
Prajeet Nair
Assistant Editor, Global News Desk at Information Security Media Group (ISMG)
Assistant Editor - Global News Desk at Information Security Media Group. Anything related to Cybersecurity? PLEASE DM. Tweets are personal. From Amarkantak.
Articles
-
1 week ago |
thetechstreetnow.com | Prajeet Nair
25 minutes ago bankinfosecurity Race-Condition Bugs in Ubuntu and Red Hat Tools Could Leak Sensitive Memory Data Prajeet Nair (@prajeetspeaks) • May 30, 2025 Hackers could exploit a tool that stores crashed system data in older Linux operating systems to obtain passwords and encryption keys, say researchers.
-
1 week ago |
bankinfosecurity.com | Prajeet Nair
Race-Condition Bugs in Ubuntu and Red Hat Tools Could Leak Sensitive Memory Data Prajeet Nair (@prajeetspeaks) • May 30, 2025 Image: Shutterstock Hackers could exploit a tool that stores crashed system data in older Linux operating systems to obtain passwords and encryption keys, say researchers.
-
1 week ago |
inforisktoday.com | Prajeet Nair
Attack Surface Management , Security Operations Race-Condition Bugs in Ubuntu and Red Hat Tools Could Leak Sensitive Memory Data Prajeet Nair (@prajeetspeaks) • May 30, 2025 Image: Shutterstock Hackers could exploit a tool that stores crashed system data in older Linux operating systems to obtain passwords and encryption keys, say researchers.
-
1 week ago |
bankinfosecurity.com | Prajeet Nair
Endpoint Security , Internet of Things Security Persistent Attack Grants Remote SSH Access via Exploit Prajeet Nair (@prajeetspeaks) • May 29, 2025 Image: Tada Images/Shutterstock Someone - possibly nation-state hackers - appears to be constructing a botnet from thousands of Asus routers in hacking that survives a firmware patch and reboots. Nearly 9,000 routers have been compromised and the number is growing, say researchers.
-
1 week ago |
bankinfosecurity.com | Prajeet Nair
Endpoint Security , Internet of Things Security Stealthy Malware Installs Cryptomining Software Prajeet Nair (@prajeetspeaks) • May 28, 2025 A puma photographed in captivity in Goias, Brazil. (Image: Leonardo Mercon/Shutterstock) A botnet targeting Internet of Things devices running on the Linux operating system works by brute forcing credentials and downloading cryptomining software.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 1K
- Tweets
- 6K
- DMs Open
- Yes

RT @annamadeline: Heading to @Infosecurity EU this week? @euroinfosec has rounded up some of the must-see sessions you won’t want to miss h…

SHREYAS IYER - That's the tweet. #PunjabKings #PBKSvsMI

RT @ISMG_News: Someone - possibly nation-state #hackers - appears to be constructing a #botnet from thousands of Asus routers in hacking th…