Authors
Posts by Ken Underhill
thumbnail
Ken Underhill

Ken Underhill

GoAnywhere Zero-Day Exploited to Deliver Medusa Ransomware
Oct 7, 2025
CISA Alerts to Active Attacks on Critical Windows Vulnerability
Oct 7, 2025
Mic-E-Mouse: When Your Gaming Mouse Becomes a Microphone
Oct 7, 2025
Data Breach at Doctors Imaging Group Exposes Sensitive Patient Information
Oct 7, 2025
Discord Data Breach Exposes User IDs, Billing Info, and Photo IDs
Oct 7, 2025
Combat Over Cyber: Pentagon Rewrites Training Priorities
Oct 6, 2025
Most People Can’t Tell AI Phishing Emails from the Real Thing
Oct 6, 2025
Coordinated Exploitation Campaign Targets Grafana Vulnerability
Oct 3, 2025
Cybercriminals Impersonate FedEx, UPS, Other Brands in New Smishing Campaign
Oct 3, 2025
The UK Renews Clash with Apple Over Encrypted Data Access
Oct 3, 2025
Cybersecurity at Risk: CISA 2015 Lapses Amid Government Shutdown
Oct 2, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.