.7, 1.82.81.82.6.pth file in 1.82.8 fires on all Python startup
telnyx (PyPI)4.87.1, 4.87.24.87.0WAV steganography; 4.87.1 non-functional

Exposure Analysis

EnvironmentRiskReason
Python environments with telnyx installedCriticalPayload fires at import time on any platform; no interaction required
CI/CD pipelinesCriticalPipeline secrets, cloud tokens, registry credentials harvested; stolen tokens fuel next wave
Kubernetes clustersCriticalPrivileged pods deployed to every node including control plane; full host filesystem access
Cloud workloads (EC2/GCE/Azure VMs)CriticalIMDS queried for IAM role credentials; Secrets Manager and SSM actively pulled
Developer workstations (Windows)HighFirst Windows target — msbuild.exe Startup persistence; SSH keys, wallets, env files swept
Developer workstations (Linux/macOS)Highaudiomon.service persistent backdoor; SSH keys, .env files, shell history, crypto wallets
Environments using telnyx 4.87.0 or earlierNot affectedLast known-clean version; GitHub source verified clean

Detection Guidance

Indicators of Compromise

TypeIndicatorContext
C2 server83.142.209.203:8080Primary C2 — all telnyx payload delivery, exfiltration, persistence polling
Payload endpointhttp://83.142.209.203:8080/ringtone.wavLinux/macOS harvester via WAV steganography
Payload endpointhttp://83.142.209.203:8080/hangup.wavWindows PE binary via WAV steganography
Exfiltration endpointhttp://83.142.209.203:8080/Receives tpcp.tar.gz POST with X-Filename header
Persistence pollinghttp://83.142.209.203:8080/rawaudiomon.service polls every 45–55 min
Exfil headerX-Filename: tpcp.tar.gzPresent in all TeamPCP stealer exfiltration POSTs
Linux persistence~/.config/audiomon/audiomon.pyPersistent backdoor script
Linux persistence~/.config/systemd/user/audiomon.servicesystemd unit masquerading as “Audio Controller”
Linux state file/tmp/.initd_stateTracks last-fetched C2 URL
Windows persistence%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\msbuild.exeNative PE binary — executes on every login
Windows lock filemsbuild.exe.lock (hidden)12-hour re-download cooldown sentinel
K8s podsnode-setup-{nodename} in kube-systemAttacker-deployed privileged pods
Exfil archivetpcp.tar.gzEncrypted credential bundle
RSA key hash4eceb569b4330565b93058465beab0e6d5ea09cfba8e7f29d7be1b5a2abd958aIdentical to litellm and all prior TeamPCP waves

File Hashes (SHA-256)

HashArtifact
7321caa303fe96ded0492c747d2f353c4f7d17185656fe292ab0a59e2bd0b8d9telnyx-4.87.1-py3-none-any.whl
cd08115806662469bbedec4b03f8427b97c8a4b3bc1442dc18b72b4e19395fe3telnyx-4.87.2-py3-none-any.whl
23b1ec58649170650110ecad96e5a9490d98146e105226a16d898fbe108139e5Backdoored _client.py (v4.87.1)
ab4c4aebb52027bf3d2f6b2dcef593a1a2cff415774ea4711f7d6e0aa1451d4eBackdoored _client.py (v4.87.2)

Verification Steps

  1. Check installed version: pip show telnyx 2>/dev/null | grep Version
  2. Check all lock files: grep telnyx requirements.txt poetry.lock uv.lock Pipfile.lock 2>/dev/null
  3. Scan for Linux persistence: ls -la ~/.config/audiomon/audiomon.py ~/.config/systemd/user/audiomon.service /tmp/.initd_state 2>/dev/null
  4. Check Windows Startup: dir "%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\msbuild.exe"
  5. Check Kubernetes: kubectl get pods -n kube-system | grep node-setup
  6. Review network logs for outbound connections to 83.142.209.203 port 8080
  7. Check systemd: systemctl - user status audiomon.service 2>/dev/null

