Please turn JavaScript on
Gurucul icon

Gurucul

Subscribe to Gurucul’s news feed.

Click on “Follow” and decide if you want to get news from Gurucul via RSS, as email newsletter, via mobile or on your personal news page.

Subscription to Gurucul comes without risk as you can unsubscribe instantly at any time.

You can also filter the feed to your needs via topics and keywords so that you only receive the news from Gurucul which you are really interested in. Click on the blue “Filter” button below to get started.

Website title: Gurucul | AI SOC Platform and Next-Gen SIEM

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  0.35 / day

Message History

Executive Summary

A multi-stage intrusion involving Context AI and Vercel has been identified, leading to alleged data exposure and monetization activity attributed to ShinyHunters.

The incident originated from a confirmed Lumma Stealer infection on a ...


Read full story

Executive Summary:

This report analyzes a supply chain compromise involving malicious Xinference packages on PyPI, which were used to exfiltrate sensitive data, harvest cloud credentials, and target cryptocurrency wallets.

On April 22, 2026, a user reported that Xinference version 2.6.2 looked suspicious. During installation, they n...


Read full story

Overview

CrySome RAT is a .NET-based remote access trojan designed for post-compromise control, credential harvesting, and covert system interaction. The malware prioritizes persistence, defense evasion, and operator control over initial access techniques.

The analyzed sample demonstrates multiple persistence mechanisms...


Read full story

Introduction

The global cyber landscape has reached a turning point. Attackers are leveraging automation, distributed computing, and adaptive AI to expand their operations with unprecedented precision, while most Security Operations Centers still depend on human-driven processes designed for a slower, simpler era. It’s not that SOC teams lack ability—they lack mechani...


Read full story

Executive Summary

Supply chain compromise affecting the LiteLLM library (versions v1.82.7 and v1.82.8) resulted in the distribution of malicious packages via PyPI. These packages contained embedded data exfiltration capabilities, enabling unauthorized data collection from downstream environments.

Multiple organizations were potentially exposed due to implicit t...


Read full story