Stephen Morai

Stephen Morai

Threat Management Analyst

Stephen Morai specializes in cybersecurity threats, focusing on hackers and threat actors for government organizations. His content covers state-sponsored cyberattacks, advanced persistent threats (APTs), and the importance of threat intelligence in cybersecurity. Although focusing mainly on government-centered insights, Stephen’s publications also translate well to enterprises and large-scale organizations. 

Hackers & Threats OysterLoader Malware Evolves With Sophisticated C2 Tactics

A Persistent Threat on the Rise In the ever-escalating arms race of cybersecurity, few threats demonstrate the rapid, intelligent adaptation needed to consistently bypass modern defenses quite like the malware loader now known as OysterLoader. This highly adaptive malware has carved out a

OysterLoader Malware Evolves With Sophisticated C2 Tactics
Hackers & Threats Bloody Wolf Hits Russia, Uzbekistan With NetSupport RAT

From Regional Nuisance to Coordinated Threat: Understanding the Bloody Wolf Campaign A sophisticated cyber-threat actor is methodically striking key industries across Russia and Central Asia, demonstrating a disturbing evolution from opportunistic attacks to a highly organized campaign. Known to

Bloody Wolf Hits Russia, Uzbekistan With NetSupport RAT
Hackers & Threats TeamPCP Builds a Cloud-Native Cybercrime Ecosystem

With extensive experience combating cyber threats in multinational corporations, Malik Haidar brings a unique perspective that blends deep analytics with practical business security. Today, we're diving into the anatomy of the TeamPCP campaign, a threat that weaponizes common misconfigurations

TeamPCP Builds a Cloud-Native Cybercrime Ecosystem
Hackers & Threats Singapore Foils Major Chinese Cyber-Espionage Campaign

The intricate digital architecture underpinning a nation’s connectivity became the silent battleground for an 11-month clandestine war, culminating in Singapore’s successful disruption of a sophisticated state-sponsored espionage campaign. This extended engagement, codenamed "Operation Cyber Gu

Singapore Foils Major Chinese Cyber-Espionage Campaign
Hackers & Threats DPRK Hackers Impersonate Professionals on LinkedIn

The seemingly legitimate job application sitting in a hiring manager's inbox, complete with a verified profile and convincing credentials, could be the digital key handed directly to a state-sponsored operative seeking to fund a nation's weapons program. This scenario is not theoretical;

DPRK Hackers Impersonate Professionals on LinkedIn
Hackers & Threats State-Sponsored Hackers Hijack Notepad++ Updates

A sophisticated cyber-espionage campaign has revealed how even the most trusted and widely used software can be turned into a weapon against a select few, as state-sponsored actors successfully compromised the update mechanism for the popular text editor, Notepad++. Rather than a broad,

State-Sponsored Hackers Hijack Notepad++ Updates
Hackers & Threats ShadowSyndicate's SSH Flaw Exposes Vast Cybercrime Network

A subtle but persistent operational security mistake has provided security researchers with an unprecedented look into the sprawling infrastructure of a prolific cybercrime group known as ShadowSyndicate. A comprehensive analysis has unraveled a complex web of malicious servers by tracing a single,

ShadowSyndicate's SSH Flaw Exposes Vast Cybercrime Network
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address