Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
AI’s Double-Edged Sword: Risk, Reward, and the Race to Adapt
Editorial AI’s Double-Edged Sword: Risk, Reward, and the Race to Adapt

The fast evolution of AI has created a catch-22 for cybersecurity teams in 2025. On the one hand, AI-powered tools help defenders to predict potential threats and accelerate their responses, while simultaneously allowing them to continuously learn and refine their protection strategies. On the

How Are Malicious npm Packages Fueling Phishing Attacks?
Infrastructure & Network Security How Are Malicious npm Packages Fueling Phishing Attacks?

As we dive into the murky waters of cybersecurity, I'm thrilled to sit down with Rupert Marais, our in-house security specialist with a deep background in endpoint and device security, cybersecurity strategies, and network management. Today, we're exploring a chilling discovery in the npm ecosystem

AI Scammers Pose as UK Family Businesses to Deceive Shoppers
Identity & Access Management AI Scammers Pose as UK Family Businesses to Deceive Shoppers

What happens when a charming online ad for a family-run British shop, promising an irresistible 80% off closing sale, turns out to be a cunning trap? Thousands of unsuspecting shoppers have discovered the bitter truth after ordering from what they believed were authentic UK boutiques, only to

How Dangerous Is the ClayRat Android Spyware Threat?
Endpoint & Device Security How Dangerous Is the ClayRat Android Spyware Threat?

What if a seemingly harmless app download could turn your smartphone into a spy’s playground? In today’s digital landscape, a stealthy Android threat known as ClayRat is making that nightmare a reality for countless users, especially in Russia, by infiltrating devices with chilling precision. This

FBI Seizes BreachForums in Salesforce Extortion Crackdown
Data Protection & Privacy FBI Seizes BreachForums in Salesforce Extortion Crackdown

In a striking move against cybercrime, federal authorities have once again targeted one of the most notorious underground forums, marking a significant chapter in the ongoing battle against digital extortion. The FBI, in collaboration with French law enforcement, has seized the latest version of

ClayRat Spyware Targets Android Users with Fake Apps
Malware & Threats ClayRat Spyware Targets Android Users with Fake Apps

Imagine downloading a popular app like WhatsApp or TikTok, only to discover that it’s a malicious trap designed to steal your personal data, spy on your activities, and spread to your contacts. This is the reality of ClayRat, a dangerous spyware campaign targeting Android users with deceptive

What Are the Biggest Cyber Threats to Watch in 2025?
Infrastructure & Network Security What Are the Biggest Cyber Threats to Watch in 2025?

As digital landscapes expand, the sophistication of cyber threats has reached unprecedented levels, with consumers across the globe losing billions of dollars to online scams and attacks this year. The rapid evolution of criminal tactics has made staying secure more challenging than ever, as

How Did Medusa Ransomware Exploit Fortra's Critical Flaw?
Endpoint & Device Security How Did Medusa Ransomware Exploit Fortra's Critical Flaw?

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with extensive expertise in endpoint and device security, cybersecurity strategies, and network management. With the recent surge in ransomware attacks targeting critical software vulnerabilities, particularly the

Beware of Modelling Scams: Spot Warning Signs and Stay Safe
Identity & Access Management Beware of Modelling Scams: Spot Warning Signs and Stay Safe

What happens when a lifelong dream of stepping into the spotlight turns into a devastating financial trap? For countless individuals across the globe, the allure of a modeling career has led to heartbreaking losses, with scammers exploiting hope and ambition through deceptive practices. Reports

How Can We Balance Data Access and Privacy in Cybercrime?
Infrastructure & Network Security How Can We Balance Data Access and Privacy in Cybercrime?

In an era where digital threats loom larger than ever, a staggering statistic reveals the urgency of the challenge: cybercrime is estimated to cost the global economy trillions annually, with attacks growing in sophistication each year. From ransomware crippling critical infrastructure to online

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later