Featured SOC Security Analytics
We’re thrilled to announce that Gurucul has been recognized as a Leader in the 2025 Gartner Magic Quadrant for Security Information and Event Management (SIEM). After three consecutive…
April 9, 2026
Phantom Workforce: The Insider Threat You Didn’t Hire
A new developer joins your team. They hit every deadline, attend every sync, and follow every security protocol to the letter. Six months later, you realize that “person” never existed. It was a state-sponsored identity using AI-enhanced deepfakes…
Read More
April 8, 2026
Fake OpenClaw AI Tool Used to Deliver Infostealer via ClickFix Attack Chain
Threat Research
Overview This report analyzes a malware distribution campaign leveraging a spoofed OpenClaw platform to deliver an infostealer payload. The campaign relies on ClickFix-style social engineering to trick users into executing malicious commands manually, bypassing browser-based security controls. Once executed,…
Read More
April 6, 2026
Anthropic Claude Code Leak: From Accidental Exposure to Open-Source Frenzy
Threat Intelligence
Within hours of exposure, Anthropic’s Claude codebase moved from a controlled asset to an uncontrollable global artifact. Executive Summary A significant leak involving Anthropic’s Claude codebase triggered rapid dissemination across developer ecosystems, highlighting critical risks in software release…
Read More
April 4, 2026
Breaking the Blind Spot: Detecting Data Exfiltration via Disposable Emails in BEC Attacks
Introduction: Why “disposable email addresses” are the New Corporate Data Blind Spot. We’ve spent the better part of a decade building digital fortresses around Gmail and Outlook, meticulously refining allowlists and monitoring every major provider for signs…
Read More
April 1, 2026
Crypto Drainers: From Wallet Approval Abuse to Malware-Assisted Web3 Attacks
Threat Research
Introduction Crypto drainers represent a class of financially motivated threats targeting Web3 users by abusing blockchain transaction authorization mechanisms rather than exploiting software vulnerabilities. Instead of stealing credentials or deploying traditional malware, these attacks manipulate…
Read More
March 30, 2026
The 11- Minute Heist: Why Traditional Security Fails to Catch the “Ghost” in Your Network
Threat Intelligence
Introduction Modern Security Operations Centers (SOCs) are currently facing a paradox: they have more data than ever before, yet they have never been more blind. Analysts are drowning in thousands of daily alerts, most of which lack the context…
Read More
March 26, 2026
SURXRAT: MaaS Android RAT Leveraging Telegram and Firebase Infrastructure
Threat Research
Executive Summary SURXRAT is an Android-based Remote Access Trojan (RAT) operating under a Malware-as-a-Service (MaaS) model and distributed primarily through Telegram channels. The malware provides operators with full remote control over infected devices, enabling surveillance, data exfiltration, and device…
Read More
March 24, 2026
Pinnacle Tax Inc Data Leak
Threat Intelligence
Executive Summary On March 16, 2026, the ransomware group Qilin Ransomware publicly claimed responsibility for a cyberattack targeting Pinnacle Tax Inc., a U.S.-based provider of tax planning and financial services. If confirmed, this incident represents a high-impact data breach…
Read More
March 20, 2026
The Machine is Now the Insider: Critical Takeaways from the 2026 Insider Risk Report
Insider Threat
For years, the “insider threat” was a Hollywood trope: the disgruntled spy walking out with a briefcase of trade secrets. According to the 2026 Insider Risk Report, that era is fading. Today, insider risk isn’t an occasional…
Read More
March 17, 2026
Detecting Oblivion Android RAT: Accessibility Abuse, OTP Interception, and Mobile Threat Behavior
Threat Research
Overview Oblivion is an Android Remote Access Trojan (RAT) advertised on underground forums as a comprehensive mobile surveillance and fraud toolkit. The malware is promoted with capabilities ranging from remote device interaction to credential theft and persistent access.
Read More
March 11, 2026
Mapping Hacktivist Cyber Operations in the Iran–Israel–US Geopolitical Conflict
Threat Intelligence
Executive Summary The escalation of geopolitical tensions involving Iran, Israel, and the United States has been accompanied by a surge in hacktivist cyber operations targeting government institutions, financial platforms, infrastructure organizations, and private companies across multiple regions.
Read More
March 6, 2026
Cyber Fallout from the Iran–Israel–US Conflict: Monitoring Emerging Nation-State Cyber Threat Activity
Threat Research
Introduction Modern geopolitical conflicts increasingly extend beyond traditional battlefields into the cyber domain. Nation-state actors now routinely leverage cyber operations to conduct espionage, disrupt infrastructure, and retaliate against adversaries. The current geopolitical tensions involving Iran…
Read More