Remediation Guidance

Immediate Actions

  1. Identify affected systems: pip show telnyx | grep Version across all environments, CI/CD runners, container images, and developer workstations. Check lock files.
  2. Downgrade immediately: pip install telnyx==4.87.0 — the last known-clean version.
  3. Remove Linux persistence: systemctl --user stop audiomon.service && systemctl --user disable audiomon.service. Remove ~/.config/audiomon/, ~/.config/systemd/user/audiomon.service, /tmp/.initd_state, and any /tmp/pglog.
  4. Remove Windows persistence: Delete msbuild.exe and msbuild.exe.lock from %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\.
  5. Kubernetes cleanup: kubectl get pods -n kube-system | grep node-setup and delete all hits. Inspect all nodes for ~/.config/audiomon/ persistence installed by privileged pods.
  6. Block C2: 83.142.209.203 (all ports). Also maintain blocks on checkmarx[.]zone and scan.aquasecurtiy[.]org from prior waves.
  7. Rotate every credential accessible to affected hosts: SSH keys, AWS/GCP/Azure credentials, Secrets Manager and SSM secrets, LLM API keys, database passwords, Docker registry tokens, CI/CD secrets, npm/PyPI tokens, Kubernetes service account tokens, telephony API keys and webhook secrets.
  8. Check cloud audit logs for unauthorised API calls: AWS CloudTrail for Secrets Manager and SSM access, GCP Audit Logs, Azure Activity Log.

Long-Term Hardening

  • Pin all Python dependencies to exact versions with hash verification using pip install --require-hashes
  • Enable PyPI Trusted Publishers (OIDC) for every package your organisation publishes — this single change would have prevented both the litellm and telnyx compromises
  • Pin all GitHub Actions to full commit SHAs using Zizmor, pinact, or Renovate pinGitHubActionDigests
  • Implement network-isolated builds where CI/CD runners only permit traffic to explicitly allowlisted registries
  • Apply a 48–72 hour hold before adopting new package patch versions in production

Phoenix Security Recommendations

The telnyx compromise confirms the operational pattern: each compromised tool generates credentials that unlock the next target. TeamPCP is working through a credential cache assembled over seven days of CI/CD pipeline harvesting. Trivy credentials funded the first PyPI attack; litellm credentials funded telnyx. The next target is likely already selected.

This campaign has no CVE, no CVSS score, and no NVD entry — for any of the nine attack vectors to date. Traditional vulnerability management programmes that rely on CVE feeds and CVSS prioritisation have zero signal on this threat. The attack targets the security and developer tooling your teams trust most.

Attack surface management: Phoenix identifies which environments have telnyx, litellm, trivy-action, and Checkmarx actions installed and maps installed versions against known-compromised releases.

Contextual deduplication: A single compromised PyPI package deployed across 50 microservices and 20 CI pipelines generates 70 potential findings. Phoenix correlates across environments and teams into a single prioritised backlog.

Reachability analysis: Phoenix distinguishes between environments where the compromised telnyx version was installed versus where it was imported and the payload actually executed.

Remediation campaigns: Create a campaign in Phoenix to track across all affected waves: SHA migration, telnyx/litellm downgrade verification, persistence artifact removal, credential rotation, Kubernetes pod cleanup, and cloud audit log review.

Ownership attribution: When telnyx is deployed across multiple teams, Phoenix maps vulnerable components to responsible teams automatically.

Campaign Timeline: Day 7 Update

DateEvent
October 2025Vulnerable pull_request_target workflow (apidiff.yaml) added to Trivy repo
November 29, 2025Boost Security’s poutine flags the workflow — no action taken
February 20, 2026hackerbot-claw GitHub account created; scanning begins
February 28, 2026Trivy fully compromised — org-wide PAT stolen; malicious VS Code extension pushed
March 1, 2026Aqua Security discloses; non-atomic credential rotation begins
March 19, 17:43 UTCTeamPCP uses retained credentials: backdoored Trivy v0.69.4 + 75 trivy-action tags + 7 setup-trivy tags. CVE-2026-33634 (CVSS 9.4) subsequently assigned
March 20, 20:45 UTCCanisterWorm first detected in npm — ICP blockchain C2 identified
March 22, 2026Docker images 0.69.5/0.69.6 backdoored; WAV steganography first observed by Aikido researcher Charlie Eriksen
March 23, 12:53 UTCMalicious OpenVSX extensions: ast-results v2.53.0, cx-dev-assist v1.7.0
March 23, 12:58–16:50 UTCAll 35 kics-github-action tags + ast-github-action v2.3.28 compromised
March 24, 10:39 UTClitellm v1.82.7 published to PyPI with inline credential harvester
March 24, 10:52 UTClitellm v1.82.8 published with .pth file (fires on all Python startup)
March 24, ~13:30 UTCPyPI quarantines entire litellm project
March 27, 03:51 UTCtelnyx 4.87.1 published — NameError typo kills payload
March 27, 04:07 UTCtelnyx 4.87.2 published — NameError corrected, full attack chain live
March 27, ~07:00 UTCPyPI quarantines telnyx 4.87.1 and 4.87.2 following Endor Labs report

