Author

 Ranga Rajagopalan
LinkedIn
RSS
E-Mail

Profile of Ranga Rajagopalan

Chief Technology Officer, Avi Networks
Member Since: 11/4/2015
Author
News & Commentary Posts: 2
Comments: 1

Ranga is CTO and cofounder at Avi Networks and has been an architect and developer of several
high-performance distributed operating systems, as well as networking and storage data center products.
Before his current role as CTO, he was the Senior Director at Cisco's Data Center business unit,
responsible for platform software on the Nexus 7000 product line. Ranga joined Cisco through the
acquisition of Andiam , where he was one of the lead architects for the SAN-OS operating system.
Ranga began his career at SGI as an IRIX kernel engineer for the Origin series of ccNUMA servers.
He has a Master of Science degree in electrical engineering from Stanford University and a
Bachelor of Engineering in EEE from BITS, Pilani, India.

Articles by Ranga Rajagopalan
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12633
PUBLISHED: 2018-06-22
An issue was discovered in the Linux kernel through 4.17.2. vbg_misc_device_ioctl() in drivers/virt/vboxguest/vboxguest_linux.c reads the same user data twice with copy_from_user. The header part of the user data is double-fetched, and a malicious user thread can tamper with the critical variables (...
CVE-2018-12634
PUBLISHED: 2018-06-22
CirCarLife Scada v4.2.4 allows remote attackers to obtain sensitive information via a direct request for the html/log or services/system/info.html URI.
CVE-2018-12635
PUBLISHED: 2018-06-22
CirCarLife Scada v4.2.4 allows unauthorized upgrades via requests to the html/upgrade.html and services/system/firmware.upgrade URIs.
CVE-2018-12630
PUBLISHED: 2018-06-21
NEWMARK (aka New Mark) NMCMS 2.1 allows SQL Injection via the sect_id parameter to the /catalog URI.
CVE-2018-12631
PUBLISHED: 2018-06-21
Redatam7 (formerly Redatam WebServer) allows remote attackers to read arbitrary files via /redbin/rpwebutilities.exe/text?LFN=../ directory traversal.