Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
How Can Linux Webcams Become Persistent Cyber Threats?
Endpoint & Device Security How Can Linux Webcams Become Persistent Cyber Threats?

Imagine a seemingly harmless webcam perched on your desk, silently recording your every move, only to transform into a relentless cyber weapon capable of reinfecting your system no matter how many times you wipe it clean. This chilling scenario became a focal point at this year's DEF CON hacker

How Did Connex Credit Union Breach Affect 172,000 People?
Infrastructure & Network Security How Did Connex Credit Union Breach Affect 172,000 People?

In a startling revelation that has sent shockwaves through the financial sector, a major cyber-attack on Connex Credit Union, one of Connecticut’s largest credit unions, has compromised the personal and financial data of 172,000 individuals. This incident, detected earlier this year, exposed a

CyberArk HashiCorp Vault Flaws – Review
Identity & Access Management CyberArk HashiCorp Vault Flaws – Review

Setting the Stage for Vault Security Concerns Imagine a scenario where the digital fortresses safeguarding an enterprise's most sensitive secrets—passwords, tokens, and encryption keys—are breached without a single credential being stolen, revealing a chilling vulnerability in systems trusted by

Free Wi-Fi Exposes Smart Buses to Remote Hacking Risks
Endpoint & Device Security Free Wi-Fi Exposes Smart Buses to Remote Hacking Risks

Welcome to an eye-opening conversation with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we’re diving into the alarming vulnerabilities in connected transportation systems, particularly

How Does Black Hat's NOC Unite Rivals for Cybersecurity?
Infrastructure & Network Security How Does Black Hat's NOC Unite Rivals for Cybersecurity?

What happens when thousands of the world’s most brilliant cybersecurity experts, notorious hackers, and industry giants converge in a single Las Vegas venue, all connected by one vulnerable network? At the Black Hat security conference, an unseen battle unfolds in a modest room where the Network

How Does SocGholish Malware Fuel Cybercrime Networks?
Malware & Threats How Does SocGholish Malware Fuel Cybercrime Networks?

Setting the Stage: The Alarming Scale of Cybercrime Facilitation In the shadowy depths of the digital world, a staggering statistic emerges: cybercrime is projected to cost global economies $10.5 trillion annually by the end of this year, according to industry estimates. At the heart of this

VexTrio Viper Fraud Apps – Review
Endpoint & Device Security VexTrio Viper Fraud Apps – Review

Imagine downloading a seemingly harmless VPN or spam blocker app from a trusted platform like Google Play, only to discover that it’s draining your bank account with hidden subscriptions and stealing your personal data. This scenario is not a distant fear but a stark reality for millions of users

Trend Micro Confirms Active Exploitation of Apex One Flaws
Malware & Threats Trend Micro Confirms Active Exploitation of Apex One Flaws

We're thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we’re diving into a critical topic: the recently discovered security flaws in Trend Micro Apex One, a widely

TSMC Sues Employees Over Trade Secret Theft Concerns
Security Operations & Management TSMC Sues Employees Over Trade Secret Theft Concerns

Imagine a world where the backbone of modern technology—semiconductors—becomes a battleground for betrayal, with billions of dollars in innovation hanging in the balance, and the global leader, Taiwan Semiconductor Manufacturing Co (TSMC), finds itself at the center of a crisis. Recently, TSMC

Pro-Iran Hackers Merge Cyber and Kinetic Warfare Tactics
Infrastructure & Network Security Pro-Iran Hackers Merge Cyber and Kinetic Warfare Tactics

What happens when a 12-day clash between nations ignites not just with missiles and gunfire, but with a parallel storm of digital destruction that reshapes the very concept of conflict? During a heated conflict between Iran and Israel earlier this summer, pro-Iran hacking groups unleashed a wave of

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later