INTELLIGENCE > Hot Spots > North Korea


« Back to News

2019-04-25

N. Korea’s 4Cs: Crypto-Currency-Cyber-Crime

North Korea goes to extreme lengths to evade international sanctions and to raise funds. Now it is expanding its efforts to exploit crypto-currencies.

2019-02-06

N. Korea Could Expand Cyber Espionage Activities

In response to the stifling effects of international sanctions, N Korea's hackers could become more important to the regime than ever before.

2018-10-31

North Korea Is Using The Internet Like The Mafia

North Korea has “dramatically” changed its Internet use patterns, as Kim Jong Un directs hacking operations ‘like a Criminal Syndicate’.

2018-09-07

Organizations Hit With North Korea-Linked Ryuk Ransomware

A recent wave of ransomware attacks against organizations have been linked to a notorious North Korean threat actor.

2018-06-01

N Korean Cyber Attacks Continue Despite Peace Talks

Experts see an intensification in the level of cyber attacks from N Korea in the build up to talks with S Korea and the US on de-nuclearisation.

2018-03-16

North Korea's Cyber Soldiers Are Concealed Abroad

Defectors from N Korea reveal the nation's hackers are in fact mostly based outside the country to give the regime enhanced deniability.

2018-03-06

N Korea Is A Bigger Cyber Threat Than Russia

North Korea poses a more considerable cyber-attack threat to the international community than Russia, say the experts at CrowdStrike.

2018-03-02

N Korean Hacking Widens To Target Multinationals

Reaper: North Korea's newest hacker army was busy attacking neighbouring states but is turning its attention to international corporations.

2018-03-01

North Korea's Cyber Army Has A New Battalion

The experts at FireEye have identified a new unit of N Korea's hacker army named APT37, capable of sophisticated international attacks.

2018-01-30

Looming Cyber Threats From Russia & N. Korea

Threats from Russia & N.Korea have increased and cybercriminals have improved their tactics, techniques & procedures, according to Flashpoint.

2018-01-10

Retaliation Against N Korea For WannaCry

The US and British governments appear to be preparing a cyber offensive against N. Korea in payback for the damaging Wannacry attack.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

National Agency for the Security of Information Systems (ANSSI) - France

National Agency for the Security of Information Systems (ANSSI) - France

The role of Agence Nationale de la Sécurité des Systèmes d'Information (ANSSI) is to foster a coordinated, ambitious, pro-active response to cybersecurity issues in France.

Qualitest Group

Qualitest Group

Qualitest is the world’s largest pure play Quality Assurance and software testing company.

InfoWatch

InfoWatch

InfoWatch solutions allow you to protect data and information assets that are critically important to your business.

Riskified

Riskified

Riskified is a leading eCommerce fraud-prevention company, trusted by hundreds of global brands – from luxury fashion houses and retail chains, to gift card and ticket marketplaces.

Untangle

Untangle

Untangle provides network security products designed specifically for the below-enterprise market, safeguarding businesses, home offices, nonprofits, schools and governmental organizations.

Malleum

Malleum

MALLEUM are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

Polyrize

Polyrize

The Polyrize continuous authorization platform for SaaS and IaaS stops tomorrow's public cloud cyber threats, today.

Forum of Incident Response & Security Teams (FIRST)

Forum of Incident Response & Security Teams (FIRST)

FIRST is the global Forum of Incident Response and Security Teams.

Cyber Command - Estonian Defence Forces

Cyber Command - Estonian Defence Forces

The main mission of the Cyber Command is to carry out operations in cyberspace in order to provide command support for Ministry of Defence’s area of responsibility.

Astaara

Astaara

Astaara is an integrated insurance services and risk management advisory business incorporating cyber risk advisory, underwriting and analytics.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

Presidio Identity

Presidio Identity

Presidio Identity offers a digital-native approach that brings security, privacy, and simplicity to user authentication and digital interactions.

Sentar

Sentar

Sentar is a cyber intelligence company, applying advanced analytics and systems engineering expertise to protect our national security by securing mission-critical assets.

Tracebit

Tracebit

Tracebit uses decoys to detect and respond to cloud intrusions in minutes.

EK3 Technologies

EK3 Technologies

EK3 Technologies mission is to provide comprehensive cybersecurity and IT solutions that allow our clients to focus on sustaining their business.