Articles

  • 1 week ago | thetechstreetnow.com | Prajeet Nair

    25 minutes ago   bankinfosecurity Race-Condition Bugs in Ubuntu and Red Hat Tools Could Leak Sensitive Memory Data Prajeet Nair (@prajeetspeaks) • May 30, 2025 Hackers could exploit a tool that stores crashed system data in older Linux operating systems to obtain passwords and encryption keys, say researchers.

  • 1 week ago | bankinfosecurity.com | Prajeet Nair

    Race-Condition Bugs in Ubuntu and Red Hat Tools Could Leak Sensitive Memory Data Prajeet Nair (@prajeetspeaks) • May 30, 2025     Image: Shutterstock Hackers could exploit a tool that stores crashed system data in older Linux operating systems to obtain passwords and encryption keys, say researchers.

  • 1 week ago | inforisktoday.com | Prajeet Nair

    Attack Surface Management , Security Operations Race-Condition Bugs in Ubuntu and Red Hat Tools Could Leak Sensitive Memory Data Prajeet Nair (@prajeetspeaks) • May 30, 2025     Image: Shutterstock Hackers could exploit a tool that stores crashed system data in older Linux operating systems to obtain passwords and encryption keys, say researchers.

  • 1 week ago | bankinfosecurity.com | Prajeet Nair

    Endpoint Security , Internet of Things Security Persistent Attack Grants Remote SSH Access via Exploit Prajeet Nair (@prajeetspeaks) • May 29, 2025     Image: Tada Images/Shutterstock Someone - possibly nation-state hackers - appears to be constructing a botnet from thousands of Asus routers in hacking that survives a firmware patch and reboots. Nearly 9,000 routers have been compromised and the number is growing, say researchers.

  • 1 week ago | bankinfosecurity.com | Prajeet Nair

    Endpoint Security , Internet of Things Security Stealthy Malware Installs Cryptomining Software Prajeet Nair (@prajeetspeaks) • May 28, 2025     A puma photographed in captivity in Goias, Brazil. (Image: Leonardo Mercon/Shutterstock) A botnet targeting Internet of Things devices running on the Linux operating system works by brute forcing credentials and downloading cryptomining software.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
1K
Tweets
6K
DMs Open
Yes
Prajeet Nair
Prajeet Nair @prajeetspeaks
2 Jun 25

RT @annamadeline: Heading to @Infosecurity EU this week? @euroinfosec has rounded up some of the must-see sessions you won’t want to miss h…

Prajeet Nair
Prajeet Nair @prajeetspeaks
1 Jun 25

SHREYAS IYER - That's the tweet. #PunjabKings #PBKSvsMI

Prajeet Nair
Prajeet Nair @prajeetspeaks
30 May 25

RT @ISMG_News: Someone - possibly nation-state #hackers - appears to be constructing a #botnet from thousands of Asus routers in hacking th…