Authors
Posts by Ken Underhill
thumbnail
Ken Underhill

Ken Underhill

$5M Microsoft Activation Key Fraud Ends in Prison Term
Mar 3, 2026
Identity Security Blind Spots Fuel Modern Attacks
Mar 3, 2026
The Dark Side of Luxury Brands: Fraud and Laundering
Mar 2, 2026
Operator of AI Fake ID Platform Pleads Guilty
Mar 2, 2026
Europol Operation Targets Online Network Exploiting Minors
Mar 2, 2026
South Korean Tax Agency Leak Leads to $4.8M Crypto Theft
Mar 2, 2026
Chrome Extension Hijacked to Push ClickFix Malware
Mar 2, 2026
BYOVD Turns Trusted Drivers Against Windows Security
Mar 2, 2026
FreeBSD Jail Escape Flaw Breaks Filesystem Isolation
Feb 27, 2026
Juniper PTX Flaw Could Allow Full Router Takeover
Feb 27, 2026
Trend Micro Patches Critical Apex One RCE Flaws
Feb 27, 2026
Cisco SD-WAN Zero-Day Actively Exploited to Gain Root Access
Feb 26, 2026
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.