Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
How is FakeCall Malware Threatening Mobile Device Security Today?
Cyber Security
How is FakeCall Malware Threatening Mobile Device Security Today?

The Emerging Threat of FakeCall Malware Mobile cybersecurity has faced a significant new challenge with the emergence of FakeCall, a sophisticated malware variant that employs advanced vishing (voice phishing) techniques. This malware targets mobile devices, deceiving users into divulging sensitive financial information by impersonating legitimate institutions during phone calls. Identified by cybersecurity experts, FakeCall exploits mobile-specific functions, intercepting and manipulating

Read More
Transforming Finance: Immediate Vortex Leads in Digital Innovation
IT Digital Transformation
Transforming Finance: Immediate Vortex Leads in Digital Innovation

Immediate Vortex has emerged as a transformative force in the financial sector, setting new standards in digital innovation through its advanced technologies and user-centric approach. By integrating cutting-edge AI, robust educational tools, and secure trading platforms, Immediate Vortex empowers both individual investors and businesses to navigate the complexities of modern finance with confidence and efficiency. This comprehensive approach not only

Read More
China Scans Canadian Cyber Defenses, Poses Threat to Key Sectors in 2024
Cyber Security
China Scans Canadian Cyber Defenses, Poses Threat to Key Sectors in 2024

The Canadian Centre for Cyber Security has issued a stark warning regarding a highly sophisticated Chinese state-sponsored cyber threat actor actively scanning Canadian cyber defenses and targeting critical institutions and infrastructure throughout 2024. Such activity is concentrated on a variety of key sectors, including government departments, federal political parties, the House of Commons and Senate, defense organizations, media outlets, and

Read More
HeptaX Cyberattack Campaign Targets Healthcare with Malicious LNK Files
Cyber Security
HeptaX Cyberattack Campaign Targets Healthcare with Malicious LNK Files

The sophisticated, multi-stage cyberattack campaign spearheaded by the malicious actor group known as HeptaX has predominantly set its sights on the healthcare sector, leveraging malicious LNK files. First identified by Cyble Research and Intelligence Labs (CRIL), this campaign has been actively targeting vulnerable servers with consistent attack methodologies for the past year. HeptaX employs a mix of PowerShell and Batch

Read More
Eliminating Cyber Threats with Exposure Validation: A Holmesian Approach
Cyber Security
Eliminating Cyber Threats with Exposure Validation: A Holmesian Approach

In the dynamic world of cybersecurity, mimicking the analytical prowess of Sherlock Holmes can be surprisingly beneficial. Holmes’ deductive reasoning offers a compelling blueprint for identifying and prioritizing critical vulnerabilities within an avalanche of potential threats. By emulating a Holmesian approach through exposure validation, organizations can refine their cybersecurity strategies and enhance their overall defenses. The Essence of Exposure Validation

Read More
Open-Source AI Models Exposed to Critical Security Vulnerabilities
Cyber Security
Open-Source AI Models Exposed to Critical Security Vulnerabilities

Researchers recently uncovered over three dozen security vulnerabilities within various open-source artificial intelligence (AI) and machine learning (ML) models. This discovery highlights significant security concerns, some of which could result in remote code execution and information theft. The flaws were identified in widely-used tools such as ChuanhuChatGPT, Lunary, and LocalAI, and were reported through Protect AI’s Huntr bug bounty platform.

Read More
Low-Code Revolutionizes Enterprise Digital Transformation and Innovation
IT Digital Transformation
Low-Code Revolutionizes Enterprise Digital Transformation and Innovation

The essential role of low-code development tools in driving digital transformation within enterprises has been thrown into sharp relief by a recent report from Mendix, a Siemens business. This comprehensive report, which is based on a survey of 2,000 C-suite and senior IT decision-makers from various regions around the world, underscores a significant shift: non-technical executives, particularly Chief Operating Officers

Read More
ServiceNow and Victoria Boost Digital Transformation with SPC Agreement
IT Digital Transformation
ServiceNow and Victoria Boost Digital Transformation with SPC Agreement

ServiceNow has solidified a significant three-year State Purchase Contract (SPC) with the Victorian Government, designed to accelerate digital transformation while enhancing engagement for both residents and businesses. Over 100 Victorian Government departments and agencies will now be able to access ServiceNow’s comprehensive suite of cloud products and services. This move simplifies procurement processes and ensures the streamlined adoption of the

Read More
Qlik Awards Showcase Data-Driven Transformations Across Sectors
IT Digital Transformation
Qlik Awards Showcase Data-Driven Transformations Across Sectors

The 6th annual Australia and New Zealand Digital Transformation Awards hosted by Qlik showcased extraordinary achievements in utilizing data solutions across various sectors, ranging from healthcare to entertainment, highlighting the transformative power of data integration and analytics. These awards shone a spotlight on the significant impact that innovative data practices can have on societal development, improving services and operational efficiency.

Read More
Top Cybersecurity Programming Languages You Need to Know in 2025
Cyber Security
Top Cybersecurity Programming Languages You Need to Know in 2025

Cybersecurity is an ever-evolving field that demands continuous learning and adaptation, and one of the core skills that cybersecurity professionals need is proficiency in specific programming languages that can aid them in protecting and attacking systems. Understanding these languages can be the key to identifying vulnerabilities and defending digital infrastructures effectively. By 2025, certain programming languages will be particularly crucial

Read More
Is Your Business Ready for the Expanding Identity Attack Surface?
IT Digital Transformation
Is Your Business Ready for the Expanding Identity Attack Surface?

In today’s rapidly evolving digital landscape, businesses are increasingly undertaking digital transformations that incorporate cloud services, Internet of Things (IoT) devices, and third-party integrations. This evolution has led to the significant expansion of the identity attack surface, making it a prime target for cybercriminals. As Chief Information Security Officer at Gathid, Craig Davies emphasizes the heightened risk of identity-related cyberattacks

Read More
Critical Wi-Fi Test Suite Flaw Exposes Routers to Code Injection Exploits
Cyber Security
Critical Wi-Fi Test Suite Flaw Exposes Routers to Code Injection Exploits

Researchers have uncovered a critical security vulnerability in the Wi-Fi Alliance’s Test Suite that could permit unauthenticated local attackers to execute arbitrary code with elevated privileges. This flaw, documented as CVE-2024-41992, affects Arcadyan FMIMG51AX000J routers and enables attackers to send specially crafted packets to perform command injection, thereby obtaining root privileges. Discovered by independent researcher "fj016" and revealed by SSD

Read More