Stephen Morai

Stephen Morai

Threat Management Analyst

Stephen Morai specializes in cybersecurity threats, focusing on hackers and threat actors for government organizations. His content covers state-sponsored cyberattacks, advanced persistent threats (APTs), and the importance of threat intelligence in cybersecurity. Although focusing mainly on government-centered insights, Stephen’s publications also translate well to enterprises and large-scale organizations. 

Hackers & Threats SLH Cyber Group Recruits Women for Advanced Vishing Attacks

Malik Haidar stands at the intersection of human psychology and high-level network security, having spent years defending multinational infrastructures from the world’s most sophisticated hacking collectives. His deep understanding of how threat actors exploit organizational trust has made him a l

SLH Cyber Group Recruits Women for Advanced Vishing Attacks
Hackers & Threats Sophisticated ClickFix Attacks Deploy New MIMICRAT Trojan

The digital landscape has transformed into a minefield where a simple click on a familiar verification prompt can quietly dismantle the most robust corporate security perimeters in seconds. Modern adversaries have moved beyond crude phishing emails, instead opting for the "ClickFix

Sophisticated ClickFix Attacks Deploy New MIMICRAT Trojan
Hackers & Threats Security Flaws Expose 40,000 OpenClaw AI Assistant Instances

Malik Haidar has spent his career at the intersection of business strategy and high-stakes cybersecurity, navigating the complex digital landscapes of multinational corporations. As organizations rush to adopt agentic AI to streamline their operations, Malik focuses on the hidden dangers lurking

Security Flaws Expose 40,000 OpenClaw AI Assistant Instances
Hackers & Threats AI Surge Drives Record Ransomware Attacks and Declining Profits

The digital landscape of 2025 was defined by a startling contradiction where the sheer volume of ransomware attacks reached unprecedented heights even as the financial rewards for cybercriminals began to shrink. The year closed with a documented 30% surge in victims, yet this escalation in activity

AI Surge Drives Record Ransomware Attacks and Declining Profits
Hackers & Threats OysterLoader Malware Evolves With Sophisticated C2 Tactics

A Persistent Threat on the Rise In the ever-escalating arms race of cybersecurity, few threats demonstrate the rapid, intelligent adaptation needed to consistently bypass modern defenses quite like the malware loader now known as OysterLoader. This highly adaptive malware has carved out a

OysterLoader Malware Evolves With Sophisticated C2 Tactics
Hackers & Threats Bloody Wolf Hits Russia, Uzbekistan With NetSupport RAT

From Regional Nuisance to Coordinated Threat: Understanding the Bloody Wolf Campaign A sophisticated cyber-threat actor is methodically striking key industries across Russia and Central Asia, demonstrating a disturbing evolution from opportunistic attacks to a highly organized campaign. Known to

Bloody Wolf Hits Russia, Uzbekistan With NetSupport RAT
Hackers & Threats TeamPCP Builds a Cloud-Native Cybercrime Ecosystem

With extensive experience combating cyber threats in multinational corporations, Malik Haidar brings a unique perspective that blends deep analytics with practical business security. Today, we're diving into the anatomy of the TeamPCP campaign, a threat that weaponizes common misconfigurations

TeamPCP Builds a Cloud-Native Cybercrime Ecosystem
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address