Stephen Morai specializes in cybersecurity threats, focusing on hackers and threat actors for government organizations. His content covers state-sponsored cyberattacks, advanced persistent threats (APTs), and the importance of threat intelligence in cybersecurity. Although focusing mainly on government-centered insights, Stephen’s publications also translate well to enterprises and large-scale organizations.
Every business today faces the potential threat of ransomware attacks, making it crucial to have robust defense strategies in place. As cybercriminals evolve, so must the methods organizations use to protect themselves. This article emphasizes a blend of technological solutions and a strong culture
The wave of Distributed Denial of Service (DDoS) attacks sweeping across Europe highlights a pressing need for advanced cybersecurity measures. In fact, the European Cyber Report 2025 reveals a staggering 137% surge in DDoS attacks on the Link11 network over the past year. These attacks are not
In today's digital age, cybersecurity is more critical than ever, with organizations facing a relentless wave of cyber threats. The need for robust systems and proactive measures for threat detection and analysis cannot be overstated, as the cost of data breaches and cyberattacks continues to
The ubiquitous nature of apps in today's digital age has brought not just unparalleled convenience but also significant risks, as seen with the alarming rise in spyware within the Google Play Store. The Google Play Store, relied upon daily by millions globally, is facing increasing incidents
In an impressive turn of events, ransomware payments globally have decreased significantly, falling over a third to $813 million in 2024, primarily driven by victims' increased resistance to cybercriminals and effective actions by law enforcement agencies. Despite ransomware attacks continuing
With the rise of language models (LLMs) in various applications, security has become a paramount concern, especially as new jailbreaking techniques emerge. Jailbreaking involves bypassing the built-in safety measures of LLMs to elicit harmful, biased, or inappropriate outputs. Recent research by
The rapid shift to remote work has fundamentally altered the landscape of work and posed new challenges in ensuring cyber security. As companies adapted to the new normal, the pivot from traditional office environments to remote settings presented both opportunities and vulnerabilities in the realm
SecurityNews uses cookies to personalize your experience on our website. By continuing to use this site, you agree to our Cookie Policy