Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
Is Your Network Secure Against the CVE-2024-21762 Exploit?
Cyber Security
Is Your Network Secure Against the CVE-2024-21762 Exploit?

Fortinet has issued an urgent security warning regarding a critical flaw in its FortiOS SSL VPN products. Bearing the identifier CVE-2024-21762, this vulnerability poses a serious risk with its 9.6 CVSS score, highlighting its potential for severe consequences. The issue affects versions 6.0 through 7.4 of FortiOS and allows remote attackers, without requiring authentication, to run arbitrary code or commands

Read More
How Did Zardoor Malware Infiltrate a Saudi Charity’s Network?
Cyber Security
How Did Zardoor Malware Infiltrate a Saudi Charity’s Network?

Cybersecurity breaches show no prejudice in selecting their victims, as demonstrated by a complex cyber-espionage attack on a Saudi Arabian non-profit organization. This invasion, which targeted the charity for its confidential data, is a sobering indicator of the expanding scope of cyber threats. It serves as a warning that no industry is immune to such dangers. Indeed, this incident highlights

Read More
Is the South African Hospitality Sector Under Cyber Attack?
Cyber Security
Is the South African Hospitality Sector Under Cyber Attack?

Sophos, a leading cybersecurity company, has flagged a serious cyber threat impacting South Africa’s thriving hospitality sector. This sector, pivotal to the nation’s economy with contributions exceeding $1.3 billion and contributing 3.2% to the GDP in 2021, is being targeted by hackers through a campaign called ‘Inhospitality’. This attack is a malicious ploy exploiting the sector’s dedication to stellar customer

Read More
Embracing Managed IT Services for Enhanced Business Efficiency
DevOps
Embracing Managed IT Services for Enhanced Business Efficiency

In today’s technologically driven business environment, the seamless operation and security of IT systems are essential. With the technological landscape evolving rapidly, many businesses are opting for Managed IT Services to maintain a competitive edge. Managed Service Providers (MSPs) offer the expertise necessary to manage IT infrastructure efficiently, ensuring data protection and improving overall tech performance. The transition to such

Read More
Industry 4.0 Transformation: Balancing Technology with Human Collaboration
IT Digital Transformation
Industry 4.0 Transformation: Balancing Technology with Human Collaboration

Embarking on the path of digitalization, organizations often encounter the complex interplay between ambition and reality. While many have a theoretical blueprint for transformation, the crux of the struggle lies in the actual implementation—bridging the gap between emerging digital possibilities and existing workforce dynamics. Companies must navigate through resistance to change, often stemming from a workforce entrenched in legacy systems

Read More
Emerging RustDoor Backdoor Threatens macOS Systems Security
Cyber Security
Emerging RustDoor Backdoor Threatens macOS Systems Security

The cybersecurity world is grappling with a new menace called “RustDoor,” a backdoor exploit specifically targeting macOS users. Contrary to the popular belief that macOS systems are relatively safe from such attacks, RustDoor epitomizes the platform’s susceptibility to cyber threats that are usually associated with other operating systems. This analysis delves deep into RustDoor’s capabilities, shedding light on how it

Read More
GitGuardian and CyberArk Forge DevSecOps Alliance for Secret Safety
DevOps
GitGuardian and CyberArk Forge DevSecOps Alliance for Secret Safety

The collaboration between cybersecurity frontrunners GitGuardian and CyberArk signals an important progression in the realm of application security. This strategic partnership focuses on harmonizing secrets detection and management systems, a move set to provide stronger protection in the crucial area of exposed application secrets. With the integration of GitGuardian’s robust detection tools and CyberArk’s advanced secrets management solutions, the alliance

Read More
How Is Lurie Hospital Mitigating Impact of Cybersecurity Breach?
Cyber Security
How Is Lurie Hospital Mitigating Impact of Cybersecurity Breach?

Lurie Children’s Hospital in Chicago recently fell victim to a severe cybersecurity breach, resulting in its network being taken offline and interrupting hospital operations. The hospital promptly responded by implementing its emergency protocols to maintain patient care and safety. Patients faced delays and inconveniences, highlighting the personal impact of such cyberattacks. The hospital has been working around the clock to

Read More
ResumeLooters Strikes Asia-Pacific: Cyberattacks Compromise Millions of Data Entries
Cyber Security
ResumeLooters Strikes Asia-Pacific: Cyberattacks Compromise Millions of Data Entries

The cyber realm faces relentless attacks by malicious actors, and the latest breach by a syndicate called “ResumeLooters” underscores this ongoing battle. The cybersecurity experts at Group-IB have uncovered that this group has been actively targeting employment and retail websites throughout the Asia-Pacific region. Their prolonged cyber assault is designed to exploit weaknesses in digital security, proving that threats are

Read More
Enhancing Transparency Online: Meta Labels AI-Generated Images
Cyber Security
Enhancing Transparency Online: Meta Labels AI-Generated Images

In response to the rapid integration of artificial intelligence (AI) into our everyday internet activities, Meta, the parent company of prominent social platforms such as Facebook and Instagram, has implemented measures to address the increasing difficulty users face in distinguishing between content created by AI and that created by humans. Meta’s initiative involves the introduction of specific labels that clearly

Read More
UK Sees Dip in Identity Fraud; Biometrics Gain Favor for Security
Cyber Security
UK Sees Dip in Identity Fraud; Biometrics Gain Favor for Security

In the UK, the specter of identity theft has somewhat lessened, according to FICO’s latest findings. Analyzing recent trends, there’s been a dip in such crimes with an estimated 1.9 million Britons falling prey to identity fraud in 2023, a slight improvement from previous years. Nevertheless, a persistent unease looms as 5.4% of individuals suspect potential misuse of their personal

Read More
Is the UK Court System Failing to Keep Up with the Fraud Surge?
Cyber Security
Is the UK Court System Failing to Keep Up with the Fraud Surge?

The UK court system, traditionally known for its robust legal processes, has hit a snag. A recent report by KPMG, publicized by Infosecurity Magazine, reveals that courts are under immense pressure, handling an alarming number of high-level fraud cases. In 2023, the judiciary heard 226 such cases, a figure that has barely budged from 221 the previous year—despite the sharp

Read More