Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Bitfinex Cryptocurrency Heist Organizer Sentenced to Five Years in Prison
Malware & Threats Bitfinex Cryptocurrency Heist Organizer Sentenced to Five Years in Prison

In a landmark case that highlights the intricate nature and high stakes of cybercrime in the digital currency era, Ilya Lichtenstein, the mastermind behind the 2016 Bitfinex exchange heist, received a five-year prison sentence from a United States court. The 35-year-old orchestrated an elaborate

Fostering Inclusivity and Diversity in Cybersecurity and IT Industries
Identity & Access Management Fostering Inclusivity and Diversity in Cybersecurity and IT Industries

The cybersecurity and IT industries have been undergoing a significant transformation in fostering an inclusive culture over the past two decades. Much of this progress is driven by a growing recognition of the importance of diversity and the role it plays in fostering innovation, creativity, and

Florida Engineer Sentenced for Spying on U.S. Telecoms for China
Infrastructure & Network Security Florida Engineer Sentenced for Spying on U.S. Telecoms for China

In a significant development highlighting the ongoing espionage concerns between the United States and China, Ping Li, a 59-year-old telecommunications engineer from Florida, has been sentenced to 48 months in prison for engaging in espionage activities on behalf of China. Along with his prison

How Are AI-Driven Tools Transforming Modern Cybercrime Tactics?
Malware & Threats How Are AI-Driven Tools Transforming Modern Cybercrime Tactics?

In recent times, the rapid advancements in artificial intelligence have brought remarkable changes in various sectors, but they have also paved the way for new challenges, especially in the realm of cybersecurity. Amid ongoing geopolitical conflicts, such as Russia's invasion of Ukraine and the

Exploitable Flaws in VPN Clients and Innovative Malware Trends
Malware & Threats Exploitable Flaws in VPN Clients and Innovative Malware Trends

The cybersecurity landscape is constantly evolving, with new threats and vulnerabilities emerging regularly. This week, significant flaws in corporate VPN clients and innovative malware delivery methods have come to light, highlighting the persistent risks and the need for adaptive security

Interpol Operation Busts Cybercrime Syndicates, Recovers $400M Globally
Malware & Threats Interpol Operation Busts Cybercrime Syndicates, Recovers $400M Globally

In a significant crackdown on cybercrime, Interpol's Operation HAECHI V has led to over 5,500 arrests and the recovery of more than $400 million in digital and fiat currencies. The operation, which ran from July to November, was financially supported by South Korea and involved 40 countries. This

Is Cybersecurity Expertise Evolving with Remote Work and Advanced Tech?
Infrastructure & Network Security Is Cybersecurity Expertise Evolving with Remote Work and Advanced Tech?

The cybersecurity landscape is undergoing significant transformations, driven by the rise of remote work and the integration of advanced technologies. As organizations adapt to these changes, the demand for specialized cybersecurity expertise has surged, reflecting the need for robust digital

How Did a Ransomware Attack Disrupt Blue Yonder's Supply Chain Services?
Infrastructure & Network Security How Did a Ransomware Attack Disrupt Blue Yonder's Supply Chain Services?

The recent ransomware attack on Blue Yonder, a supply chain management SaaS provider, had a profound impact on its managed services hosted environment, affecting many of the company's 3,000 customers spread across 76 countries. The attack, which was publicly disclosed on November 21, has severely

ENGlobal Faces Ransomware Attack, Limits IT Access for Investigation
Malware & Threats ENGlobal Faces Ransomware Attack, Limits IT Access for Investigation

In an alarming turn of events, ENGlobal, a Texas-based engineering and automation contractor for the energy sector, encountered a ransomware attack on November 25, 2024, significantly disrupting its operations. The attacker managed to encrypt the company's data files, prompting rapid action from

Can Corrupted MS Office Files Really Bypass Your Email Security?
Infrastructure & Network Security Can Corrupted MS Office Files Really Bypass Your Email Security?

Phishers have now devised an innovative and troubling method to bypass email security, utilizing corrupted Microsoft Office files that exploit the predictable behaviors of software recovery processes. This new tactic targets users with enticing messages about payments, benefits, or year-end bonuses

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later