Stephen Morai

Stephen Morai

Threat Management Analyst

Stephen Morai specializes in cybersecurity threats, focusing on hackers and threat actors for government organizations. His content covers state-sponsored cyberattacks, advanced persistent threats (APTs), and the importance of threat intelligence in cybersecurity. Although focusing mainly on government-centered insights, Stephen’s publications also translate well to enterprises and large-scale organizations. 

Hackers & Threats Are Guest Users a Hidden Risk in Your Entra Environment?

In the ever-evolving landscape of cyber threats, enterprises constantly face the challenge of maintaining secure environments while embracing collaborative solutions. Microsoft's Entra ID provides a robust identity and access management system, yet it comes with its own set of risks,

Are Guest Users a Hidden Risk in Your Entra Environment?
Hackers & Threats China-Nexus Actors Launch Sophisticated Cyber-Espionage Campaign

In a significant technological security breach, cyber-espionage campaigns have become more sophisticated, employing increasingly advanced tactics to infiltrate sensitive regions. Notably, a particular campaign attributed to China-nexus actors, dubbed "LapDogs," has generated substantial

China-Nexus Actors Launch Sophisticated Cyber-Espionage Campaign
Hackers & Threats How Is Qilin Elevating Ransomware Tactics with Legal Threats?

Imagine a world where a ransomware attack doesn't just freeze your crucial files; instead, it escalates into an overwhelmingly personal crisis, with threats of legal action arriving in your inbox. This is not a hypothetical argument; it is the startling evolution of cybercrime perpetrated by

How Is Qilin Elevating Ransomware Tactics with Legal Threats?
Hackers & Threats Are New Cyber Threats Testing Global Cybersecurity Defenses?

To discuss the intricate landscape of cyber espionage and the far-reaching vulnerabilities it exploits, we're joined by Malik Haidar, a distinguished cybersecurity expert renowned for his work in safeguarding multinational corporations. Malik's insights into the integration of business

Are New Cyber Threats Testing Global Cybersecurity Defenses?
Hackers & Threats How Is APT28 Exploiting Email Vulnerabilities in Ukraine?

Malik Haidar is a renowned cybersecurity expert, known for his strategic approach to threat intelligence and securing multinational corporations. Drawing from a wealth of experience in analyzing and countering cyber threats, Malik offers profound insights into the complex landscape of

How Is APT28 Exploiting Email Vulnerabilities in Ukraine?
Hackers & Threats Trend Analysis: Cybersecurity in Cryptocurrency Exchanges

A recent cyberattack left the Iranian cryptocurrency exchange Nobitex reeling, as the Israeli hacktivist group Predatory Sparrow reportedly stole over $90 million in digital currency. This attack was not merely for financial gain; it carried political undertones, with "vanity addresses

Trend Analysis: Cybersecurity in Cryptocurrency Exchanges
Hackers & Threats Can Global Cooperation Stop Information-Stealing Malware?

In an age dominated by digital connectivity, cybercriminals are becoming increasingly adept at exploiting vulnerabilities to steal sensitive information. Information-stealing malware, which silently extracts browser credentials, passwords, and financial data, poses a monumental challenge across the

Can Global Cooperation Stop Information-Stealing Malware?
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address