INTELLIGENCE > Hot Spots > North Korea


« Back to News

2025-02-03

US Nationals Indicted For Fraudulent Remote IT Work

The FBI has uncovered a plot to install North Korean IT workers as remote employees to generate revenue for North Korea and evade sanctions.

2024-11-25

Hackers Steal $10M Via LinkedIn

North Korean hackers masquerading as recruiters for high profile financial services firms using LinkedIn to contact prospective targets.

2024-08-20

North Korean IT Contractor Fraud

Laptop Farming: North Korean IT workers were logging on to work from locations in China, while appearing to be contractors located in the US.

2024-08-07

KnowBe4 Duped Into Hiring A North Korean Hacker

Laptop Mule Farm Espionage: North Korean threat actors attempt to penetrate US organisations by posing as remote IT workers. 

2024-07-26

Most Wanted - North Korean Hackers 

$10m Reward: Information leading to the location of Rim Jong Hyok, known to be associated with the Andariel state-sponsored hacking group.

2024-07-03

South Korea Hit By DDoS Attacks

Major Disruption: South Korea is subject to widespread cyber attacks targeting government, critical infrastructure & financial institutions.

2023-12-19

Joint Opposition To Online Threats From North Korea

The USA, Japan and South Korea have established a high-level consultative body designed to counter North Korea’s cyber activities.

2022-12-01

Defending Against North Korea's Cyber Threats

The US and South Korea are to cooperate on mutual defense measures to combat the cybercrime capabilities of North Korea's state sponsored hackers.

2022-08-22

Lazarus Targets FinTech Engineers With MacOS Malware

Lazarus group is using a malicious macOS exploit to impersonate Coinbase with fake job posting to lure unwitting workers in the FinTech sector.

2022-07-13

N.Korean Hackers Target US Health Providers With Ransomware

CISA Points The Finger: The US security agency recommends that companies in the healthcare industry take a zero-trust, identity first approach.

2022-06-20

The Internet & Freedom Of The Press

The Internet was conceived as a borderless network permitting the free flow of information around the world, but barriers and controls are proliferating.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Digital Gurus Recruitment

Digital Gurus Recruitment

Digital Gurus provide specialist recruitment services in areas including IT and information security

Gurucul

Gurucul

Gurucul predictive security analytics protects against insider threats, account compromise and data exfiltration on-premises and in the cloud.

National Cyber Security Directorate (DNSC) - Romania

National Cyber Security Directorate (DNSC) - Romania

DNSC (formerly CERT-RO) is the Romanian national cyber security and incident response team.

XCure Solutions

XCure Solutions

XCure Solutions are a Finnish company specializing in data security, data protection and data recovery.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

Approach

Approach

Approach is a leading provider of cyber security consulting and secure application development services in Belgium.

FraudHunt

FraudHunt

FraudHunt protects your website from account fraud, ad fraud, fraud clicks, and malicious bots.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

Cryptika

Cryptika

Cryptika is a fully integrated IT security and managed services provider, specialized in Next-Generation Cyber Security Technologies.

Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions Corp. is a North American IT solution provider delivering advanced analytics, cloud, cybersecurity, and managed services solutions.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

UM6P Ventures

UM6P Ventures

UM6P Ventures is an African based early-stage ventures firm operating two funds; a Digital Transformation fund and a Deeptech Ventures fund.

CLEAR

CLEAR

With more than 17 million members and a growing network of partners across the world, CLEAR's identity platform is transforming the way people live, work, and travel.

Bluerydge

Bluerydge

Bluerydge specialises in cyber security and technology, focusing on the delivery of innovative sovereign solutions through trusted, cleared and experienced professionals.

Velstadt Cybersecurity

Velstadt Cybersecurity

Velstadt's team of experienced professionals works on identifying vulnerabilities, analyzing threats, and developing strategies to ensure the highest level of security.