Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Can Filigran’s $35M Funding Propel Them to Cybersecurity Dominance?
Cyber Security
Can Filigran’s $35M Funding Propel Them to Cybersecurity Dominance?

Filigran, an innovative player in the European cybersecurity landscape, has successfully secured a substantial $35 million in a Series B funding round led by Insight Partners, with continued backing from previous investors Accel and Moonfire. This influx follows swiftly on the heels of Filigran’s $16 million Series A round, signaling robust confidence in the company’s advanced cybersecurity solutions. Since its

Read More
South Korea Faces Surge in Cyber-Attacks Amid North Korean Troop Deployment
Cyber Security
South Korea Faces Surge in Cyber-Attacks Amid North Korean Troop Deployment

In recent months, the frequency and intensity of cyber-attacks targeting South Korea have escalated significantly, coinciding with the deployment of North Korean soldiers in Ukraine. These cyber-attacks, primarily executed as distributed denial-of-service (DDoS) attacks, have targeted government websites and several private companies, temporarily disrupting their operations. However, these attacks have not resulted in lasting damage beyond the inconvenience of temporary

Read More
FakeCall Malware Threatens Android Users With Advanced Vishing Tactics
Cyber Security
FakeCall Malware Threatens Android Users With Advanced Vishing Tactics

In the ever-evolving landscape of cyber threats, a new variant of the FakeCall malware has surfaced, leveraging advanced vishing (voice phishing) techniques to take unprecedented control over mobile devices. Targeting primarily Android users, this sophisticated malware raises significant security concerns. Highlighted by Zimperium’s research team, FakeCall exemplifies the growing need for vigilant mobile security practices as it continues to evolve

Read More
Can Global Operations Curb the Surge in Cybercrime Activities?
Cyber Security
Can Global Operations Curb the Surge in Cybercrime Activities?

Cybercrime remains a formidable adversary in today’s interconnected world, where digital threats are evolving at an unprecedented pace and impacting users, businesses, and governments alike. In an era where data breaches, phishing attacks, and ransomware incidents are on the rise, the international law enforcement community has intensified its efforts to combat these sophisticated crimes. One such initiative is Interpol’s Operation

Read More
Is Your Python Dependency Stealing AWS Credentials from Developers?
Cyber Security
Is Your Python Dependency Stealing AWS Credentials from Developers?

Imagine working on a critical project and relying on trusted dependencies, only to discover that those very libraries are compromising your confidential information. This troubling reality has emerged in the Python development community, where cybersecurity experts recently identified a malicious package on the Python Package Index (PyPI) called “fabrice,” which has been stealing AWS credentials from developers for over three

Read More
How Can Digital Transformation Future-Proof Your Business?
IT Digital Transformation
How Can Digital Transformation Future-Proof Your Business?

In an era where technological advancements are reshaping industries at an unprecedented pace, digital transformation has emerged as a critical strategy for businesses aiming to stay competitive and relevant. This article delves into the essential aspects of digital transformation, exploring how it can future-proof your business by enhancing operational efficiency, meeting evolving customer expectations, and fostering continuous innovation. Understanding Digital

Read More
Nigeria Police Arrest 130 in Major Cybercrime Bust Targeting Hackers
Cyber Security
Nigeria Police Arrest 130 in Major Cybercrime Bust Targeting Hackers

The Nigeria Police Force (NPF) has taken significant strides in combating the growing menace of cybercrime with a large-scale operation that resulted in the arrest of 130 individuals. Publicly announced by NPF’s public relations officer, Prince Olumuyiwa Adejobi, on November 3, 2024, the suspects comprise 113 foreign nationals, mainly from China and Malaysia, and 17 Nigerians. These individuals are facing

Read More
LameDuck’s Skynet Botnet Hits Critical Infrastructures Globally
Cyber Security
LameDuck’s Skynet Botnet Hits Critical Infrastructures Globally

Imagine waking up to find the website of your bank, the hospital down the street, and the airport you were planning to fly from all offline. This nightmarish scenario is becoming an alarming reality as LameDuck’s Skynet Botnet, an aggressive cyber threat, has unleashed over 35,000 Distributed Denial of Service (DDoS) attacks globally, targeting crucial infrastructures and causing unprecedented disruption

Read More
How Does Winos 4.0 Malware Threaten Gamers and Educational Institutions?
Cyber Security
How Does Winos 4.0 Malware Threaten Gamers and Educational Institutions?

In the rapidly evolving landscape of cybersecurity, a new and particularly insidious threat has caught the attention of experts and gamers alike. Known as Winos 4.0, this advanced malware framework targets gamers through seemingly innocent game optimization apps such as installation tools and speed boosters. Built on the notorious Gh0st RAT, Winos 4.0 stands out for its extensive functionality, stable

Read More
How Does Aerloc Enhance Security for Industry 4.0 Private 5G Networks?
IT Digital Transformation
How Does Aerloc Enhance Security for Industry 4.0 Private 5G Networks?

The rapid digitization of industrial IT and OT systems in Industry 4.0 environments demands robust and innovative security measures to protect sensitive data and ensure reliable connectivity. Addressing these critical needs, Celona has introduced Aerloc, a next-generation suite of security capabilities designed to enhance the security of private 5G wireless networks. Aerloc aims to tackle specific challenges inherent in industrial

Read More
Hikvision Firmware Fixes Vulnerability in Network Cameras’ DDNS Service
Cyber Security
Hikvision Firmware Fixes Vulnerability in Network Cameras’ DDNS Service

A significant security vulnerability has been identified in Hikvision network cameras, leading to potentially grave consequences for users and organizations relying on these devices. This flaw allows attackers to intercept Dynamic DNS (DDNS) credentials that are transmitted in plaintext, leaving various camera models exposed to unauthorized access. Specifically, the affected models include those with firmware versions predating recent updates, such

Read More
How Did UK Councils Recover from the NoName057(16) DDoS Attack?
Cyber Security
How Did UK Councils Recover from the NoName057(16) DDoS Attack?

In the wake of a series of Distributed Denial of Service (DDoS) attacks carried out by the Russian hacktivist group NoName057(16), several UK local authority websites faced temporary disruptions. Last week’s cyberattacks, reportedly in retaliation for British military support for Ukraine, targeted the websites of Hemel Hempstead, St Albans, Salford, Bury, Trafford, Tameside, and Dudley, with Portsmouth City Council and

Read More