Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Third Russian National Charged for Allegedly Deploying LockBit Ransomware
Cyber Security
Third Russian National Charged for Allegedly Deploying LockBit Ransomware

The US Justice Department has announced charges against yet another Russian national allegedly involved in deploying the LockBit ransomware. This comes at a time when there is an ongoing crackdown on international cybercriminals responsible for wreaking havoc on organizations across the globe. Arrest and Charges Ruslan Magomedovich Astamirov, a 20-year-old from the Chechen Republic, Russia, was recently arrested in Arizona

Read More
WordPress Stripe Payment Gateway Plugin Leaves Nearly 900,000 Installations Worldwide Vulnerable to IDOR Attack
Cyber Security
WordPress Stripe Payment Gateway Plugin Leaves Nearly 900,000 Installations Worldwide Vulnerable to IDOR Attack

WordPress is one of the most popular website builders that provides individuals and businesses with a platform for creating their own websites. The platform offers various themes, plugins, and features that can be added to a website to enhance its functionality and design. One such plugin is the WooCommerce Stripe Gateway Plugin, which allows users to keep customers on their

Read More
Microsoft Rolls Out Fixes for Critical Security Flaws in June’s 2023 Patch Tuesday Updates
Cyber Security
Microsoft Rolls Out Fixes for Critical Security Flaws in June’s 2023 Patch Tuesday Updates

Microsoft has released its latest Patch Tuesday updates for June 2021 to remediate major security shortcomings in its Windows Operating System and other software components. The updates are aimed at addressing vulnerabilities and strengthening the security of Microsoft’s products and services. With a total of 73 flaws, six have been rated as Critical, 63 as Important, two as Moderate, and

Read More
Skuld: The Emerging Golang-based Info Stealer Targeting Global Windows Users
Cyber Security
Skuld: The Emerging Golang-based Info Stealer Targeting Global Windows Users

A new information stealer called Skuld has been discovered, and it is currently targeting Windows systems worldwide. It has been observed compromising systems across Europe, Southeast Asia, and the United States. The malware is designed to steal sensitive information from its victims, including data stored in applications such as Discord and web browsers, as well as information from the system

Read More
The Sturdy Finance Debacle: Analyzing the $800,000 DeFi Hack and Addressing Escalating Security Concerns
Cyber Security
The Sturdy Finance Debacle: Analyzing the $800,000 DeFi Hack and Addressing Escalating Security Concerns

Decentralized Finance, or DeFi, has been all the rage in recent times, revolutionizing the way we think about traditional finance. Unlike centralized finance, which relies on intermediaries such as banks and financial institutions, DeFi allows financial transactions to occur on the blockchain without intermediaries. This has led to increased efficiency, speed, and cost-effectiveness, among other benefits. However, with these benefits

Read More
Unlocking the Potential of Digital Transformation: Overcoming Obstacles and Empowering Public Sector Innovation
IT Digital Transformation
Unlocking the Potential of Digital Transformation: Overcoming Obstacles and Empowering Public Sector Innovation

Digital transformation, like any innovation, has its own set of challenges that require addressing. The public sector, being a slow-moving sector, has also faced these challenges. The sector is still struggling to catch up with the digital era in which we live. However, with the growing need to make services more efficient and accessible to citizens, digital transformation has become

Read More
New Research Finds UAVs Vulnerable to Electromagnetic Fault Injection (EMFI) Attacks
Cyber Security
New Research Finds UAVs Vulnerable to Electromagnetic Fault Injection (EMFI) Attacks

Recent years have seen a significant increase in the use of unmanned aerial vehicles (UAVs) across a wide range of industries, from agriculture to law enforcement. While UAVs offer numerous benefits, including cost savings, improved safety, and greater efficiency, their increased use has also made them a target for cyberattacks. Now, new research from cybersecurity firm IOActive has found that

Read More
UNC3886: Chinese Cyberespionage Group Targets VMware ESXi Systems with Zero-Day Vulnerability Exploitation
Cyber Security
UNC3886: Chinese Cyberespionage Group Targets VMware ESXi Systems with Zero-Day Vulnerability Exploitation

Mandiant, a cybersecurity company, has recently identified the Chinese cyber espionage group UNC3886 exploiting a zero-day vulnerability in the VMware ESXi hypervisor to escalate privileges on guest virtual machines. The group has been observed deploying malicious vSphere Installation Bundles (VIBs) on ESXi hypervisors to gain command execution, file manipulation, and reverse shell capabilities. UNC3886 is known for targeting technology, defense,

Read More
Mastering Logic and Testing: Empowering Efficiency in Software Development
DevOps
Mastering Logic and Testing: Empowering Efficiency in Software Development

It’s a fact that many developers often focus solely on satisfying system requirements or developing a feature’s functionality, without thoroughly examining and testing it. However, in the software system, ignoring the testing phase can have several detrimental effects. Tests help to identify faults, ensure features function as intended, and validate implementation. They form a crucial part of the development process

Read More
The UK government pledges £10m for medical technology projects aimed at treating cancer, Alzheimer’s, and stroke
IT Digital Transformation
The UK government pledges £10m for medical technology projects aimed at treating cancer, Alzheimer’s, and stroke

The UK government has pledged £10m to support five new medical technology projects that aim to aid doctors in the effective treatment of diseases such as cancer, Alzheimer’s, and stroke. The funding, which was announced on Monday, will go towards developing medical technologies that will help doctors speed up diagnosis and personalize treatment. The projects will utilize novel digital and

Read More
Obsidian Discovers Successful Ransomware Attack Targeting SharePoint Online
Cyber Security
Obsidian Discovers Successful Ransomware Attack Targeting SharePoint Online

Obsidian is a cybersecurity firm specializing in providing protection to individuals and businesses against all forms of cyber threats. Recently, they documented a successful ransomware attack on Sharepoint Online (Microsoft 365). The attack was carried out by hackers exploiting a Microsoft Global SaaS admin account, deviating from the standard compromised endpoint method. The victim sought assistance from Obsidian’s product and

Read More
Keytrade Bank moves to cloud-based core banking technology with Infosys Finacle
IT Digital Transformation
Keytrade Bank moves to cloud-based core banking technology with Infosys Finacle

Keytrade Bank, an online bank based in the Benelux region, has announced its transition from legacy core banking technology to a modern, cloud-based platform. In this article, we will examine the details of this transition, the reasons behind it, and the potential impact it may have on Keytrade Bank and the broader banking industry. Keytrade Bank’s legacy core banking system

Read More