Authors
Posts by Ken Underhill
thumbnail Ken Underhill

Ken Underhill

Cybercriminals Impersonate FedEx, UPS, Other Brands in New Smishing Campaign
Oct 3, 2025
The UK Renews Clash with Apple Over Encrypted Data Access
Oct 3, 2025
Cybersecurity at Risk: CISA 2015 Lapses Amid Government Shutdown
Oct 2, 2025
Silent Smishing: Abuse of Cellular Router APIs in Phishing Campaigns
Oct 2, 2025
How to Create an Incident Response Plan (+ Free Template)
Oct 2, 2025
WireTap Exploit Breaks Intel SGX Security on DDR4 Hardware
Oct 2, 2025
Fake Google Careers Recruiters Target Gmail Users in Phishing Scam
Oct 1, 2025
Red Hat OpenShift AI Flaw Opens Door to Full Infrastructure Takeover
Oct 1, 2025
World’s Largest Crypto Seizure Nets £5.5 Billion in Bitcoin
Oct 1, 2025
Tile’s Privacy Failures Leave Trackers Wide Open to Stalking
Sep 30, 2025
Tesla Patches TCU Bug Allowing Root Access Through USB Port
Sep 30, 2025
When ‘Oprah’ Smished Me: Smishing and AI-Driven Phishing Risks
Sep 30, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.