Jai Vijayan, datacenter

Jai Vijayan

datacenter

Naperville, IL, United States

Contact Jaikumar

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • datacenter
  • CSOonline
  • DarkReading
  • DevOps.com
  • TechBeacon
  • The Christian Science Monitor
  • eWEEK
  • Computerworld
  • CIO.com
  • PCWorld

Past articles by Jaikumar:

Embattled VMware ESXi Hypervisor Flaw Exploitable in Myriad Ways

Emerging ransomware variant targets all VMware ESXi hosts. Experts recommend patching immediately to avoid a potential breach. → Read More

Most common SAP vulnerabilities attackers try to exploit

Unpatched systems, misconfigurations and vulnerable custom code are making SAP environments a top target for cyberattacks. → Read More

Microsoft: We Don't Want to Zero-Day Our Customers

The head of Microsoft's Security Response Center defends keeping its initial vulnerability disclosures sparse — it is, she says, to protect customers. → Read More

Scammer Infects His Own Machine With Spyware, Reveals True Identity

An operational slip-up led security researchers to an attacker associated with Nigerian letter scams and malware distribution, after he infected himself with Agent Tesla. → Read More

Millions of Lenovo Laptops Contain Firmware-Level Vulnerabilities

Three flaws present in consumer laptops can give attackers a way to drop highly persistent malware capable of evading methods to remove it, security vendor says. → Read More

Code-Sabotage Incident in Protest of Ukraine War Exposed Open Source Risks

The maintainer of a widely used npm module served up an unwelcome surprise for developers. → Read More

New Log4j Attack Vector Discovered

Meanwhile, Apache Foundation releases third update to logging tool in 10 days to address yet another flaw. → Read More

Securing the edge: 4 trends to watch

The global COVID-19 pandemic exacerbated some of the security risks associated with the move to a more distributed computing model. Here are 4 ways security organizations are responding as edge computing threats evolve. → Read More

Zoom Joins Microsoft Teams on List of Enterprise Tools Hacked at Pwn2Own

White-hat hacking event shows yet again why there's no such thing as foolproof security against modern attacks. → Read More

Malware Operator Employs New Trick to Upload Its Dropper into Google Play

Check Point researchers recently discovered the Clast82 dropper hidden in nine legitimate Android utility apps. → Read More

5 reasons why the cost of ransomware attacks is rising

The ransom is still a tiny portion of the total cost of a ransomware attack, but associated costs are increasing. → Read More

DDoS Attacks Spiked, Became More Complex in 2020

Global pandemic and the easy availability of for-hire services and inexpensive tool sets gave adversaries more opportunities to attack. → Read More

Ransomware Operator Promotes Distributed Storage for Stolen Data

The criminals behind the DarkSide ransomware-as-a-service operation say the system will be harder to take down. → Read More

Researchers Trick Facial-Recognition Systems

Goal was to see if computer-generated images that look like one person would get classified as another person. → Read More

Energy Market Manipulation with High-Wattage IoT Botnets

Attackers that can compromise enough products such as smart ACs and heaters can tweak power demand in subtle ways for financial gain or to hurt market players, researchers at Black Hat say. → Read More

Data on Indian Mobile Payments App Reportedly Exposed via Open S3 Bucket

Over 7 million records exposed, according to vpnMentor, but app maker says there is no sign of malicious use. → Read More

How IoT changes your threat model: 4 key considerations

More IoT devices connected to your network increases your attack surface, lowers visibility to potential threats, and requires greater coordination between IT and OT. → Read More

Researchers Spot Sharp Increase in Zoom-Themed Domain Registrations

Attackers are attempting to take advantage of the surge in teleworking prompted by COVID-19, Check Point says. → Read More

Researchers Develop New Side-Channel Attacks on Intel CPUs

Load Value Injection (LVI) takes advantage of speculative execution processes just like Meltdown and Spectre, say security researchers from Bitdefender and several universities. → Read More

Researchers Reveal How Smart Lightbulbs Can Be Hacked to Attack

New exploit builds on previous research involving Philips Hue Smart Bulbs. → Read More