Add your product or open-source project on TechLogHub
Listing is free. Sponsored featured placements are paid and priced in USD — open the pricing dialog to see plan details.
Loading...
Explore software products worth tracking, open-source projects worth studying, and blog coverage that helps builders spot useful tools and ideas sooner.
Listing is free. Sponsored featured placements are paid and priced in USD — open the pricing dialog to see plan details.
Analysis, product insight, and practical reads for builders

Instructure has announced an agreement with the ShinyHunters extortion group to stop the leakage of data stolen in a breach of the Canvas LMS, with the stolen data returned and destruction logs provided. The incident affected more than 30 million educators and students across 8,000 schools and universities, and ShinyHunters claimed about 3.6TB of data was stolen after exploiting Free-for-Teacher XSS flaws and even defaced Canvas login pages on May 7. Canvas has been restored, Free-for-Teacher accounts were temporarily shut, and Instructure will share further updates in a May 13 webinar; the FBI cautions that paying a ransom does not guarantee safety from further extortion.

Instructure confirmed that hackers exploited a Canvas vulnerability to deface login portals and leave an extortion message, using multiple XSS flaws to gain authenticated admin sessions. A second attack on May 7 leveraged the same flaw to pressure a ransom after an initial breach disclosed on April 29. The Free-for-Teacher environment was affected, Canvas was offline briefly and restored by May 9, and ShinyHunters claim to have stolen data from 8,809 institutions—up to 275 million records—though the defacement itself did not compromise data.

Bleeding-edge webinar (May 14, 2026 at 2:00 PM ET) from BleepingComputer explains why prevention alone isn’t enough against modern cyberattacks. Featuring Austin O’Saben of Kaseya, the session covers AI-driven phishing, SaaS abuse, and how trusted platforms are exploited, arguing that robust backups and a rapid recovery plan are essential to cyber resilience. Attendees will learn how to integrate prevention, detection, and quick recovery to minimize downtime and data loss.
.jpg&w=3840&q=75)
Security researchers have detected TrickMo Android banking malware variant TrickMo.C that uses The Open Network (TON) blockchain for covert command-and-control communications. The campaign targets European users (France, Italy, Austria) and disguises itself as TikTok or streaming apps to steal banking credentials and crypto wallets. TrickMo is a two-stage modular malware with a loader and a runtime module; the new variant adds commands such as curl, dnsLookup, ping, traceroute, SSH tunneling, and port forwarding, and supports authenticated SOCKS5 proxies. It also features extensive data-theft capabilities including keylogging, screen capture/recording, SMS interception, OTP suppression, clipboard modification, and notification filtering. Users are advised to download apps only from Google Play, limit installed apps, enable Play Protect, and exercise caution with apps from unknown publishers.
Subscribe to our newsletter for updates.