
Prajeet Nair
Assistant Editor, Global News Desk at Information Security Media Group (ISMG)
Assistant Editor - Global News Desk at Information Security Media Group. Anything related to Cybersecurity? PLEASE DM. Tweets are personal. From Amarkantak.
Articles
-
5 days ago |
thetechstreetnow.com | Prajeet Nair
29 minutes ago bankinfosecurity ShortLeash Backdoor Hijacks SOHO Linux Devices Prajeet Nair (@prajeetspeaks) • June 23, 2025 Likely Chinese nation-state hackers are converting Internet of Things devices including Ruckus Wireless home routers into an operational relay box network - a run of infections creating more digital infrastructure almost certainly used for cyberespionage.
-
5 days ago |
bankinfosecurity.com | Prajeet Nair
ShortLeash Backdoor Hijacks SOHO Linux Devices Prajeet Nair (@prajeetspeaks) • June 23, 2025 Image: Shutterstock Likely Chinese nation-state hackers are converting Internet of Things devices including Ruckus Wireless home routers into an operational relay box network - a run of infections creating more digital infrastructure almost certainly used for cyberespionage.
-
1 week ago |
bankinfosecurity.com | Prajeet Nair
Iranian OT Hacking Team Has Gone Quiet … Too Quiet Prajeet Nair (@prajeetspeaks) • June 20, 2025 Screen of a Unitronics device hacked in Aliquippa, Pennsylvania, on Nov. 25, 2023 (Image: Municipal Water Authority of Aliquippa) Missile exchanges between Iran and Israel and the prospect of U.S. armed intervention against Tehran has cyber defenders warning that American critical infrastructure could become a target of Iranian hackers.
-
1 week ago |
bankinfosecurity.eu | Prajeet Nair
Critical Infrastructure Security , Governance & Risk Management , Operational Technology (OT) Iranian OT Hacking Team Has Gone Quiet … Too Quiet Missile exchanges between Iran and Israel and the prospect of U.S. armed intervention against Tehran has cyber defenders warning that American critical infrastructure could become a target of Iranian hackers.
-
1 week ago |
thetechstreetnow.com | Prajeet Nair
5 minutes ago bankinfosecurity New Variant Uses Virtualization to Weaponize Legit Apps, Stealing Data in Real Time Prajeet Nair (@prajeetspeaks) • June 18, 2025 A banking Trojan known for mimicking mobile app login pages has gone to the next level by copying and pasting real mobile banking apps into a virtual environment it creates on infected smartphones, researchers said.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 1K
- Tweets
- 6K
- DMs Open
- Yes

RT @annamadeline: Heading to @Infosecurity EU this week? @euroinfosec has rounded up some of the must-see sessions you won’t want to miss h…

SHREYAS IYER - That's the tweet. #PunjabKings #PBKSvsMI

RT @ISMG_News: Someone - possibly nation-state #hackers - appears to be constructing a #botnet from thousands of Asus routers in hacking th…