Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Rise in Infostealers via Phishing Sparks Cybersecurity Concerns
Cyber Security
Rise in Infostealers via Phishing Sparks Cybersecurity Concerns

The alarming spike in infostealer malware delivered through phishing emails has heightened cybersecurity concerns. In 2024, there was an 84% increase in the weekly delivery volume of these infostealers compared to the previous year. More strikingly, early readings from 2025 show an astounding 180% surge in comparison to 2023. This upward trend not only marks a significant uptick in malicious

Read More
How Are Cybercriminals Using AI to Evade Detection?
Cyber Security
How Are Cybercriminals Using AI to Evade Detection?

The integration of artificial intelligence (AI) into the arsenal of cybercriminals has significantly increased the sophistication and success rate of cyber-attacks, posing a formidable challenge to traditional detection methods. As the technology landscape rapidly evolves, so do the tactics of malicious actors who blend AI with social engineering to exploit vulnerabilities in cybersecurity defenses. These developments have rendered conventional security

Read More
How Can Businesses Protect Against Exchange and SharePoint Hacks?
Cyber Security
How Can Businesses Protect Against Exchange and SharePoint Hacks?

The cybersecurity landscape continues to evolve, presenting numerous challenges for businesses, particularly those relying on Microsoft’s on-premises Exchange and SharePoint servers. These platforms are prime targets due to the valuable and sensitive information they house. Cybercriminals have intensified their efforts, employing more advanced techniques to breach these servers. Understanding and mitigating these threats is critical for safeguarding enterprise data and

Read More
Blockchain’s Role in Trade Wars: Enhancing Transparency and Trust
IT Digital Transformation
Blockchain’s Role in Trade Wars: Enhancing Transparency and Trust

In recent years, escalating trade wars have significantly impacted global markets, creating an environment filled with uncertainty and complexity. Amid these conflicts, blockchain technology has emerged as a potential solution to enhance transparency and trust within international trade. Executives from Truebit, a blockchain network specializing in trustless verification, have shared insights into how Web3 technologies might address some of the

Read More
DevOps Shifts to Cloud, AI, and Enhanced Security Measures
IT Digital Transformation
DevOps Shifts to Cloud, AI, and Enhanced Security Measures

DevOps is experiencing transformative changes attributed to the increasing adoption of cloud solutions, the integration of artificial intelligence (AI), and a heightened focus on security measures. This article delves into these pivotal developments through recent news, trends, and key updates shaping the industry. Cloud Adoption and Transition Atlassian’s Cloud-Focused Shift Atlassian Data Center’s decision to discontinue multiyear license renewals and

Read More
Can Blockchain Technology Solve Ocean Plastic Pollution?
IT Digital Transformation
Can Blockchain Technology Solve Ocean Plastic Pollution?

Ocean plastic pollution remains an escalating global crisis, threatening marine life, ecosystems, and human health. The sheer volume of plastic waste accumulating in our oceans has triggered urgent calls for innovative solutions. VeChain, a leader in enterprise blockchain solutions, has responded by partnering with 4ocean, an environmental organization committed to ocean cleanup. This collaboration aims to leverage blockchain technology to

Read More
Are Your Amazon EC2 Instances Vulnerable to SSRF Attacks?
Cyber Security
Are Your Amazon EC2 Instances Vulnerable to SSRF Attacks?

A newly discovered campaign targeting websites hosted on Amazon EC2 instances has triggered widespread concern within the cybersecurity community. Since mid-March this year, hackers have been exploiting Server-Side Request Forgery (SSRF) vulnerabilities and Amazon’s EC2 Instance Metadata Service (IMDSv1) to steal sensitive credentials, gaining unauthorized access to cloud resources. This attack method highlights the critical risks associated with misconfigured cloud

Read More
Enhancing Cyber Defense with Log Correlation and Kill Chain Mapping
Cyber Security
Enhancing Cyber Defense with Log Correlation and Kill Chain Mapping

The increasing sophistication of cyberattacks demands advanced defense strategies. One effective approach is integrating log correlation and timeline analysis with the cyber kill chain framework. This combination allows for a comprehensive understanding of attacks and enables proactive defense measures. Originally established by Lockheed Martin, the cyber kill chain breaks down cyberattacks into seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command

Read More
Can Blockchain Save Creativity from AI’s Plagiarism Crisis?
IT Digital Transformation
Can Blockchain Save Creativity from AI’s Plagiarism Crisis?

The rise of AI-generated art and content has ignited an intense debate over the authenticity and ownership of creative works. Instances of AI-produced images mimicking the iconic style of Studio Ghibli, for example, have garnered significant attention on social media platforms. However, these visually appealing images pose a critical question: can they be considered authentic if the original creator, Hayao

Read More
Critical Erlang/OTP SSH Flaw Allows Unauthorized Code Execution
Cyber Security
Critical Erlang/OTP SSH Flaw Allows Unauthorized Code Execution

Erlang/OTP’s widely-used SSH implementation contains a critical remote code execution vulnerability, identified as CVE-2025-32433, posing an elevated risk to numerous systems. This flaw holds a maximum CVSS score of 10.0, indicating its severe potential for damage. Disclosed publicly in April 2025, the vulnerability allows unauthorized attackers to execute arbitrary code without any form of authentication. The flaw’s root lies in

Read More
DaVita Hit by Ransomware Attack, Patient Care Remains Unaffected
Cyber Security
DaVita Hit by Ransomware Attack, Patient Care Remains Unaffected

DaVita, a major kidney care provider operating over 2,600 outpatient dialysis centers in the United States, has experienced a significant ransomware attack disrupting parts of its network. This malicious incursion, discovered on a recent Saturday, resulted in the encryption of several sections of DaVita’s systems. In response, the company swiftly implemented its response plans, isolating the affected areas to prevent

Read More
Is Aviation Ready for the Challenge of Modern Cyber Threats?
Cyber Security
Is Aviation Ready for the Challenge of Modern Cyber Threats?

The escalating cyber risks faced by the aviation sector due to outdated software and technology have never been more apparent. A recent report from the Foundation for Defense of Democracies has emphasized the necessity for federal authorities to conduct thorough risk assessments and upgrade the air traffic control system to enhance cyber resilience. These updates in methodology aim to mitigate

Read More