Stephen Morai

Stephen Morai

Threat Management Analyst

Stephen Morai specializes in cybersecurity threats, focusing on hackers and threat actors for government organizations. His content covers state-sponsored cyberattacks, advanced persistent threats (APTs), and the importance of threat intelligence in cybersecurity. Although focusing mainly on government-centered insights, Stephen’s publications also translate well to enterprises and large-scale organizations. 

Hackers & Threats Cybercriminal Developer for LockBit Ransomware Group Arrested in Israel

In a significant move against cybercrime, a dual Russian and Israeli national has been charged by the United States for his role as a developer in the notorious LockBit ransomware group. Arrested in Israel and awaiting extradition, the 51-year-old is accused of building and maintaining software

Cybercriminal Developer for LockBit Ransomware Group Arrested in Israel
Hackers & Threats How Has Ransomware Evolved Over the Last 35 Years?

Ransomware has undergone a significant transformation since its inception in the late 1980s. From rudimentary beginnings to sophisticated, financially motivated attacks, the evolution of ransomware reflects broader changes in technology and cybercrime. This article delves into the history and

How Has Ransomware Evolved Over the Last 35 Years?
Hackers & Threats Israeli Hacker Facing Extradition to U.S. for Alleged Ransomware Crimes

Amid the rising wave of global cybercrime, the legal proceedings surrounding Rostislav Panev, an Israeli hacker from Haifa, have drawn significant attention as he faces extradition to the United States for his alleged involvement in the infamous ransomware network known as LockBit. Panev's

Israeli Hacker Facing Extradition to U.S. for Alleged Ransomware Crimes
Hackers & Threats How Can Effective Communication Boost Cybersecurity Marketing?

In the rapidly evolving cybersecurity landscape, effective communication has become a cornerstone for marketing success. As cyber threats grow increasingly sophisticated, cybersecurity providers must maintain clear, proactive, and consistent communication with clients to build trust and demonstrate

How Can Effective Communication Boost Cybersecurity Marketing?
Editorial 4000 Systems Compromised Through Expired Domains

Security firm WatchTowr Labs claimed to have reset the 4,000 compromised systems’ passwords by seizing control of domain names that were either not renewed or were simply left unused, all for $20 for every domain . This operation revealed challenges associated with traditional infrastructure to s

4000 Systems Compromised Through Expired Domains
Hackers & Threats How Can Businesses Tackle Modern BCDR and Cybersecurity Challenges?

The landscape of modern business is both exhilarating and formidable. As technology progresses at a relentless pace, organizations are confronted with persistent cyberthreats and increasing operational complexities. Protecting data and ensuring seamless business continuity have become significant

How Can Businesses Tackle Modern BCDR and Cybersecurity Challenges?
Hackers & Threats Securing Microsoft 365: Effective Strategies Against Ransomware Threats

Ransomware and other cyber threats are increasingly common in today's digital landscape, making robust cybersecurity measures essential. As a widely used enterprise productivity platform, Microsoft 365 is a major target for cyber-attackers, especially ransomware. According to reports, 76% of

Securing Microsoft 365: Effective Strategies Against Ransomware Threats
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address