Add your product or open-source project on TechLogHub
Listing is free. Sponsored featured placements are paid and priced in USD — open the pricing dialog to see plan details.
Loading...
Explore software products worth tracking, open-source projects worth studying, and blog coverage that helps builders spot useful tools and ideas sooner.
Listing is free. Sponsored featured placements are paid and priced in USD — open the pricing dialog to see plan details.
Analysis, product insight, and practical reads for builders

Ivanti has issued a warning about a new high-severity remote code execution flaw in Endpoint Manager Mobile (EPMM), CVE-2026-6973, being exploited in zero-day attacks. The vulnerability affects EPMM versions up to 12.8.0.0 and requires admin authentication; users are urged to upgrade to 12.6.1.1, 12.7.0.1, or 12.8.0.1 and to rotate admin credentials. Ivanti says cloud products are unaffected and exploitation appears limited, though hundreds of EPMM IPs are exposed online per Shadowserver. The company also patched four additional high-severity EPMM flaws (CVE-2026-5786/7/8 and 7821) with no confirmed in-the-wild exploitation, while earlier CVEs (1281/1340) had been exploited in the wild.

New analysis reveals traditional DLP misses browser-based data flows, with 46% of sensitive file uploads to web apps ending up in unsanctioned accounts. As work shifts to browser apps and AI tools, data is copied, pasted, typed into forms, or uploaded from personal or shadow accounts, often evading endpoint and network DLP. A real-world example shows proprietary code moving from a private repository into a personal ChatGPT session, leaving the organization unprotected. Browser-native DLP, like Keep Aware, runs inside the browser to inspect data in real time, understand context, and enforce inline controls—complementing existing DLP. The piece invites readers to book a demo to see browser-native DLP in action.

Two U.S. nationals were sentenced to 18 months in prison for running “laptop farms” that helped North Korean IT workers fraudulently obtain remote jobs at nearly 70 American companies. Matthew Knoot operated the scheme from Nashville (July 2022–August 2023) using stolen identities, while Erick Prince aided North Korean workers through Taggcar Inc (2020–2024). The case, part of a broader effort to disrupt North Korea’s illicit IT revenue, involved substantial victim payments and remediation costs, with restitution and forfeiture orders issued.

Security researchers warn of a critical PAN-OS zero-day (CVE-2026-0300) in the User-ID Authentication Portal that has been exploited by suspected state-sponsored actors to achieve unauthenticated remote code execution on internet-facing PA-Series and VM-Series firewalls for nearly a month. Exploitation began around April 9, 2026; attackers succeeded about a week later and deployed EarthWorm and ReverseSocks5 to establish covert tunnels. Shadowserver reports thousands of exposed PAN-OS VM-series devices, with most in Asia and North America; Cloud NGFW and Panorama are unaffected. Patches are expected to begin rolling out on May 13; CISA has added CVE-2026-0300 to the KEV catalog and ordered Federal agencies to secure vulnerable devices by May 9. In the meantime, admins should restrict access to the Captive Portal or disable it and verify settings under Device > User Identification > Authentication Portal Settings.
Subscribe to our newsletter for updates.