Blog

Featured SOC Security Analytics

From Visionary to Leader: Gurucul’s Ascent in the 2025 Gartner Magic Quadrant for SIEM

We’re thrilled to announce that Gurucul has been recognized as a Leader in the 2025 Gartner Magic Quadrant for Security Information and Event Management (SIEM). After three consecutive…

March 11, 2026

Mapping Hacktivist Cyber Operations in the Iran–Israel–US Geopolitical Conflict

Threat Intelligence

Executive Summary The escalation of geopolitical tensions involving Iran, Israel, and the United States has been accompanied by a surge in hacktivist cyber operations targeting government institutions, financial platforms, infrastructure organizations, and private companies across multiple regions.

Read More

March 6, 2026

Cyber Fallout from the Iran–Israel–US Conflict: Monitoring Emerging Nation-State Cyber Threat Activity

Threat Research

Introduction Modern geopolitical conflicts increasingly extend beyond traditional battlefields into the cyber domain. Nation-state actors now routinely leverage cyber operations to conduct espionage, disrupt infrastructure, and retaliate against adversaries. The current geopolitical tensions involving Iran…

Read More

March 3, 2026

Envirogen Technologies Allegedly Targeted by Anubis Ransomware

Threat Intelligence

Executive Summary : Envirogen Technologies, Inc. has reportedly become the latest victim of a large-scale ransomware attack. The ransomware group Anubis has claimed responsibility, alleging the exfiltration of approximately 3.6 terabytes of data comprising over three million…

Read More

February 27, 2026

Data Leak – Substack Confirms Security Incident

Threat Intelligence

Executive Summary Substack, a subscription-based publishing platform, suffered a data breach that occurred in October 2025 and was discovered on February 3, 2026, during which an unauthorized party accessed and later leaked user account data affecting overall 697,298 users;…

Read More

February 26, 2026

Fit-Line Global Data Leak

Threat Intelligence

Executive Summary On January 9, 2026, the ransomware group INC Ransom publicly claimed responsibility for a cyberattack against Fit-Line Global, a manufacturing-sector organization. The group alleges exfiltration of sensitive corporate and employee data, including personal…

Read More

February 25, 2026

Beyond the Schema: How Gurucul Powers OCSF

Introduction Security teams today face a constant balancing act. They must rapidly onboard new telemetry sources while also ensuring consistency for correlation, investigation, and reporting. Flexibility and standardization often collide, creating friction across tools and teams.

Read More

February 24, 2026

Reynolds Ransomware: BYOVD Abuse of NSecKrnl.sys (CVE-2025-68947) for Kernel-Level Defense Evasion

Threat Research

Introduction: Reynolds Ransomware employs a Bring Your Own Vulnerable Driver (BYOVD) strategy to disable endpoint defenses before initiating encryption. The malware embeds a legitimately signed but vulnerable kernel driver, NSecKrnl.sys, and exploits CVE-2025-68947 to obtain kernel-level privileges. By achieving kernel-mode…

Read More

February 17, 2026

DAF Senegal Data Leak

Threat Intelligence

Executive Summary In February 2026, the ransomware group Green Bloods publicly claimed responsibility for a cyber intrusion targeting the Directorate of File Automation (DAF), Senegal. The group alleges exfiltration of national identity records,…

Read More

February 11, 2026

XWorm v7 RAT: Technical Analysis of Infection Chain, C2 Protocol, and Plugin Architecture

Threat Research

Introduction XWorm is a feature-rich Remote Access Trojan (RAT) that has been actively used by cybercriminals since at least 2022. Widely distributed through underground forums and malware-as-a-service ecosystems, XWorm remains popular due to its ease of…

Read More

February 10, 2026

AI SOC Analyst Blog Series: Unboxing the AI SOC Analyst

SOC

Introduction For decades, the Security Operations Center (SOC) has been like a pressure cooker. Analysts are responsible for protecting the entire organization, yet they are often overwhelmed by a relentless stream of alerts from a dozen disconnected…

Read More

February 9, 2026

Tulsa International Airport Data Breach Claim: Alleged Ransomware Attack by Qilin

Threat Intelligence

Executive Summary The ransomware group Qilin has claimed responsibility for an alleged cyberattack against Tulsa International Airport (TUL). The group listed the airport on its dark web leak site and published a limited…

Read More

February 3, 2026

Gurucul Native Out-of-the-box Enrichment: Adding Context That Results in Better Security

Threat Intelligence

Summary Modern security teams are overwhelmed not by a lack of data, but by a lack of context. Raw logs and alerts, when viewed in isolation, rarely tell the full story of an attack. Security analysts need enriched data…

Read More

Advanced cyber security analytics platform visualizing real-time threat intelligence, network vulnerabilities, and data breach prevention metrics on an interactive dashboard for proactive risk management and incident response