Stephen Morai

Stephen Morai

Threat Management Analyst

Stephen Morai specializes in cybersecurity threats, focusing on hackers and threat actors for government organizations. His content covers state-sponsored cyberattacks, advanced persistent threats (APTs), and the importance of threat intelligence in cybersecurity. Although focusing mainly on government-centered insights, Stephen’s publications also translate well to enterprises and large-scale organizations. 

Hackers & Threats Trend Analysis: RMM Software Abuse

The very tools designed to simplify IT management and provide remote support are now being systematically turned against organizations, creating a powerful and often invisible backdoor for sophisticated cybercriminals. This alarming trend signifies a critical shift in the threat landscape, where

Trend Analysis: RMM Software Abuse
Hackers & Threats Is Your Infrastructure Safe From the RondoDoX Botnet?

A highly sophisticated cyber-threat group has demonstrated a dramatic escalation in its campaign tactics, rapidly evolving from manual probing to hourly automated attacks against global enterprise infrastructure. An extensive analysis of the group’s command-and-control server logs from March t

Is Your Infrastructure Safe From the RondoDoX Botnet?
Hackers & Threats Kimwolf Botnet Hijacks Millions of Android Devices

An unseen army of digital soldiers is quietly operating from millions of living rooms and offices across the globe, and the devices they inhabit are not computers or servers but the unassuming Android TV boxes and smart gadgets that have become fixtures of modern life. A sophisticated malware known

Kimwolf Botnet Hijacks Millions of Android Devices
Hackers & Threats Are States Ready for AI-Driven Terrorism?

The rapid democratization of artificial intelligence is no longer a theoretical concern for futurists but a present and escalating reality for national security agencies worldwide. As advanced technologies become more accessible, the long-standing capabilities gap that once separated state actors

Are States Ready for AI-Driven Terrorism?
Hackers & Threats China-Linked Hackers Escape VMware VMs With Zero-Days

The foundational assumption that virtual machines are securely isolated from their underlying hosts has been profoundly challenged by a sophisticated cyber espionage campaign that weaponized previously unknown vulnerabilities. A meticulously crafted attack, attributed to a Chinese-speaking threat

China-Linked Hackers Escape VMware VMs With Zero-Days
Hackers & Threats Is Your OSINT an Asset or Just an Activity?

A top-tier open-source intelligence analyst resigns, and overnight, a decade's worth of specialized investigative knowledge walks out the door, leaving behind nothing but a few cryptic, half-finished reports on a shared drive. For many organizations, this scenario is not a hypothetical but a

Is Your OSINT an Asset or Just an Activity?
Hackers & Threats Cyber Warfare Fails to Deliver Decisive Blows

A comprehensive analysis of major contemporary conflicts has revealed a stark and increasingly undeniable truth: offensive cyber operations, long heralded as a revolutionary tool of statecraft, consistently fall short of their hyped potential to deliver decisive battlefield effects. Despite the

Cyber Warfare Fails to Deliver Decisive Blows
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address