At Black Hat 2025, a former New York Times reporter warned that AI-driven cyber threats are accelerating and that only courage can guide the response.| eSecurity Planet
Malware is any unexpected software on a device & can come in many forms. Discover how to defend against each type now.| eSecurity Planet
Learn about data security compliance and how it safeguards your organization's data. Discover key laws, standards, and best practices.| eSecurity Planet
Hackers leaked 3.9 billion stolen passwords, exposing data from 4.3 million infected devices — a stark reminder to strengthen cybersecurity.| eSecurity Planet
Cyber extortion group World Leaks released more than 1.3TB of internal Dell data, including scripts and backups. Dell insists no sensitive customer information was exposed.| eSecurity Planet
Cybersecurity software protects systems from threats like malware, viruses, and unauthorized access. Discover the essential cybersecurity software here.| eSecurity Planet
U.S. cities warn motorists about phishing scams posing as unpaid parking fines. Learn how to spot fake texts and protect your data.| eSecurity Planet
Mobile users are falling victim to “mishing” attacks. Read about mishing, how it affects security, and what businesses can do to prevent it.| eSecurity Planet
Explore the best AI deepfake detection tools to spot fake videos, images, and audio. Compare real-time analysis, accuracy, and features for your needs.| eSecurity Planet
PayPal warns of a new AI-powered scam tricking users into calling fake support lines. Learn how to protect yourself.| eSecurity Planet
Cyberattacks are surging in 2025. Experts warn businesses and consumers to brace for a more dangerous digital landscape.| eSecurity Planet
SQL injection is a code injection technique that can expose your data. Learn 5 proven tactics to prevent attacks and secure your applications.| eSecurity Planet
Job scams are on the rise, targeting remote workers and new grads. Learn how to spot red flags, protect your info, and avoid falling victim.| eSecurity Planet
ToddyCat hackers exploit ESET flaw (CVE-2024-11859) to deploy stealthy TCESB malware using DLL hijacking and a vulnerable Dell driver.| eSecurity Planet
Discover top RSA Conference 2025 highlights, from AI-powered security tools to identity protection, red teaming, mobile threats, and more.| eSecurity Planet
Oracle Cloud breach exposed 6M records from 140k+ tenants. Learn how attackers exploited vulnerabilities and how to secure data.| eSecurity Planet
IT executive updating AI systems using green screen laptop, writing intricate binary code scripts. Technical support consultant using programming to upgrade artificial intelligence simulation model As AI tools boom in popularity, cyberthieves are exploiting the| eSecurity Planet
NVIDIA explores how agentic AI is transforming cybersecurity with real-time response, smarter automation, and new safeguards for secure deployment.| eSecurity Planet
Ransomware is a type of malware that restricts access to an infected computer system until a ransom is paid to unlock it.| eSecurity Planet
Ransomware can cost companies millions. Why not take these necessary steps to protect your company the best you can?| eSecurity Planet
Multi-factor Authentication identifies end users with a password and form of id. Discover the benefits of MFA now.| eSecurity Planet
Pro-Iranian hacktivists targeted Trump’s Truth Social after U.S. airstrikes, underscoring the growing cyber threat as Middle East tensions escalate.| eSecurity Planet
Deepfake scams cost over $200 million in three months. Learn how these AI threats are evolving—and how individuals and organizations can fight back.| eSecurity Planet
Aflac confirms a cyberattack exposed sensitive customer data, citing social engineering tactics amid a wave of breaches targeting US insurers.| eSecurity Planet
Clicking “unsubscribe” on suspicious emails may do more harm than good—experts warn these links can lead to phishing, malware, or even identity theft.| eSecurity Planet
Over 269,000 websites have been compromised in a massive malware campaign using the obfuscated JSFireTruck script to stealthily redirect users to malicious sites.| eSecurity Planet
A cyberattack on UNFI, the main supplier for Whole Foods, has disrupted deliveries, causing empty shelves and operational delays across grocery stores.| eSecurity Planet
Are VPNs safe? Admittedly, there are security risks associated with VPNs. Learn about risks and best practices now.| eSecurity Planet
Data loss prevention (DLP) safeguards sensitive data, ensuring compliance and mitigating breach risks. Learn how to protect your data now.| eSecurity Planet
The MITRE ATT&CK evaluations are the most rigorous testing a cybersecurity product can face. We analyze the latest endpoint security results.| eSecurity Planet
Threat intelligence platforms help analyze and share cyber threat data. Discover top TIPs , their features, use cases, and comparisons.| eSecurity Planet
This is a complete guide to phishing attacks & the different types of phishing. Learn the definition, common examples & more with our guide.| eSecurity Planet
Hacker leaks data of 270K Samsung customers after years-old credentials go unchecked. Experts warn of phishing, fraud, and major privacy risks.| eSecurity Planet
Tax season brings a rise in phishing scams. Learn how to spot red flags, protect your personal info, and avoid falling victim to cybercriminals.| eSecurity Planet
A sophisticated cybercrime service known as "Lucid" is exploiting vulnerabilities in Apple’s iMessage and Android’s Rich Communication Services (RCS), allowing cyberthieves to conduct large-scale phishing attacks with alarming success. Operated by Chinese-speaking threat actors, this| eSecurity Planet
Microsoft's new agentic security solutions, paired with five partner innovations, are here to revolutionize cyber defense with AI-first precision.| eSecurity Planet
CISA and the FBI warn about Medusa ransomware, urging organizations to update security, enable MFA, and report incidents to mitigate the growing threat.| eSecurity Planet