Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
New Malware Turns Chrome Into an Undetectable Phishing Tool
Endpoint & Device Security New Malware Turns Chrome Into an Undetectable Phishing Tool

A sophisticated malware-as-a-service toolkit is being actively marketed on cybercrime forums, offering criminals a powerful weapon to transform the ubiquitous Google Chrome browser into a highly effective and nearly invisible phishing tool. This toolkit, dubbed "Stanley" by security researchers,

Harness Security AI Without Losing Control
Security Operations & Management Harness Security AI Without Losing Control

The very artificial intelligence that promises to revolutionize cyber defense is simultaneously fueling an unprecedented wave of sophisticated attacks, creating a complex paradox for security leaders navigating this new technological frontier. As organizations race to adopt AI-powered tools, they

Konni Hackers Target Blockchain Devs With AI Backdoor
Endpoint & Device Security Konni Hackers Target Blockchain Devs With AI Backdoor

The digital frontier of blockchain development has become the latest battleground for state-sponsored cyber warfare, as North Korean hackers unveil a new weapon forged in the fires of generative artificial intelligence. A sophisticated campaign attributed to the infamous Konni group is now actively

Weaponizing RMM Software – Review
Endpoint & Device Security Weaponizing RMM Software – Review

The silent infiltration of corporate networks has evolved far beyond custom-coded malware, with attackers now skillfully turning an organization's own trusted administrative tools against it. The weaponization of Remote Monitoring and Management (RMM) software represents a significant advancement

Turn Security Risks Into a Competitive Advantage
Security Operations & Management Turn Security Risks Into a Competitive Advantage

A fundamental and strategic shift is unfolding across the corporate security landscape, challenging the long-held belief that risk is something to be feared and concealed at all costs. For decades, many organizations operated under a punitive mindset where the discovery of a vulnerability was

QR Code Phishing Attacks Surge Fivefold, Report Finds
Infrastructure & Network Security QR Code Phishing Attacks Surge Fivefold, Report Finds

A comprehensive analysis by a leading cybersecurity firm has uncovered a significant and alarming trend in cybercrime, identifying a fivefold surge in phishing attacks that use malicious QR codes during the second half of 2025. The firm's threat detection systems registered a dramatic escalation in

Cisco Zero-Day Vulnerability – Review
Malware & Threats Cisco Zero-Day Vulnerability – Review

The complex web of digital communication that underpins modern enterprise operations is facing an insidious threat from within, as critical infrastructure components become prime targets for sophisticated cyber adversaries. This review explores the details of the Cisco zero-day vulnerability,

INC Ransomware Blunder Allows Stolen Data Recovery
Data Protection & Privacy INC Ransomware Blunder Allows Stolen Data Recovery

As an in-house Security Specialist at Cyber Centaurs, Rupert Marais brings a wealth of experience in cybersecurity strategy and network defense to the forefront of the fight against digital extortion. In a recent investigation that began as a routine incident response, his team’s sharp forensic

MITRE Unveils New Embedded Systems Threat Matrix
Endpoint & Device Security MITRE Unveils New Embedded Systems Threat Matrix

As modern society becomes increasingly dependent on interconnected devices, the silent, invisible computers embedded within critical infrastructure—from power grids and medical devices to autonomous vehicles and industrial robotics—have emerged as a significant and often unprotected attack surface.

LastPass Users Targeted in New Master Password Phishing Scam
Malware & Threats LastPass Users Targeted in New Master Password Phishing Scam

We're joined by our in-house security specialist, Rupert Marais, to dissect the latest phishing campaign targeting LastPass users. This attack leverages a potent mix of urgency and social engineering, a timely reminder of the persistent threats facing password manager users. We'll explore the

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later