SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
The TeamPCP campaign marks a turning point in cloud security. Attackers are no longer bypassing defenses. They are weaponizing them.
In this session, we break down how attackers compromised the widely used Trivy security scanner and used it to launch a cascading software supply chain attack across thousands of organizations.
This attack shows how CI/CD pipelines have become a primary target and how trusted security tools can be turned into attack vectors. A vulnerability scanner used by more than 10,000 development teams was compromised to steal cloud credentials, exfiltrate sensitive data, and spread malware across software ecosystems.
This is not an edge case. It highlights fundamental risks in modern cloud environments, including over-permissioned access, lack of trust boundaries in CI/CD pipelines, and the growing impact of software supply chain attacks.
This webcast walks through the TeamPCP attack from start to finish, covering how it began, how it spread, the impact, and the key lessons for defenders.
Presenters will break down the attack to show:
This session supports content and knowledge from SEC510, SEC540, SEC588, and FOR509. To learn more, access free resources, and explore upcoming course runs within the SANS Cloud Security curriculum CLICK HERE.


Ken owns Lucid Truth Technologies, a private investigation agency and forensic consulting firm specializing in computer, mobile, network, and cloud forensics. Ken’s mission is to “make the truth clear,” and that's reflected in his teaching style.
Learn more

Eric is a co-founder and principal security engineer at Puma Security, focusing on cloud security, Kubernetes, and DevSecOps automation. A SANS Fellow, he is co-author and instructor for three SANS Cloud Security courses.
Learn more