Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Storm-0249 Abuses EDR for Undetected Attacks
Endpoint & Device Security Storm-0249 Abuses EDR for Undetected Attacks

In an alarming evolution of cybercrime tactics, threat actors are now weaponizing the very security tools designed to protect enterprise networks, turning digital guardians into unwitting accomplices for stealthy infiltration. This research summary delves into the activities of the Initial Access

Google Fixes Zero-Click Flaw That Exposed Corporate Data
Infrastructure & Network Security Google Fixes Zero-Click Flaw That Exposed Corporate Data

With the rise of enterprise AI, a new class of vulnerabilities is emerging that sidesteps traditional security measures entirely. The recent ‘GeminiJack’ flaw in Google’s Gemini Enterprise is a prime example, a zero-click vulnerability that could turn a company’s own AI assistant into a tool for

Android Malware Evolution – Review
Endpoint & Device Security Android Malware Evolution – Review

The very tools designed to make smartphones accessible to everyone have been systematically repurposed by cybercriminals into a powerful arsenal for conducting financial fraud and espionage on a global scale. Android malware represents a significant advancement in cyber threats targeting the mobile

Can IBM's AI Push Revive Its Legacy Db2 Database?
Infrastructure & Network Security Can IBM's AI Push Revive Its Legacy Db2 Database?

In the world of enterprise technology, few systems carry the weight and history of IBM's Db2. For over four decades, this database has been the dependable "warhorse" for mission-critical applications, particularly in the banking sector. But in an era dominated by cloud-native architecture and

Coupang Data Breach Affects 33.7 Million Customers in Korea
Data Protection & Privacy Coupang Data Breach Affects 33.7 Million Customers in Korea

Imagine logging into your favorite online shopping platform, only to discover that your personal details—name, address, and purchase history—have been in the hands of unknown intruders for months. This chilling reality struck on November 18, when Coupang, South Korea’s e-commerce titan, revealed a

Hackers Exploit WordPress and ICTBroadcast Vulnerabilities
Malware & Threats Hackers Exploit WordPress and ICTBroadcast Vulnerabilities

The interconnected digital ecosystem is currently weathering a sophisticated, two-pronged cyber offensive, as security analysts have uncovered concurrent exploitation campaigns targeting widely used web and communication platforms with alarming speed and precision. This collection of insights from

Inotiv Hit by Ransomware: Personal Data of 9,500 Stolen
Data Protection & Privacy Inotiv Hit by Ransomware: Personal Data of 9,500 Stolen

Imagine waking up to the news that your most private details—your name, Social Security number, and even medical history—have been snatched by cybercriminals in a brazen attack. That’s the harsh reality for over 9,500 individuals linked to Inotiv, a pharmaceutical company recently targeted by a

ServiceNow Acquires Veza to Boost Security and AI Governance
Identity & Access Management ServiceNow Acquires Veza to Boost Security and AI Governance

In a digital landscape where cyber threats loom larger than ever, and artificial intelligence reshapes how enterprises operate, ServiceNow has made a game-changing announcement that’s turning heads across the tech industry. The IT service management giant has acquired Veza, a cutting-edge provider

Proton Mail’s 2025 Plan: Privacy Boost with AI and Encryption
Infrastructure & Network Security Proton Mail’s 2025 Plan: Privacy Boost with AI and Encryption

In an age where every click, email, and digital footprint is a potential goldmine for data harvesters, the need for ironclad privacy has never been more urgent, and Proton Mail is stepping up to the plate with a game-changing strategy for the current year. Born in Switzerland from the minds of CERN

How Are AI-Orchestrated Cyberattacks Changing Security?
Data Protection & Privacy How Are AI-Orchestrated Cyberattacks Changing Security?

In the rapidly evolving world of cybersecurity, few topics are as pressing as the role of artificial intelligence in both orchestrating and defending against cyber threats. Today, we’re sitting down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later