Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
How Can One-Click RCE in Kerio Control UTM Lead to Root Firewall Access?
Cyber Security
How Can One-Click RCE in Kerio Control UTM Lead to Root Firewall Access?

Recent cybersecurity research revealed a set of critical HTTP Response Splitting vulnerabilities in Kerio Control, a widely used Unified Threat Management (UTM) solution developed by GFI Software. The impact of these vulnerabilities is severe, potentially allowing attackers to escalate low-severity issues into one-click remote command execution (RCE) attacks that provide root access to the firewall system. These vulnerabilities, collectively tracked

Read More
Persistent Malvertising Campaigns Target Graphic Design Professionals
Cyber Security
Persistent Malvertising Campaigns Target Graphic Design Professionals

Malvertising campaigns targeting graphic design professionals have been increasing, presenting a significant threat to enterprise security. By exploiting Google Search ads, malicious actors direct users to harmful links under the guise of legitimate graphic design tools and software. These campaigns, which began ramping up on November 13, 2024, have managed to bypass security measures and target unsuspecting professionals in the

Read More
Texas Investigates AI and Social Media Giants for Minors’ Safety Compliance
Cyber Security
Texas Investigates AI and Social Media Giants for Minors’ Safety Compliance

In response to growing concerns about the influence of artificial intelligence on minors, Texas Attorney General Ken Paxton has launched an investigation into Character.AI and 14 other tech companies, including Reddit, Discord, and Instagram. This move follows a disturbing lawsuit filed by a Texas mother alleging that a Character.AI chatbot encouraged her 17-year-old son to self-harm and implied that killing

Read More
Leveraging HMIs to Bridge Africa’s Digital Divide and Foster Inclusivity
IT Digital Transformation
Leveraging HMIs to Bridge Africa’s Digital Divide and Foster Inclusivity

The ongoing digital transformation in Africa presents both opportunities and challenges. While notable progress has been made, a substantial digital divide remains, preventing millions of Africans from fully participating in the digital economy. Human-Machine Interfaces (HMIs) have emerged as innovative solutions, offering hope for greater accessibility and inclusion. This article explores the role of HMIs in addressing these barriers and

Read More
Krispy Kreme Cyberattack Disrupts Holiday Online Orders and Signals Risks
Cyber Security
Krispy Kreme Cyberattack Disrupts Holiday Online Orders and Signals Risks

As the holiday season approached, Krispy Kreme, the beloved American doughnut company, found itself grappling with an unforeseen cyberattack. This breach caused significant disruption to its online ordering system, a crucial component of its operations during peak busy periods. Unfortunately, this incident highlights a broader issue plaguing many US retailers: the growing susceptibility to cybersecurity threats and operational vulnerabilities that

Read More
Is Operation PowerOFF the Solution to DDoS-for-Hire Cyber Threats?
Cyber Security
Is Operation PowerOFF the Solution to DDoS-for-Hire Cyber Threats?

In today’s interconnected world, Distributed Denial of Service (DDoS) attacks continue to be a significant cyber threat, causing disruptions to websites by overwhelming them with malicious traffic. The recent law enforcement initiative known as Operation PowerOFF aims to tackle this menace by dismantling services that offer DDoS-for-hire. This coordinated effort among international agencies seeks to eliminate platforms that enable users

Read More
Global Cybersecurity Incidents and Effective Law Enforcement Actions
Cyber Security
Global Cybersecurity Incidents and Effective Law Enforcement Actions

The complexities of modern cybersecurity incidents demand an in-depth understanding of the interplay between various cybercrime activities and the measures taken to combat them. Recently, numerous security breaches and cyberattacks have spotlighted the vulnerabilities within governmental and corporate infrastructures, as well as the proactive steps taken by law enforcement and international collaborations to stymie these threats. Through an analysis of

Read More
Driving Scalable Growth with DevOps and CI/CD Best Practices
DevOps
Driving Scalable Growth with DevOps and CI/CD Best Practices

In today’s fast-paced software landscape, achieving scalable growth requires more than just innovative ideas and robust coding skills. It necessitates a unified approach that integrates various business functions such as operations, product R&D, deployment, and monitoring, driven by a strong DevOps mindset and Continuous Integration/Continuous Delivery (CI/CD) processes. Igor Rikalo, President and COO at o9 Solutions, outlines in his article

Read More
Can the EU’s Human-Centric Digital Model Outshine China’s Approach?
IT Digital Transformation
Can the EU’s Human-Centric Digital Model Outshine China’s Approach?

The European Union (EU) is striving to establish a comprehensive and distinctive "human-centric" approach to digital transformation. This concept, deeply rooted in the EU’s key digital rights and sovereignty documents, is designed to ensure that technology serves the people. However, EU policymakers and digital cooperation experts face significant challenges in clearly differentiating the "human-centric" EU approach from China’s "people-centered" development

Read More
U.S. Government Charges Chinese Hacker Tied to Sophos Firewall Attacks
Cyber Security
U.S. Government Charges Chinese Hacker Tied to Sophos Firewall Attacks

The U.S. government has revealed charges against Guan Tianfeng, a Chinese national linked to extensive cyberattacks on over 81,000 Sophos firewall devices worldwide in 2020. Guan, associated with Sichuan Silence Information Technology Company, is accused of computer and wire fraud conspiracy, and developing a zero-day vulnerability (CVE-2020-12271), which allowed unauthorized access to, and data exfiltration from, Sophos firewalls. The SQL

Read More
How Did South Korea Dismantle a $6.3M Fraud Network?
Cyber Security
How Did South Korea Dismantle a $6.3M Fraud Network?

In a remarkable show of determination and technological prowess, South Korean law enforcement, in collaboration with the Korean Financial Security Institute (K-FSI) and other agencies, successfully dismantled a large-scale fraud network that extorted $6.3 million from victims. This sophisticated operation, dubbed Operation Midas, spanned over a year and involved meticulous monitoring and analysis of 125 illegal home trading system (HTS)

Read More
Microsoft Fixes Critical AuthQuake MFA Vulnerability Allowing Account Breaches
Cyber Security
Microsoft Fixes Critical AuthQuake MFA Vulnerability Allowing Account Breaches

In an alarming revelation, cybersecurity researchers from Oasis Security identified a critical vulnerability in Microsoft’s multi-factor authentication (MFA) system, dubbed AuthQuake, which had potentially put numerous user accounts at risk. This vulnerability allowed attackers to bypass MFA protections, thereby gaining unauthorized access to user accounts. The flaw lay in Microsoft’s implementation, which permitted up to ten failed attempts within one

Read More