A multi-stage intrusion involving Context AI and Vercel has been identified, leading to alleged data exposure and monetization activity attributed to ShinyHunters.
The incident originated from a confirmed Lumma Stealer infection on a ...
Subscribe to Gurucul’s news feed.
Click on “Follow” and decide if you want to get news from Gurucul via RSS, as email newsletter, via mobile or on your personal news page.
Subscription to Gurucul comes without risk as you can unsubscribe instantly at any time.
You can also filter the feed to your needs via topics and keywords so that you only receive the news from Gurucul which you are really interested in. Click on the blue “Filter” button below to get started.
Website title: Gurucul | AI SOC Platform and Next-Gen SIEM
Is this your feed? Claim it!
A multi-stage intrusion involving Context AI and Vercel has been identified, leading to alleged data exposure and monetization activity attributed to ShinyHunters.
The incident originated from a confirmed Lumma Stealer infection on a ...
This report analyzes a supply chain compromise involving malicious Xinference packages on PyPI, which were used to exfiltrate sensitive data, harvest cloud credentials, and target cryptocurrency wallets.
On April 22, 2026, a user reported that Xinference version 2.6.2 looked suspicious. During installation, they n...
CrySome RAT is a .NET-based remote access trojan designed for post-compromise control, credential harvesting, and covert system interaction. The malware prioritizes persistence, defense evasion, and operator control over initial access techniques.
The analyzed sample demonstrates multiple persistence mechanisms...
The global cyber landscape has reached a turning point. Attackers are leveraging automation, distributed computing, and adaptive AI to expand their operations with unprecedented precision, while most Security Operations Centers still depend on human-driven processes designed for a slower, simpler era. It’s not that SOC teams lack ability—they lack mechani...
Supply chain compromise affecting the LiteLLM library (versions v1.82.7 and v1.82.8) resulted in the distribution of malicious packages via PyPI. These packages contained embedded data exfiltration capabilities, enabling unauthorized data collection from downstream environments.
Multiple organizations were potentially exposed due to implicit t...