Stephen Morai

Stephen Morai

Threat Management Analyst

Stephen Morai specializes in cybersecurity threats, focusing on hackers and threat actors for government organizations. His content covers state-sponsored cyberattacks, advanced persistent threats (APTs), and the importance of threat intelligence in cybersecurity. Although focusing mainly on government-centered insights, Stephen’s publications also translate well to enterprises and large-scale organizations. 

Hackers & Threats How Is APT28 Exploiting Email Vulnerabilities in Ukraine?

Malik Haidar is a renowned cybersecurity expert, known for his strategic approach to threat intelligence and securing multinational corporations. Drawing from a wealth of experience in analyzing and countering cyber threats, Malik offers profound insights into the complex landscape of

How Is APT28 Exploiting Email Vulnerabilities in Ukraine?
Hackers & Threats Trend Analysis: Cybersecurity in Cryptocurrency Exchanges

A recent cyberattack left the Iranian cryptocurrency exchange Nobitex reeling, as the Israeli hacktivist group Predatory Sparrow reportedly stole over $90 million in digital currency. This attack was not merely for financial gain; it carried political undertones, with "vanity addresses

Trend Analysis: Cybersecurity in Cryptocurrency Exchanges
Hackers & Threats Can Global Cooperation Stop Information-Stealing Malware?

In an age dominated by digital connectivity, cybercriminals are becoming increasingly adept at exploiting vulnerabilities to steal sensitive information. Information-stealing malware, which silently extracts browser credentials, passwords, and financial data, poses a monumental challenge across the

Can Global Cooperation Stop Information-Stealing Malware?
Hackers & Threats Can Microsoft Patches Counteract Stealth Falcon Attacks?

Microsoft's commitment to cybersecurity remains vital in light of sophisticated threats like Stealth Falcon. Recent efforts have addressed significant vulnerabilities, notably the CVE-2025-33053 flaw within the WebDAV protocol, which Stealth Falcon exploits in targeted cyberattacks. The

Can Microsoft Patches Counteract Stealth Falcon Attacks?
Hackers & Threats How Are Chinese Actors Shaping Global Cyber Threats?

Malik Haidar is a seasoned cybersecurity expert whose wealth of experience spans multiple domains, including threat analytics, intelligence, and robust security measures. His insight into the dynamics of cybersecurity threats, especially within multinational corporations, sets him apart in a field

How Are Chinese Actors Shaping Global Cyber Threats?
Hackers & Threats Unmasking Latrodectus: New Cyber Threats and Defense Tactics

Amidst an interconnected world, cyber threats continue to evolve, posing significant challenges to users and organizations alike. Recently, a sophisticated malware known as Latrodectus has emerged, leveraging unique social engineering tactics that maximize its reach and disruption. As organizations

Unmasking Latrodectus: New Cyber Threats and Defense Tactics
Hackers & Threats How Did a Cyberattack Paralyze Baltimore's City Services?

Could an invisible digital intruder really bring a bustling city to its knees? In the spring of 2019, Baltimore discovered the chilling reality of precisely such an attack when its city services were ensnared by a cybercriminal's web. The operational paralysis revealed the vulnerabilities of

How Did a Cyberattack Paralyze Baltimore's City Services?
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address