Authors
Posts by Ken Underhill
thumbnail
Ken Underhill

Ken Underhill

When AI Agents Go Rogue: Inside the Agent Session Smuggling Attack
Nov 3, 2025
Progress Fixes High-Severity MOVEit Transfer Vulnerability
Nov 3, 2025
AzureHound Tool Weaponized to Map Azure and Entra ID Environments
Nov 3, 2025
AdaptixC2: When Open-Source Tools Become Weapons
Oct 31, 2025
UNC6384 Exploits Zero-Day to Target European Diplomats
Oct 31, 2025
New Exploit Can Crash Chromium Browsers Worldwide
Oct 31, 2025
Hidden npm Malware Exposes New Supply Chain Weakness
Oct 30, 2025
Canada Warns of Cyberattacks Targeting Industrial Control Systems
Oct 30, 2025
Public Exploit Code Released for Critical BIND 9 DNS Vulnerability
Oct 30, 2025
Russian-Linked Cyberattacks Continue to Target Ukrainian Organizations
Oct 30, 2025
When Windows Helpers Turn Hostile: DLL Hijacks Return
Oct 29, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.