Stephen Morai

Stephen Morai

Threat Management Analyst

Stephen Morai specializes in cybersecurity threats, focusing on hackers and threat actors for government organizations. His content covers state-sponsored cyberattacks, advanced persistent threats (APTs), and the importance of threat intelligence in cybersecurity. Although focusing mainly on government-centered insights, Stephen’s publications also translate well to enterprises and large-scale organizations. 

Hackers & Threats Trend Analysis: Asian APT Actors Expansion

Advanced persistent threat actors originating from Asia, especially in nations like China and North Korea, have significantly intensified their cyber activities on the global stage. As international relations grow more complex, these cyber actors are increasingly being recognized for their

Trend Analysis: Asian APT Actors Expansion
Hackers & Threats Cybercriminals Exploit AI Tools with Fake Installers and Malware

The burgeoning interest in artificial intelligence (AI) has introduced new cybersecurity challenges as cybercriminals increasingly exploit AI tools through deceptive practices involving fake installers and malware. Leveraging the widespread popularity and trust surrounding AI applications such as

Cybercriminals Exploit AI Tools with Fake Installers and Malware
Hackers & Threats Luna Moth Targets U.S. Law Firms with Stealth Phishing Attacks

In the dynamic field of cybersecurity, Malik Haidar stands out with his exceptional expertise in handling sophisticated threats and managing hacker infiltration within some of the world's largest companies. With a robust background in analytics, intelligence, and security, Malik brings a

Luna Moth Targets U.S. Law Firms with Stealth Phishing Attacks
Hackers & Threats How Are Global Forces Winning the Cybercrime Battle?

As cybercrime continues to pose a significant threat to individuals and businesses worldwide, global law enforcement agencies have intensified their countermeasures, steering significant operations such as Operation Endgame and Operation RapTor. These initiatives have targeted ransomware networks

How Are Global Forces Winning the Cybercrime Battle?
Hackers & Threats How Was the Lumma Stealer Malware Network Taken Down?

In an unprecedented global effort, the notorious Lumma Stealer malware network was dismantled, marking a historic victory against cybercrime. Coordinated actions by law enforcement agencies and private cybersecurity firms successfully neutralized a network that had compromised millions of Windows

How Was the Lumma Stealer Malware Network Taken Down?
Hackers & Threats Should the US Bolster Cyber Retaliation Against China?

The Trump Administration is taking a stronger stance on cyber retaliation against Chinese cyber-attacks on critical U.S. infrastructure, specifically targeting advanced persistent threat (APT) groups like Volt Typhoon and Salt Typhoon. This shift in policy underscores a more assertive response to

Should the US Bolster Cyber Retaliation Against China?
Hackers & Threats Are Schools Prepared for Rising Ransomware Threats?

With a disturbing trend of ransomware attacks plaguing U.S. educational institutions, there is mounting concern regarding the readiness of schools to thwart these assaults. Recently, a significant ransomware breach in a Texas school district compromised sensitive personal data, underscoring the

Are Schools Prepared for Rising Ransomware Threats?
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address