INTELLIGENCE > Hot Spots > North Korea


« Back to News

2017-12-11

Russia Is Providing North Korea With Internet Connectivity

By supplying North Korean hackers with added bandwidth and improved capability Russia is promoting even more destructive cyber attacks.

2017-12-06

North Koreans Study Bitcoin

Pyongyang University, considered the breeding ground for N. Korea’s army of hackers, is now offering courses on crypto-currencies.

2017-11-29

N. Korea Is Ready For Global Cyber Conflict

Not content with ICBMs, N Korea is also capable of causing damage worldwide through cyber-attacks on selected targets in defense, industry & media.

2017-11-21

N. Korean Hackers Plan to Devastate UK

Hacking groups linked to North Korea will continue to devastate the UK with major cyberattacks says former GCHQ Director Robert Hannigan.

2017-12-04

Poor North Korea Is A Cyber Superpower

North Korea may be poor, but has proved its destructive powers and is successfully engaged in a full scale cyberwar with South Korea and the US.

2017-11-27

North Korea Denies Involvement In WannaCry

North Korea has challenged accusations of being behind Wannacry ransomware calling them a “wicked attempt” to tighten sanctions.

2017-11-06

Russia Provides New Internet Connection to N.Korea

A major Russian telecommunications company appears to have begun providing an Internet connection to North Korea.

2017-11-06

Cyberwarfare: US Launches DDoS Attacks Against N. Korean Spy Agency

Under orders from President Trump to get more aggressive, US Cyber Command has been DDoS-ing North Korea.

2017-10-31

Microsoft Chief Says N. Korea Was Behind 'WannaCry'

Brad Smith confirms N. Korea was behind the devastating WannaCry ransomware attack that temporarily crippled UK Healthcare organisations.

2017-10-11

N.Korea Will Target UK Financial Services

They are after our money: Former GCHQ Director Robert Hannigan says N. