Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Is Operation DoppelGänger Distorting Our Online Reality?
Cyber Security
Is Operation DoppelGänger Distorting Our Online Reality?

Since May 2022, the internet has been under the subtle siege of Operation Doppelgänger, a campaign of disinformation that flourishes on the fertile grounds of social media platforms. Initially gaining traction on the platform formerly known as Twitter, these activities challenge the credibility of online discourse. The operatives behind Doppelgänger have adeptly crafted and propagated false narratives, magnifying their reach

Read More
Is LATRODECTUS the New Face of Cyber Threats?
Cyber Security
Is LATRODECTUS the New Face of Cyber Threats?

As cybersecurity defenses evolve, so too do the methods and tools used by cybercriminals. A new malware loader named LATRODECTUS is gaining notoriety in the shadowy corridors of cyber threats. First spotted in October 2023, this malware represents the emergence of a new wave of loaders designed with stealth and efficiency in mind. Elastic Security Labs reports that LATRODECTUS shares

Read More
Iranian Cyber Group Escalates Attacks on Israeli Entities
Cyber Security
Iranian Cyber Group Escalates Attacks on Israeli Entities

The Iranian threat group known as Void Manticore, or Storm-842, has intensified its cyber campaigns against Israeli organizations. As reported by Check Point Research (CPR), this group operates under the auspices of Iran’s Ministry of Intelligence and Security. Marked by a unique combination of data destruction and psychological warfare, their aggressive tactics aim to undermine the stability of Israeli entities.

Read More
How Did Andariel APT Breach South Korean Sectors?
Cyber Security
How Did Andariel APT Breach South Korean Sectors?

The Andariel APT group has significantly escalated its malicious activities with a concerted cyber-attack campaign targeting various sectors in South Korea. The newly discovered malware tool at the core of this campaign, the Nestdoor Remote Access Trojan (RAT), allows for an unprecedented level of access and control over compromised systems. With functionalities that include file transfer, command execution, and shell

Read More
How Are SAP Users Embracing S/4HANA and AI for Digital Transformation?
IT Digital Transformation
How Are SAP Users Embracing S/4HANA and AI for Digital Transformation?

The landscape of enterprise software is witnessing a radical transformation as businesses seek competitive advantages through digital innovation. At the heart of this transformation is the drive to adopt the latest technologies such as SAP’s S/4HANA and Artificial Intelligence (AI). As companies come to the realization that the end of mainstream maintenance for SAP Business Suite 7 in 2027 is

Read More
How Will 5G Drones Transform Mountain Rescue Ops?
IT Digital Transformation
How Will 5G Drones Transform Mountain Rescue Ops?

In the vast wilderness of Scotland’s Angus hills, where mobile coverage is often a gamble, an innovative trial is unfolding that could redefine the protocols of mountain rescue operations. Here, the unpredictable terrain has made the use of drones invaluable for scanning the landscape and locating persons in distress. By equipping these drones with 5G technology, rescuers can potentially overcome

Read More
Are Outdated D-Link Routers a Cybersecurity Threat?
Cyber Security
Are Outdated D-Link Routers a Cybersecurity Threat?

In a move aimed at securing federal information systems, the United States Cybersecurity and Infrastructure Security Agency (CISA) has issued a strong warning concerning critical vulnerabilities detected in D-Link routers. Among these, the CVE-2014-10005 exploit in DIR-600 series routers first discovered in 2014 poses an immediate risk, as these cross-site request forgery (CSRF) vulnerabilities can be easily exploited. Alarming as

Read More
Is Your Wi-Fi Connection Safe from the WrongNet Flaw?
Cyber Security
Is Your Wi-Fi Connection Safe from the WrongNet Flaw?

In the interconnected space where wireless fidelity, or Wi-Fi, reigns supreme, a worrying vulnerability has surfaced contrary to the expected fortress of encryption. CVE-2023-52424 is a new chink in the armor of the IEEE 802.11 standard, causing alarm among network security experts. WPA2 and WPA3, protocols designed for securing Wi-Fi networks, have a gaping loophole: the SSID, the identifier for

Read More
How Are Telcos Evolving Into Techcos with AI and Cloud?
IT Digital Transformation
How Are Telcos Evolving Into Techcos with AI and Cloud?

The telecommunications industry stands at the brink of a major overhaul, where traditional services like voice and SMS are getting overshadowed by the rising demand for data-centric offerings. As telcos transform into techcos, they are embedding AI and cloud into the core of their operations, unlocking an array of capabilities that are fundamental to staying competitive in a digital era.

Read More
How Can Companies Succeed in Digital Transformation?
IT Digital Transformation
How Can Companies Succeed in Digital Transformation?

The journey of digital transformation is akin to navigating uncharted technological waters, where success is as much about avoiding pitfalls as it is about advancing towards a digital horizon. With an estimated failure rate of 70% reported by McKinsey, the stakes are high, and the need for a well-charted course is clear. This article presents strategic insights and actionable tactics

Read More
How Can Unified SOCs Strengthen Critical Infrastructure Security?
DevOps
How Can Unified SOCs Strengthen Critical Infrastructure Security?

As digital transformation accelerates, the intersection of Information Technology (IT) and Operational Technology (OT) is increasingly becoming a primary target for cyber threats. Systems that manage critical services such as electricity, water, transportation, and healthcare are constantly at risk, reinforcing the imperative for robust cybersecurity measures. Leading experts in the field, like Microsoft’s David Atch, alarmingly point out that the

Read More
How Will China’s Digital Shift Revitalize Manufacturing?
IT Digital Transformation
How Will China’s Digital Shift Revitalize Manufacturing?

China’s manufacturing sector, long considered the world’s factory, is poised for a transformative shift through digital integration. The State Council’s commitment to revamp the industry is a testament to the government’s recognition of the dynamism digital technologies bring. This strategic move dovetails with the global trend of Industry 4.0, where automation and data are reshaping production landscapes. China’s directive is

Read More