Add your product or open-source project on TechLogHub
Listing is free. Sponsored featured placements are paid and priced in USD — open the pricing dialog to see plan details.
Loading...
Explore software products worth tracking, open-source projects worth studying, and blog coverage that helps builders spot useful tools and ideas sooner.
Listing is free. Sponsored featured placements are paid and priced in USD — open the pricing dialog to see plan details.
Analysis, product insight, and practical reads for builders

Disc Soft confirms a supply-chain attack that trojanized DAEMON Tools Lite installers, releasing a malware-free 12.6 version on May 5 while other DAEMON Tools products appear unaffected. Users who installed 12.5.1 since April 8 should uninstall, run a full scan, and upgrade to 12.6; prior activity linked by Kaspersky involved backdoors and info-stealers, but the latest 12.6.0.2445 is reported to no longer exhibit malicious behavior.

Ransomware now often defeats backups by exposing, compromising, or destroying backup systems during an attack, not because backups are absent. This post outlines the typical attack chain and why traditional backup strategies fail—shared credentials, weak access controls, lack of immutable backups, untested recovery, and siloed tools. It argues that immutability is critical but not sufficient on its own; it must be combined with strong access control, monitoring, and recovery validation. Five practical protections are recommended: enforce identity separation with MFA, isolate backup environments, use immutable backups, monitor backup activity, and regularly test restores. It also covers steps if backups are compromised, such as locating older clean copies, leveraging off-site immutable storage, and rebuilding from clean baselines. The piece advocates a resilience-first approach and an integrated cyber-protection platform that unifies backup, security, and recovery to achieve end-to-end visibility and reliable recovery in today’s threat landscape.

Palo Alto Networks warns of a critical unpatched zero-day in the PAN-OS User-ID Authentication Portal (Captive Portal), tracked as CVE-2026-0300. The flaw, a buffer overflow, could allow unauthenticated attackers to execute code with root privileges on internet-facing PA-Series and VM-Series firewalls via crafted packets. Limited exploitation has been observed, and admins are urged to restrict portal access or disable it until a patch is released. Shadowserver data show thousands of PAN-OS VM-series devices online, underscoring the widespread risk.

Trend Micro researchers have uncovered Quasar Linux (QLNX), a stealthy new Linux malware implant targeting software developers' environments (npm, PyPI, GitHub, AWS, Docker, Kubernetes) and signaling a potential supply-chain attack vector. QLNX combines rootkit, backdoor, and credential-stealing capabilities to achieve long-term, fileless persistence, including in-memory execution, log deletion, process-name spoofing, and forensic data clearing. It uses seven persistence mechanisms (LD_PRELOAD, systemd, crontab, init.d, XDG autostart, and .bashrc injection) to ensure it loads across dynamically linked processes. The malware comprises modular blocks: a 58-command RAT core, a dual-layer rootkit (userland LD_PRELOAD and kernel eBPF), credential harvesting (SSH keys, cloud/config files, PAM backdoors), surveillance (keylogging, screenshots), networking and lateral movement, in-memory execution/injection, and real-time filesystem monitoring. By targeting developer workstations, QLNX aims to bypass enterprise defenses and access credentials underpinning software delivery pipelines; while IoCs are provided, attribution and deployment scope remain unclear.
Subscribe to our newsletter for updates.