Stephen Morai

Stephen Morai

Threat Management Analyst

Stephen Morai specializes in cybersecurity threats, focusing on hackers and threat actors for government organizations. His content covers state-sponsored cyberattacks, advanced persistent threats (APTs), and the importance of threat intelligence in cybersecurity. Although focusing mainly on government-centered insights, Stephen’s publications also translate well to enterprises and large-scale organizations. 

Hackers & Threats US Sentences Russian Broker in Ransomware Crackdown

The sentencing of Aleksei Olegovich Volkov to nearly seven years in federal prison represents a critical milestone in the Department of Justice's ongoing initiative to dismantle the specialized financial and technical structures supporting global ransomware operations. As an initial access

US Sentences Russian Broker in Ransomware Crackdown
Hackers & Threats High-Tech Surpasses Finance as the Top Cyber Target

The global digital landscape underwent a seismic shift over the past twelve months as sophisticated threat actors redirected their focus from traditional monetary vaults to the underlying architecture of the modern economy. Historically, financial institutions occupied the unenviable position of

High-Tech Surpasses Finance as the Top Cyber Target
Hackers & Threats Rising Threat of BYOVD Techniques and EDR Killer Malware

Malik Haidar is a veteran cybersecurity strategist and threat intelligence specialist who has spent over a decade defending multinational infrastructures from high-level state actors and ransomware syndicates. With a background that merges deep technical analytics with business risk management, he

Rising Threat of BYOVD Techniques and EDR Killer Malware
Hackers & Threats Hive0163 Uses AI-Assisted Slopoly Malware for Persistence

The emergence of AI-driven malware development signifies a pivotal moment where the speed of coding now matches the urgency of financial extortion cycles in the digital underground. Researchers have recently observed the Hive0163 threat group integrating AI-assisted PowerShell scripts into their

Hive0163 Uses AI-Assisted Slopoly Malware for Persistence
Editorial Ransomware’s Shift: Data Theft and Double Extortion

The ransomware playbook has changed. Encryption is no longer the main pain point; stolen data is. Criminal groups are monetizing breaches twice: first by locking systems, then by threatening to publish or sell confidential information. That pressure campaign works because the business fallout is

Ransomware’s Shift: Data Theft and Double Extortion
Hackers & Threats Chinese Cyberespionage Targets Southeast Asian Militaries

Modern warfare has transitioned from the physical battlefield into the silent, digital corridors of military command centers, where the most dangerous weapon is often an invisible line of code. In Southeast Asia, this shift has become a stark reality as defense networks increasingly find themselves

Chinese Cyberespionage Targets Southeast Asian Militaries
Hackers & Threats Is Your Veeam Backup Safe From Critical RCE Vulnerabilities?

Securing your organizational data requires more than just scheduling a daily backup; it demands a constant vigil over the very infrastructure designed to protect you from disaster. Recent security disclosures have revealed a series of critical vulnerabilities in Veeam Backup & Replication that

Is Your Veeam Backup Safe From Critical RCE Vulnerabilities?
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address