Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Is Shadow DNS Secretly Hijacking Your Router?
Malware & Threats Is Shadow DNS Secretly Hijacking Your Router?

A sophisticated and long-running cyber campaign has been quietly exploiting vulnerabilities in home and business routers, creating a "shadow" network that intercepts internet traffic for financial gain. This operation, active since mid-2022, leverages compromised routers to reroute user DNS queries

Enabling Passkeys on Devices Without a Screen
Identity & Access Management Enabling Passkeys on Devices Without a Screen

The rapid expansion of connected technology has introduced a new class of devices, from immersive extended reality (XR) headsets to smart home hubs and industrial sensors, that often lack a traditional screen. This evolution presents a significant challenge to modern security practices,

This Hidden Setting Is a Major Windows Security Risk
Infrastructure & Network Security This Hidden Setting Is a Major Windows Security Risk

The modern digital experience is built upon a constant, silent exchange of information, where your operating system quietly communicates with its developers to report on performance, errors, and user habits. While this flow of data, known as telemetry, can be instrumental for developers in patching

AI Is Now the Cybercriminal's Most Powerful Tool
Infrastructure & Network Security AI Is Now the Cybercriminal's Most Powerful Tool

The digital shadows where cybercriminals operate are now being illuminated by the glow of artificial intelligence, transforming once-complex attacks into routine operations and dramatically reshaping the global security landscape. This analysis examines how AI, while not yet capable of executing

Opsera Tackles AI's Coding Bottleneck With Agents
Security Operations & Management Opsera Tackles AI's Coding Bottleneck With Agents

The rapid adoption of artificial intelligence in software development has introduced a significant paradox, creating a scenario where the very tools designed to accelerate coding are inadvertently causing substantial delays and quality control issues downstream. While developers leveraging AI can

How Can The Elite Secure Their Digital Fortunes?
Infrastructure & Network Security How Can The Elite Secure Their Digital Fortunes?

As immense fortunes become increasingly digitized, the world's wealthiest individuals find themselves in the crosshairs of a new and sophisticated breed of predator operating in the borderless realm of cyberspace. The days of generic, scattergun cyberattacks are long gone; today, high-net-worth

Russian Hackers Target Ukraine With New Office Zero-Day
Infrastructure & Network Security Russian Hackers Target Ukraine With New Office Zero-Day

The digital battlefield has once again intensified as a notorious state-sponsored hacking group demonstrated alarming agility by turning a newly disclosed software flaw into a weapon against high-value government targets in less than twenty-four hours. This rapid exploitation marks a significant

Trend Analysis: AI Platform Malware Hosting
Endpoint & Device Security Trend Analysis: AI Platform Malware Hosting

The very platforms designed to accelerate human innovation and collaborative development are now being systematically corrupted into arsenals for cybercriminals, creating an insidious new threat landscape. This article explores an alarming trend where threat actors are weaponizing trusted AI

Is VS Code's Trust Feature a Hacker's Gateway?
Security Operations & Management Is VS Code's Trust Feature a Hacker's Gateway?

The seemingly innocuous dialogue box asking a developer to 'trust' a project's author has been transformed by sophisticated threat actors into a critical chokepoint for infiltrating secure development environments, turning a protective measure into the first step of a complex compromise. A recent

Is Russia's Cyberwar Targeting Polish Infrastructure?
Infrastructure & Network Security Is Russia's Cyberwar Targeting Polish Infrastructure?

In the world of cybersecurity, some of the most alarming threats are those aimed at the very systems that power our daily lives. I'm Kendra Haines, and today we're speaking with Rupert Marais, our in-house security specialist, to dissect a recent, sophisticated campaign against Poland's energy

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later