Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Exploitable Flaws in VPN Clients and Innovative Malware Trends
Malware & Threats Exploitable Flaws in VPN Clients and Innovative Malware Trends

The cybersecurity landscape is constantly evolving, with new threats and vulnerabilities emerging regularly. This week, significant flaws in corporate VPN clients and innovative malware delivery methods have come to light, highlighting the persistent risks and the need for adaptive security

Interpol Operation Busts Cybercrime Syndicates, Recovers $400M Globally
Malware & Threats Interpol Operation Busts Cybercrime Syndicates, Recovers $400M Globally

In a significant crackdown on cybercrime, Interpol's Operation HAECHI V has led to over 5,500 arrests and the recovery of more than $400 million in digital and fiat currencies. The operation, which ran from July to November, was financially supported by South Korea and involved 40 countries. This

Is Cybersecurity Expertise Evolving with Remote Work and Advanced Tech?
Infrastructure & Network Security Is Cybersecurity Expertise Evolving with Remote Work and Advanced Tech?

The cybersecurity landscape is undergoing significant transformations, driven by the rise of remote work and the integration of advanced technologies. As organizations adapt to these changes, the demand for specialized cybersecurity expertise has surged, reflecting the need for robust digital

How Did a Ransomware Attack Disrupt Blue Yonder's Supply Chain Services?
Infrastructure & Network Security How Did a Ransomware Attack Disrupt Blue Yonder's Supply Chain Services?

The recent ransomware attack on Blue Yonder, a supply chain management SaaS provider, had a profound impact on its managed services hosted environment, affecting many of the company's 3,000 customers spread across 76 countries. The attack, which was publicly disclosed on November 21, has severely

ENGlobal Faces Ransomware Attack, Limits IT Access for Investigation
Malware & Threats ENGlobal Faces Ransomware Attack, Limits IT Access for Investigation

In an alarming turn of events, ENGlobal, a Texas-based engineering and automation contractor for the energy sector, encountered a ransomware attack on November 25, 2024, significantly disrupting its operations. The attacker managed to encrypt the company's data files, prompting rapid action from

Can Corrupted MS Office Files Really Bypass Your Email Security?
Infrastructure & Network Security Can Corrupted MS Office Files Really Bypass Your Email Security?

Phishers have now devised an innovative and troubling method to bypass email security, utilizing corrupted Microsoft Office files that exploit the predictable behaviors of software recovery processes. This new tactic targets users with enticing messages about payments, benefits, or year-end bonuses

Veracode Enhances Secure Software Development with AI and Risk Management
Infrastructure & Network Security Veracode Enhances Secure Software Development with AI and Risk Management

Veracode is pioneering advancements in secure software development, aiming to assist developers in crafting secure-by-design software and enabling security teams to mitigate risks throughout their code-to-cloud ecosystem. This analysis will delve into the latest enhancements Veracode has

Streamlining Endpoint Management: Embracing Automation for Better Security
Malware & Threats Streamlining Endpoint Management: Embracing Automation for Better Security

In today's fast-paced digital landscape, the task of managing endpoints has become increasingly complex due to the rapid proliferation of devices and constant software updates. Traditional, manual management methods are struggling to keep up with the required speed and scale, which in turn leaves

Blue Yonder Ransomware Attack Exposes Supply Chain Vulnerabilities
Malware & Threats Blue Yonder Ransomware Attack Exposes Supply Chain Vulnerabilities

On November 21, Blue Yonder, a US-based supply chain SaaS vendor, found itself grappling with a severe ransomware attack that brought significant service disruptions to its managed services environment. Despite the concerted efforts of both internal teams and external cybersecurity firms to restore

How Are Chinese Threat Groups Evolving Cyber Espionage Tactics?
Malware & Threats How Are Chinese Threat Groups Evolving Cyber Espionage Tactics?

The landscape of cyber espionage is continuously evolving, with state-sponsored threat groups refining their techniques to stay ahead of defensive measures. Among the most sophisticated and persistent actors are Chinese threat groups such as Volt Typhoon, APT31, and APT41/Winnti. Over the past five

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later