Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Sysadmin Fixes Hospital CT Scanner with Simple Cable Hack
Infrastructure & Network Security Sysadmin Fixes Hospital CT Scanner with Simple Cable Hack

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with a wealth of expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we’re diving into a fascinating story from the field of IT problem-solving in a hospital setting. Rupert

Fortinet Software Faces Critical Cybersecurity Threat
Malware & Threats Fortinet Software Faces Critical Cybersecurity Threat

What happens when a guardian of digital safety becomes the target of a ruthless attack? Picture a fortress, built to protect countless organizations, suddenly revealing a hidden crack that invaders are already exploiting. This is the reality for Fortinet, a leading name in network security, now

How Are Cybercriminals Exploiting Cheap Access Markets?
Identity & Access Management How Are Cybercriminals Exploiting Cheap Access Markets?

Introduction to a Growing Threat Imagine a marketplace where breaking into a corporate network costs less than a high-end smartphone, a chilling reality that exists on the dark web where initial access brokers (IABs) sell entry points to compromised systems at alarmingly low prices. These

Predator Jailed for Defrauding Vulnerable Women of Thousands
Identity & Access Management Predator Jailed for Defrauding Vulnerable Women of Thousands

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we’re diving into a chilling case of fraud and emotional manipulation perpetrated by a man who preyed on

Charon Ransomware Tactics – Review
Malware & Threats Charon Ransomware Tactics – Review

Imagine a stealthy intruder slipping past the most advanced security systems, targeting critical industries with surgical precision, and leaving behind a trail of encrypted data and operational chaos. This is the reality of Charon ransomware, a newly emerged cyber threat that has redefined the

Is Pennsylvania's Attorney General Office Under Cyber Attack?
Security Operations & Management Is Pennsylvania's Attorney General Office Under Cyber Attack?

In the heart of Pennsylvania, a silent crisis has erupted, leaving a critical government agency in disarray, and raising urgent questions about the vulnerability of public institutions. Imagine a state’s top legal office—responsible for safeguarding citizens’ rights and coordinating law

How Can Linux Webcams Become Persistent Cyber Threats?
Endpoint & Device Security How Can Linux Webcams Become Persistent Cyber Threats?

Imagine a seemingly harmless webcam perched on your desk, silently recording your every move, only to transform into a relentless cyber weapon capable of reinfecting your system no matter how many times you wipe it clean. This chilling scenario became a focal point at this year's DEF CON hacker

How Did Connex Credit Union Breach Affect 172,000 People?
Infrastructure & Network Security How Did Connex Credit Union Breach Affect 172,000 People?

In a startling revelation that has sent shockwaves through the financial sector, a major cyber-attack on Connex Credit Union, one of Connecticut’s largest credit unions, has compromised the personal and financial data of 172,000 individuals. This incident, detected earlier this year, exposed a

CyberArk HashiCorp Vault Flaws – Review
Identity & Access Management CyberArk HashiCorp Vault Flaws – Review

Setting the Stage for Vault Security Concerns Imagine a scenario where the digital fortresses safeguarding an enterprise's most sensitive secrets—passwords, tokens, and encryption keys—are breached without a single credential being stolen, revealing a chilling vulnerability in systems trusted by

Free Wi-Fi Exposes Smart Buses to Remote Hacking Risks
Endpoint & Device Security Free Wi-Fi Exposes Smart Buses to Remote Hacking Risks

Welcome to an eye-opening conversation with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we’re diving into the alarming vulnerabilities in connected transportation systems, particularly

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later