Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Cyberattack Disrupts Operations at Newsquest, UK’s Largest Regional Media Group
Cyber Security
Cyberattack Disrupts Operations at Newsquest, UK’s Largest Regional Media Group

Newsquest, one of the UK’s largest regional media groups, recently fell victim to a sophisticated cyber attack that has disrupted operations at its local news outlets. The attack, which occurred on December 11th, has caused intermittent website outages and left journalists unable to file stories. The incident has been reported to the UK National Cyber Security Centre, underscoring the seriousness

Read More
Bluetooth Trackers: The Unexpected Tool in Organized Crime
Cyber Security
Bluetooth Trackers: The Unexpected Tool in Organized Crime

Bluetooth trackers have become increasingly popular for their ability to help people locate keys and other personal items. However, these handy devices have taken on a much darker role in the world of organized crime. The European agency for law enforcement cooperation, Europol, has issued a warning about the misuse of Bluetooth tags by criminals to geolocate loot. This article

Read More
Powering Digital Transformation: Advantages of Combining Network-as-a-Service and Edge Cloud Computing
IT Digital Transformation
Powering Digital Transformation: Advantages of Combining Network-as-a-Service and Edge Cloud Computing

In today’s fast-paced digital world, traditional cloud-based solutions have limitations in terms of latency and scalability, particularly for data-intensive applications at the edge. However, the emergence of Network-as-a-Service (NaaS) and edge cloud computing has revolutionized the landscape by bringing the power of the cloud closer to the data source. This article explores the benefits of combining NaaS and edge cloud,

Read More
Exploitation of OAuth Applications: A Growing Threat to User Accounts and Organizations
Cyber Security
Exploitation of OAuth Applications: A Growing Threat to User Accounts and Organizations

With the rise of OAuth applications, a new avenue for hackers to compromise user accounts and gain unauthorized access has emerged. These applications, designed to enhance user experience and simplify authentication processes, are now being exploited by cyber threat actors. In this article, we will delve into how hackers are leveraging OAuth vulnerabilities to manipulate privileges, execute crypto mining operations,

Read More
Apple Strengthens Security with iMessage Contact Key Verification
Cyber Security
Apple Strengthens Security with iMessage Contact Key Verification

As part of its ongoing efforts to ensure user privacy and security, Apple has recently implemented a new feature called iMessage Contact Key Verification. This feature has been activated on fully patched iPhones and macOS-powered devices. Its primary objective is to block impersonators and sophisticated threat actors from abusing Apple’s iMessage server infrastructure. By allowing users to verify their messaging

Read More
Digital Revolution: Understanding the Exploding Mobile Wallet Trend in the LAMEA Region
IT Digital Transformation
Digital Revolution: Understanding the Exploding Mobile Wallet Trend in the LAMEA Region

In recent years, the LAMEA (Latin America, Middle East, and Africa) region has experienced a surge in mobile wallet adoption. This upward trend can be attributed to the region’s ongoing digital transformation and the unparalleled convenience offered by mobile payment solutions. As smartphone penetration and internet connectivity in LAMEA continue to soar, the environment becomes increasingly ripe for the widespread

Read More
Toyota Financial Services Confirms Personal Details and Bank Account Information Compromised in Medusa Ransomware Attack
Cyber Security
Toyota Financial Services Confirms Personal Details and Bank Account Information Compromised in Medusa Ransomware Attack

In a recent cyber attack, Toyota Financial Services (TFS) has revealed that personal details, including bank account information, were compromised. The attack, claimed by the notorious Medusa ransomware gang, has raised concerns about the security of sensitive data. This article delves into the details of the breach, potential attack vectors, recommended security measures, and the implications of this incident. Details

Read More
Ransomware cartel Rhysida targets video game developer Insomniac Games
Cyber Security
Ransomware cartel Rhysida targets video game developer Insomniac Games

In a concerning development in the world of cybersecurity, the notorious ransomware cartel known as Rhysida has set its sights on the renowned video gaming developer, Insomniac Games. With a track record of developing popular titles like Spider-Man, Spyro the Dragon, and Ratchet & Clank, Insomniac Games has become a prime target for cybercriminals seeking to exploit their valuable data

Read More
Ukraine’s Largest Mobile Network Operator, Kyivstar, Hit by Cyberattack
Cyber Security
Ukraine’s Largest Mobile Network Operator, Kyivstar, Hit by Cyberattack

Ukraine’s leading mobile network operator, Kyivstar, recently fell victim to a powerful cyberattack, resulting in a significant shutdown that disrupted internet access and mobile communications for its customers. The company immediately took action, initiating an investigation alongside law enforcement agencies and notifying Ukrainian state services. While the director general suspects a connection to the ongoing conflict with Russia, the Ukrainian

Read More
Meta Unveils Default End-to-End Encryption for Messenger, Revolutionizing Private Communication
Cyber Security
Meta Unveils Default End-to-End Encryption for Messenger, Revolutionizing Private Communication

In a historic revelation, Meta has declared a paradigm shift for its Messenger platform, unveiling the implementation of default end-to-end encryption for all personal messages and calls. This pivotal moment is destined to reshape the landscape of private communication, granting users enhanced security and unprecedented privacy. The implementation efforts behind this transformation involved years of strategic planning and development, requiring

Read More
Securing Non-Human Access Credentials: A Critical Imperative
Cyber Security
Securing Non-Human Access Credentials: A Critical Imperative

In today’s digital landscape, where cloud services and interconnected apps are prevalent, a new perimeter has emerged: non-human access credentials. These access credentials, including API keys, tokens, service accounts, and secrets, play a crucial role in connecting apps and resources to various cloud services. However, they also pose significant security risks if not properly secured. In this article, we will

Read More
Kentucky Hospital Chain Notifies 2.5 Million Individuals of Data Breach; Russian-Speaking Ransomware Group Claims Responsibility
Cyber Security
Kentucky Hospital Chain Notifies 2.5 Million Individuals of Data Breach; Russian-Speaking Ransomware Group Claims Responsibility

In a disturbing revelation, a Kentucky-based hospital chain, Norton Healthcare, has announced that millions of individuals may have had their personal information compromised in a data breach discovered seven months ago. The incident, which has affected 2.5 million current and former patients and employees, is believed to be the work of a Russian-speaking ransomware-as-a-service group known as Alpha/BlackCat. This article

Read More