Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Symal Partners with Macquarie to Drive AI in Construction Industry
IT Digital Transformation
Symal Partners with Macquarie to Drive AI in Construction Industry

In a significant stride towards digital transformation in the construction industry, Symal, a Melbourne-based construction company, has joined forces with Macquarie Cloud Services.This partnership is set to enhance Symal’s DevOps and AI capabilities through Microsoft Azure cloud services. The collaboration underscores a new era of technological advancement, positioning Symal to adopt advanced digital solutions and significantly improve its operations.Such efforts

Read More
Are Open Source Packages Truly Safe from Hidden Malware?
Cyber Security
Are Open Source Packages Truly Safe from Hidden Malware?

In an environment where reliance on open source software (OSS) continues to grow, new concerns are emerging regarding the security of these widely-used resources. Recent findings from researchers at ReversingLabs have exposed a disturbing trend of cybercriminals embedding malicious code into seemingly benign open source packages. This insidious approach targets legitimate software on users’ machines, challenging previous assumptions about the

Read More
How Are Russian Hackers Bypassing MFA with Device Code Phishing?
Cyber Security
How Are Russian Hackers Bypassing MFA with Device Code Phishing?

Since August 2024, the Russian state-backed advanced persistent threat (APT) group Storm-2372 has employed increasingly sophisticated tactics to bypass multi-factor authentication (MFA) and infiltrate high-value targets. This article delves into the device code phishing technique employed by the group, which allows them to evade typical security measures and maintain persistent access to victims’ accounts. The technique, which exploits the OAuth

Read More
Analyze Suspicious Links Safely with ANY.RUN’s New Tool
Cyber Security
Analyze Suspicious Links Safely with ANY.RUN’s New Tool

In today’s digital age, the internet has become an indispensable part of our daily lives, making it crucial to protect against an increasing number of cybersecurity threats. Malicious websites and phishing attempts are rampant, presenting significant risks to both personal and organizational data. To address this growing concern, ANY.RUN has launched an innovative tool called Safebrowsing, designed to help users

Read More
How Is ToddyCat Exploiting ESET Flaws to Launch Cyber-Attacks?
Cyber Security
How Is ToddyCat Exploiting ESET Flaws to Launch Cyber-Attacks?

In recent developments, cybersecurity researchers have identified a new malware variant, called TCESB, actively exploiting vulnerabilities in ESET’s security software to carry out sophisticated cyber-attacks. The threat actor behind this malware, known as ToddyCat, is linked to a Chinese-affiliated group notorious for its extensive cyber-attacks across Asia since December 2020. This article delves into how ToddyCat leverages these security flaws

Read More
How Vulnerable File-Transfer Software Led to a Major Data Breach
Cyber Security
How Vulnerable File-Transfer Software Led to a Major Data Breach

In a stunning revelation, Michigan-based breakfast cereal company WK Kellogg Co. suffered a significant data breach tied to vulnerabilities in Cleo file-transfer software. The breach occurred on December 7, 2024, compromising at least one employee’s sensitive information, including their name and Social Security number. WK Kellogg Co. discovered the hack on February 27, 2025, and later confirmed that Cleo was

Read More
Phishing Scams Target Hotels: Urgent Need for Strongest Security
Cyber Security
Phishing Scams Target Hotels: Urgent Need for Strongest Security

In an alarming development, a sophisticated phishing scam targeting hotel staff has surfaced, employing emails that appear to originate from the trusted online travel agency Booking.com. Cybersecurity firm Malwarebytes recently identified this nefarious attack, which aims to breach hotel networks by deceiving employees into executing malicious commands. These fraudulent emails prompt staff to confirm reservations by clicking on a link,

Read More
Can AI Phishing Attacks Be Stopped Before It’s Too Late?
Cyber Security
Can AI Phishing Attacks Be Stopped Before It’s Too Late?

Artificial Intelligence (AI) has revolutionized various industries, providing unprecedented advancements in numerous fields. However, this technology has also introduced new challenges, particularly in cybersecurity. The rise of AI-crafted email attacks marks a significant milestone, as these malicious efforts have now surpassed the capabilities of human-generated phishing attempts. This shift signifies the dawn of a more dangerous era for cybersecurity, rendering

Read More
How Can You Protect Against Rising Smishing Toll Scams?
Cyber Security
How Can You Protect Against Rising Smishing Toll Scams?

The rise in smishing (SMS phishing) scams targeting toll service users has become a pressing concern in the US and UK, propelled by a China-based cybercriminal group known as the Smishing Triad. These scams involve sending fraudulent SMS and iMessage texts that mimic trusted toll agencies such as FasTrak, E-ZPass, and I-Pass. The messages claim recipients owe unpaid toll bills

Read More
NIST Deprioritizes Pre-2018 CVEs Amid Backlog and New Threats
Cyber Security
NIST Deprioritizes Pre-2018 CVEs Amid Backlog and New Threats

The US National Institute of Standards and Technology (NIST) recently made a significant decision affecting the cybersecurity landscape by marking all Common Vulnerabilities and Exposures (CVEs) published before January 1, 2018, as “Deferred” in the National Vulnerability Database (NVD). This move impacts over 20,000 entries and potentially up to 100,000, signaling that these CVEs will no longer be prioritized for

Read More
Crypto Malware Spreads via SourceForge Posing as Cracked Software
Cyber Security
Crypto Malware Spreads via SourceForge Posing as Cracked Software

Malicious actors have taken advantage of SourceForge, a reputable software hosting platform, to propagate cryptocurrency miner and clipper malware, masquerading as cracked versions of popular applications. This deceptive tactic lures users into downloading harmful software under the guise of legitimate programs such as Microsoft Office, exposing them to significant cybersecurity threats. Malicious Projects Masquerading as Legitimate Software Kaspersky, a well-regarded

Read More
Will Trump’s CISA Cuts Leave America Vulnerable to Cyber Attacks?
Cyber Security
Will Trump’s CISA Cuts Leave America Vulnerable to Cyber Attacks?

The Trump administration’s proposed cuts to the Cybersecurity and Infrastructure Security Agency (CISA) have ignited significant criticism and debate over potential impacts on national security. Reports indicate that up to 1,300 jobs could be eliminated through terminations and buyouts, raising serious concerns among Congressional members and cybersecurity experts. The timing of these cuts is particularly alarming given the increasing cyber

Read More