References

  1. Endor Labs — TeamPCP Strikes Again: telnyx Compromised Three Days After LiteLLM
  2. GitHub Issue #235 — [SECURITY] PyPI versions 4.87.1 and 4.87.2 are compromised (kiran-sec)
  3. Endor Labs — TeamPCP Isn’t Done: Threat Actor Behind Trivy and KICS Compromises Now Hits LiteLLM
  4. JFrog Security Research — Popular litellm Python package is the latest victim of TeamPCP
  5. Wiz Research — Trivy Compromised by TeamPCP
  6. Wiz Research — KICS GitHub Action Compromised: TeamPCP Supply Chain Attack
  7. CrowdStrike — From Scanner to Stealer: Inside the trivy-action Supply Chain Compromise
  8. Socket Security — Trivy Under Attack Again: Widespread GitHub Actions Tag Compromise
  9. Socket Security — CanisterWorm: npm Publisher Compromise Deploys Backdoor Across 29 Packages
  10. Aikido Security — TeamPCP Deploys CanisterWorm on NPM Following Trivy Compromise
  11. Sysdig TRT — TeamPCP Stealer Detected in Checkmarx ast-github-action
  12. StepSecurity — Trivy Compromised a Second Time
  13. PyPI Advisory — telnyx 4.87.1 and 4.87.2 quarantine (March 27, 2026)

How Phoenix Security Fixes What Actually Matters

Your team doesn’t have a finding problem. They have a fixing problem.

Most platforms hand you a list. Phoenix hands you a plan — ranked by real risk, mapped to the team that owns it, with a clear path to close it.

What remediation looks like with Phoenix:

  • One backlog, not five. Findings from SAST, SCA, containers, and cloud — deduplicated, correlated, and surfaced in a single prioritized queue. No more reconciling lists across tools.
  • Ownership that sticks. Team attribution and inheritance mean the right ticket goes to the right engineer, first time. No routing, no guessing, no back-and-forth.
  • Campaigns that move the needle. Group related findings into targeted remediation campaigns. Track progress, measure closure rates, and report real reduction — not raw counts.
  • AI that does the legwork, not the deciding. Phoenix’s Remediator agent drafts fixes, creates tickets, and opens PRs. Your team reviews, approves, and merges. Every fix is traceable.

Phoenix Security changes the game.

The pattern is the same every time: teams that move from find and report to analyze and fix close more risk with less effort.

The results are clear:

  • Bazaarvoice saved $6.3M in developer time and for teams removed critical in the first weeks of adoption
  • ClearBank cut critical container vulnerabilities by 96–99% and reclaimed 4 hours per engineer per week.
  • IAS saved an equivalent of 1.5M in development hours and reduced SCA-to-container noise by 82.4%
  • Optimizely has been able to act on vulnerabilities sitting on the backlog.

👉 Book a demo today

Or learn how Phoenix Security slashed millions in wasted dev time for fintech, retail, and adtech leaders.

Fix with remediaiton don’t chase ghost vulnerabilities

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Phoenix Security launched Phoenix Blue at VulnCon 2026 — a standalone agentic vulnerability intelligence platform at phxintel.security. The platform indexes 300K+ CVE records and 2,080,512 advisory references from 15+ sources, adds six proprietary scoring systems, zero-day pre-CVE detection, and malicious package monitoring. Free for everyone, built agent-first with REST, GraphQL, and MCP integration.
Francesco Cipollone
Phoenix ships workflow automation, a rebuilt Remedies screen, container deduplication, and Azure connectors — so security teams spend less time managing findings and more time closing them.
Rowan Scott
Contents
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security PRO
This Site Is Protected By
Shield Security PRO