Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Iranian Hackers Exploit SSL.com Certificates for Malware
Identity & Access Management Iranian Hackers Exploit SSL.com Certificates for Malware

In a disturbing turn of events that has sent ripples through the cybersecurity community, Iranian state-sponsored hackers, identified as UNC1549, have been uncovered using digital certificates from SSL.com, a Houston-based certificate authority, to sign malicious software with alarming success.

How Did SIMCARTEL Operation Dismantle a Cyber Fraud Network?
Security Operations & Management How Did SIMCARTEL Operation Dismantle a Cyber Fraud Network?

In a world where a single click can drain a bank account or enable unspeakable crimes, a staggering statistic emerges: one criminal network orchestrated over 3,200 fraud cases across just two European countries, costing victims millions of euros. This shadowy empire, hidden behind layers of

How Did SonicWall's Data Breach Expose Critical Network Data?
Malware & Threats How Did SonicWall's Data Breach Expose Critical Network Data?

In a chilling reminder of the fragility of digital security, a major cybersecurity provider, SonicWall, has fallen victim to a significant data breach that jeopardized the network integrity of countless organizations worldwide. This incident, affecting the company’s MySonicWall cloud backup

Chaos Ransomware Evolves with Speed and C++ Sophistication
Malware & Threats Chaos Ransomware Evolves with Speed and C++ Sophistication

In the constantly shifting arena of cybersecurity threats, ransomware continues to stand out as a particularly insidious challenge, and the latest iteration of Chaos ransomware has elevated this danger to unprecedented levels with a dramatic overhaul. This notorious malware has transitioned into a

Fax Virus Hoax Sparks Reply-All Fiasco and Job Loss
Infrastructure & Network Security Fax Virus Hoax Sparks Reply-All Fiasco and Job Loss

As we delve into the quirky and sometimes chaotic world of late '90s tech, I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. With years of experience navigating the

How Can AI Transform Your DevSecOps Pipeline?
Security Operations & Management How Can AI Transform Your DevSecOps Pipeline?

In the relentless race of software development, balancing speed with robust security remains a daunting challenge for many organizations, as teams are under constant pressure to deliver innovative solutions quickly. Yet, the specter of vulnerabilities looms large, threatening to derail projects and

OneSpan Leads Authentication Innovation at FIDO 2025
Identity & Access Management OneSpan Leads Authentication Innovation at FIDO 2025

In an age where digital threats loom larger than ever, with cyberattacks becoming increasingly sophisticated, OneSpan emerges as a beacon of innovation at Authenticate 2025, held from October 13 to 15 in Carlsbad, California. As a globally recognized leader in authentication and identity

What Are the Biggest Cyber Threats Facing Us in 2025?
Endpoint & Device Security What Are the Biggest Cyber Threats Facing Us in 2025?

In a world where digital connectivity underpins nearly every aspect of daily life, the cyber threat landscape has grown alarmingly complex and dangerous, with risks ranging from state-sponsored disinformation campaigns to billion-dollar cryptocurrency heists. The variety of threats facing

2025 ICS Cybersecurity Conference to Bolster OT Defenses
Endpoint & Device Security 2025 ICS Cybersecurity Conference to Bolster OT Defenses

In an era where cyber threats to critical infrastructure are escalating at an alarming rate, industrial control systems (ICS) face unprecedented risks, with a reported 34% increase in attacks on operational technology (OT) environments over the past year, making it imperative to address these

AI’s Double-Edged Sword: Risk, Reward, and the Race to Adapt
Editorial AI’s Double-Edged Sword: Risk, Reward, and the Race to Adapt

The fast evolution of AI has created a catch-22 for cybersecurity teams in 2025. On the one hand, AI-powered tools help defenders to predict potential threats and accelerate their responses, while simultaneously allowing them to continuously learn and refine their protection strategies. On the

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later