Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
How Can The Elite Secure Their Digital Fortunes?
Infrastructure & Network Security How Can The Elite Secure Their Digital Fortunes?

As immense fortunes become increasingly digitized, the world's wealthiest individuals find themselves in the crosshairs of a new and sophisticated breed of predator operating in the borderless realm of cyberspace. The days of generic, scattergun cyberattacks are long gone; today, high-net-worth

Russian Hackers Target Ukraine With New Office Zero-Day
Infrastructure & Network Security Russian Hackers Target Ukraine With New Office Zero-Day

The digital battlefield has once again intensified as a notorious state-sponsored hacking group demonstrated alarming agility by turning a newly disclosed software flaw into a weapon against high-value government targets in less than twenty-four hours. This rapid exploitation marks a significant

Trend Analysis: AI Platform Malware Hosting
Endpoint & Device Security Trend Analysis: AI Platform Malware Hosting

The very platforms designed to accelerate human innovation and collaborative development are now being systematically corrupted into arsenals for cybercriminals, creating an insidious new threat landscape. This article explores an alarming trend where threat actors are weaponizing trusted AI

Is VS Code's Trust Feature a Hacker's Gateway?
Security Operations & Management Is VS Code's Trust Feature a Hacker's Gateway?

The seemingly innocuous dialogue box asking a developer to 'trust' a project's author has been transformed by sophisticated threat actors into a critical chokepoint for infiltrating secure development environments, turning a protective measure into the first step of a complex compromise. A recent

Is Russia's Cyberwar Targeting Polish Infrastructure?
Infrastructure & Network Security Is Russia's Cyberwar Targeting Polish Infrastructure?

In the world of cybersecurity, some of the most alarming threats are those aimed at the very systems that power our daily lives. I'm Kendra Haines, and today we're speaking with Rupert Marais, our in-house security specialist, to dissect a recent, sophisticated campaign against Poland's energy

Is Your Ivanti EPMM Safe From New Zero-Day Attacks?
Malware & Threats Is Your Ivanti EPMM Safe From New Zero-Day Attacks?

In a significant alert for cybersecurity professionals, Ivanti has disclosed two critical zero-day vulnerabilities within its Endpoint Manager Mobile (EPMM) solution that are being actively exploited in the wild, compelling an urgent response from organizations that rely on the platform. The

Cyberattack Surge Makes Latin America the Riskiest Region
Security Operations & Management Cyberattack Surge Makes Latin America the Riskiest Region

A relentless wave of digital threats has officially positioned Latin America as the world's most targeted region for cyberattacks, a concerning distinction that underscores the area's growing vulnerabilities in an increasingly connected global economy. Organizations across the continent are now

What Is the Key to Active Directory Resilience?
Infrastructure & Network Security What Is the Key to Active Directory Resilience?

The compromise of a single identity system can unravel an entire enterprise's security fabric, a reality that cybercriminals are increasingly exploiting by targeting the foundational core of modern IT infrastructures. Active Directory (AD) serves as the central nervous system for countless

Fortinet Confirms New Zero-Day Behind Malicious SSO Logins
Identity & Access Management Fortinet Confirms New Zero-Day Behind Malicious SSO Logins

Today, we're joined by Rupert Marais, our in-house security specialist with deep expertise in endpoint security and network management. We're diving into the recent Fortinet zero-day vulnerability, CVE-2026-24858, a critical issue that sent ripples through the security community. Our conversation

New Malware Turns Chrome Into an Undetectable Phishing Tool
Endpoint & Device Security New Malware Turns Chrome Into an Undetectable Phishing Tool

A sophisticated malware-as-a-service toolkit is being actively marketed on cybercrime forums, offering criminals a powerful weapon to transform the ubiquitous Google Chrome browser into a highly effective and nearly invisible phishing tool. This toolkit, dubbed "Stanley" by security researchers,

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later