Authors
Posts by Ken Underhill
thumbnail
Ken Underhill

Ken Underhill

Man Sentenced After Running Fake Airport and In-Flight Wi-Fi Networks
Dec 1, 2025
Shai-hulud 2.0 Turns npm Installs Into a Full Cloud Compromise Path
Dec 1, 2025
The Hidden Calendar Threat Putting 4 Million Apple Devices at Risk
Dec 1, 2025
Coupang Breach Exposes Data of Nearly 34 Million Customers
Dec 1, 2025
Xillen Stealer Evolves With AI-Like Evasion and Broader Targeting
Nov 26, 2025
French Football Federation Hit by Breach via Compromised Admin Account
Nov 25, 2025
Critical vLLM Flaw Puts AI Systems at Risk of Remote Code Execution
Nov 25, 2025
HashiCorp Vault Bug Allows Attackers to Log In Without Credentials
Nov 25, 2025
Fluent Bit Flaws Open the Door to Log Hijacking and Cloud Takeover
Nov 25, 2025
Rare APT Collaboration Emerges Between Russia and North Korea 
Nov 25, 2025
Delta Dental of Virginia Breach Exposes Data of 145,000 Customers
Nov 25, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.