Stephen Morai

Stephen Morai

Threat Management Analyst

Stephen Morai specializes in cybersecurity threats, focusing on hackers and threat actors for government organizations. His content covers state-sponsored cyberattacks, advanced persistent threats (APTs), and the importance of threat intelligence in cybersecurity. Although focusing mainly on government-centered insights, Stephen’s publications also translate well to enterprises and large-scale organizations. 

Hackers & Threats Trend Analysis: Government App Security Measures

Recent developments have brought significant attention to app security measures within government agencies, highlighting the growing focus on safeguarding sensitive information. One notable instance is the decision by the U.S. House of Representatives to ban WhatsApp on government-issued devices.

Trend Analysis: Government App Security Measures
Hackers & Threats Are Guest Users a Hidden Risk in Your Entra Environment?

In the ever-evolving landscape of cyber threats, enterprises constantly face the challenge of maintaining secure environments while embracing collaborative solutions. Microsoft's Entra ID provides a robust identity and access management system, yet it comes with its own set of risks,

Are Guest Users a Hidden Risk in Your Entra Environment?
Hackers & Threats China-Nexus Actors Launch Sophisticated Cyber-Espionage Campaign

In a significant technological security breach, cyber-espionage campaigns have become more sophisticated, employing increasingly advanced tactics to infiltrate sensitive regions. Notably, a particular campaign attributed to China-nexus actors, dubbed "LapDogs," has generated substantial

China-Nexus Actors Launch Sophisticated Cyber-Espionage Campaign
Hackers & Threats How Is Qilin Elevating Ransomware Tactics with Legal Threats?

Imagine a world where a ransomware attack doesn't just freeze your crucial files; instead, it escalates into an overwhelmingly personal crisis, with threats of legal action arriving in your inbox. This is not a hypothetical argument; it is the startling evolution of cybercrime perpetrated by

How Is Qilin Elevating Ransomware Tactics with Legal Threats?
Hackers & Threats Are New Cyber Threats Testing Global Cybersecurity Defenses?

To discuss the intricate landscape of cyber espionage and the far-reaching vulnerabilities it exploits, we're joined by Malik Haidar, a distinguished cybersecurity expert renowned for his work in safeguarding multinational corporations. Malik's insights into the integration of business

Are New Cyber Threats Testing Global Cybersecurity Defenses?
Hackers & Threats How Is APT28 Exploiting Email Vulnerabilities in Ukraine?

Malik Haidar is a renowned cybersecurity expert, known for his strategic approach to threat intelligence and securing multinational corporations. Drawing from a wealth of experience in analyzing and countering cyber threats, Malik offers profound insights into the complex landscape of

How Is APT28 Exploiting Email Vulnerabilities in Ukraine?
Hackers & Threats Trend Analysis: Cybersecurity in Cryptocurrency Exchanges

A recent cyberattack left the Iranian cryptocurrency exchange Nobitex reeling, as the Israeli hacktivist group Predatory Sparrow reportedly stole over $90 million in digital currency. This attack was not merely for financial gain; it carried political undertones, with "vanity addresses

Trend Analysis: Cybersecurity in Cryptocurrency Exchanges
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address