Stephen Morai

Stephen Morai

Threat Management Analyst

Stephen Morai specializes in cybersecurity threats, focusing on hackers and threat actors for government organizations. His content covers state-sponsored cyberattacks, advanced persistent threats (APTs), and the importance of threat intelligence in cybersecurity. Although focusing mainly on government-centered insights, Stephen’s publications also translate well to enterprises and large-scale organizations. 

Hackers & Threats U.S. Military Cuts Cyber Training to Focus on Missions

In an era where digital battlegrounds are as critical as physical ones, the U.S. Department of Defense has made a bold and somewhat controversial decision to scale back mandatory cybersecurity training for military personnel, redirecting focus toward mission-critical operations. This policy shift,

U.S. Military Cuts Cyber Training to Focus on Missions
Hackers & Threats How Do Sanctions Weaken Nation-State Cyber Ecosystems?

In an era where cyber threats from nation-states loom larger than ever, with over 60% of global organizations reporting state-sponsored attacks in recent surveys, a pivotal gathering has emerged to tackle this escalating challenge head-on. The inaugural meeting of the RUSI Cyber Sanctions

How Do Sanctions Weaken Nation-State Cyber Ecosystems?
Hackers & Threats DeskRAT Cyber-Espionage Tool – Review

Unveiling a New Threat in Cyber Warfare In an era where digital battlegrounds are as critical as physical ones, a staggering statistic emerges: over 60% of government institutions worldwide have faced targeted cyber-espionage in the past two years, highlighting the urgent need for robust

DeskRAT Cyber-Espionage Tool – Review
Hackers & Threats How Are Chinese Hackers Exploiting SharePoint Flaws Globally?

In a world where digital collaboration tools are the backbone of modern enterprises, a hidden battle unfolds as cybercriminals exploit trusted systems to infiltrate sensitive networks, leaving organizations vulnerable. Picture a telecommunications giant in the Middle East or a university in the

How Are Chinese Hackers Exploiting SharePoint Flaws Globally?
Hackers & Threats How Are North Korean Hackers Stealing Billions in Crypto?

The cryptocurrency industry is facing an unprecedented crisis as North Korean hackers, led by the notorious Lazarus Group, have stolen over $2 billion in digital assets in just one year, rocking the financial foundations of the crypto world. This staggering figure, achieved through a series of

How Are North Korean Hackers Stealing Billions in Crypto?
Hackers & Threats Why Is Endpoint Security Crucial for Modern Enterprises?

In an era where digital transformation shapes every facet of business, the protection of end-user devices has emerged as a cornerstone of organizational resilience, especially when considering the devastating impact of cyber threats. Imagine a multinational corporation facing a ransomware attack

Why Is Endpoint Security Crucial for Modern Enterprises?
Hackers & Threats How Did Microsoft Stop the Rhysida Ransomware Campaign?

In the ever-evolving world of cybersecurity, few threats are as insidious as ransomware campaigns that exploit user trust in well-known brands. Today, we’re sitting down with Malik Haidar, a seasoned cybersecurity expert with a deep background in threat intelligence and analytics. With years of e

How Did Microsoft Stop the Rhysida Ransomware Campaign?
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address