Authors
Posts by Ken Underhill
thumbnail Ken Underhill

Ken Underhill

Inside North Korea’s DeceptiveDevelopment Job Fraud, Malware Scheme
Sep 29, 2025
Dynamic DNS Abuse Helps Threat Actors Evade Detection and Persist
Sep 29, 2025
Millions at Risk From Notepad++ DLL Hijacking Vulnerability
Sep 29, 2025
Security Fundamentals at Home: Small Habits, Big Cyber Protection
Sep 29, 2025
CISA Orders Urgent Patching of Cisco Firewall Zero-Day Vulnerabilities
Sep 26, 2025
Phishing Campaign Targets PyPI Maintainers with Fake Login Site
Sep 26, 2025
Vietnamese Hackers Exploit Fake Copyright Notices to Spread ‘Lone None’ Stealer
Sep 26, 2025
Google Warns of BRICKSTORM Malware Driving Supply Chain Intrusions
Sep 25, 2025
Critical Cisco IOS/IOS XE Vulnerability Could Expose Networks
Sep 25, 2025
ShadowV2 and AWS: The Rise of Cloud-Native DDoS-for-Hire Attacks
Sep 25, 2025
Ransomware Attack Cripples Major European Airports
Sep 24, 2025
Stellantis Hack Exposes 18M Records
Sep 24, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.