Authors
Posts by Ken Underhill
thumbnail
Ken Underhill

Ken Underhill

AppleScript Abused to Spread Fake Zoom and Teams macOS Updates
Nov 12, 2025
Phishing Campaign Exploits Meta Business Suite to Target SMBs
Nov 12, 2025
North Korean APT Uses Remote Wipe to Target Android Users
Nov 12, 2025
Severe Ivanti Bugs Let Attackers Modify Files and Gain Access
Nov 12, 2025
Holiday Fraud Trends 2025: The Top Cyber Threats to Watch This Season
Nov 11, 2025
BeeStation RCE Zero-Day Puts Synology Devices at High Risk
Nov 11, 2025
65% of Leading AI Companies Found Leaking Secrets on GitHub
Nov 11, 2025
Critical Zoom Vulnerability Exposes Windows Users to Attacks
Nov 11, 2025
Monsta FTP Remote Code Execution Vulnerability (CVE-2025-34299) 
Nov 11, 2025
Iranian Cyber Espionage: Proofpoint Uncovers UNK_SmudgedSerpent
Nov 10, 2025
18,000 Files Stolen: Intel Faces Insider Threat Challenge
Nov 10, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.