At Black Hat 2025, a former New York Times reporter warned that AI-driven cyber threats are accelerating and that only courage can guide the response.| eSecurity Planet
Malware is any unexpected software on a device & can come in many forms. Discover how to defend against each type now.| eSecurity Planet
Learn about data security compliance and how it safeguards your organization's data. Discover key laws, standards, and best practices.| eSecurity Planet
Hackers leaked 3.9 billion stolen passwords, exposing data from 4.3 million infected devices — a stark reminder to strengthen cybersecurity.| eSecurity Planet
Cyber extortion group World Leaks released more than 1.3TB of internal Dell data, including scripts and backups. Dell insists no sensitive customer information was exposed.| eSecurity Planet
Cybersecurity software protects systems from threats like malware, viruses, and unauthorized access. Discover the essential cybersecurity software here.| eSecurity Planet
U.S. cities warn motorists about phishing scams posing as unpaid parking fines. Learn how to spot fake texts and protect your data.| eSecurity Planet
Mobile users are falling victim to “mishing” attacks. Read about mishing, how it affects security, and what businesses can do to prevent it.| eSecurity Planet
Explore the best AI deepfake detection tools to spot fake videos, images, and audio. Compare real-time analysis, accuracy, and features for your needs.| eSecurity Planet
PayPal warns of a new AI-powered scam tricking users into calling fake support lines. Learn how to protect yourself.| eSecurity Planet
Cyberattacks are surging in 2025. Experts warn businesses and consumers to brace for a more dangerous digital landscape.| eSecurity Planet
Pro-Iranian hacktivists targeted Trump’s Truth Social after U.S. airstrikes, underscoring the growing cyber threat as Middle East tensions escalate.| eSecurity Planet
Deepfake scams cost over $200 million in three months. Learn how these AI threats are evolving—and how individuals and organizations can fight back.| eSecurity Planet
Aflac confirms a cyberattack exposed sensitive customer data, citing social engineering tactics amid a wave of breaches targeting US insurers.| eSecurity Planet
Clicking “unsubscribe” on suspicious emails may do more harm than good—experts warn these links can lead to phishing, malware, or even identity theft.| eSecurity Planet
Over 269,000 websites have been compromised in a massive malware campaign using the obfuscated JSFireTruck script to stealthily redirect users to malicious sites.| eSecurity Planet
Threat intelligence platforms help analyze and share cyber threat data. Discover top TIPs , their features, use cases, and comparisons.| eSecurity Planet
This is a complete guide to phishing attacks & the different types of phishing. Learn the definition, common examples & more with our guide.| eSecurity Planet
Hacker leaks data of 270K Samsung customers after years-old credentials go unchecked. Experts warn of phishing, fraud, and major privacy risks.| eSecurity Planet
Tax season brings a rise in phishing scams. Learn how to spot red flags, protect your personal info, and avoid falling victim to cybercriminals.| eSecurity Planet
A sophisticated cybercrime service known as "Lucid" is exploiting vulnerabilities in Apple’s iMessage and Android’s Rich Communication Services (RCS), allowing cyberthieves to conduct large-scale phishing attacks with alarming success. Operated by Chinese-speaking threat actors, this| eSecurity Planet
Microsoft's new agentic security solutions, paired with five partner innovations, are here to revolutionize cyber defense with AI-first precision.| eSecurity Planet
CISA and the FBI warn about Medusa ransomware, urging organizations to update security, enable MFA, and report incidents to mitigate the growing threat.| eSecurity Planet