Stephen Morai

Stephen Morai

Threat Management Analyst

Stephen Morai specializes in cybersecurity threats, focusing on hackers and threat actors for government organizations. His content covers state-sponsored cyberattacks, advanced persistent threats (APTs), and the importance of threat intelligence in cybersecurity. Although focusing mainly on government-centered insights, Stephen’s publications also translate well to enterprises and large-scale organizations. 

Hackers & Threats How Is UAT-7237 Targeting Taiwan’s Web Infrastructure?

Welcome to an in-depth conversation with Malik Haidar, a renowned cybersecurity expert with years of experience safeguarding multinational corporations from sophisticated cyber threats. With a sharp focus on analytics, intelligence, and integrating business perspectives into security strategies,

How Is UAT-7237 Targeting Taiwan’s Web Infrastructure?
Hackers & Threats Trend Analysis: AI-Driven Cybersecurity Threats

Introduction to a Growing Digital Menace In an alarming development, Google recently issued a critical "red alert" to 1.8 billion users worldwide, warning of a sophisticated AI-driven scam exploiting Gemini, its own artificial intelligence assistant. This incident underscores a chilling

Trend Analysis: AI-Driven Cybersecurity Threats
Hackers & Threats Coyote Malware Exploits Windows UI to Steal Banking Data

I'm thrilled to sit down with Malik Haidar, a seasoned cybersecurity expert with a wealth of experience in tackling digital threats across multinational corporations. With a sharp focus on analytics, intelligence, and security, Malik has a unique knack for blending business insights with

Coyote Malware Exploits Windows UI to Steal Banking Data
Hackers & Threats Episource Data Breach Exposes Millions to Cybercriminals

In a significant lapse in cybersecurity, healthcare industry service providers face an alarming rise in cyber threats, as illustrated by the recent data breach at Episource, a medical billing company impacting over 5.4 million individuals in the United States. Detected on February 6, 2025, the

Episource Data Breach Exposes Millions to Cybercriminals
Editorial Why B2B Firms Must Prioritize Cyber Resilience Now

Cybersecurity is no longer a technology issue but a core business concern in today's high-speed threat environment. The increasing rate of attacks and increasingly obscure methodologies have left organizations with little time to consider protecting their operations and customers. This

Why B2B Firms Must Prioritize Cyber Resilience Now
Hackers & Threats Can Food Retail Survive the Surge in Ransomware Attacks?

Malik Haidar, a well-respected figure in the realm of cybersecurity, has a wealth of experience tackling complex security challenges for multinational corporations. With his extensive knowledge of analytics, intelligence, and security, Malik offers unique insights into the recent data breach at

Can Food Retail Survive the Surge in Ransomware Attacks?
Hackers & Threats Iranian Cyber Threats Target U.S. Defense and Critical Systems

Recent advancements in cyber warfare highlight a persistent challenge: protecting U.S. defense and critical systems from Iranian cyber threats. This environment of increasing danger is defined by the strategic operations of Iranian state-sponsored actors, targeting vital sectors including the

Iranian Cyber Threats Target U.S. Defense and Critical Systems
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address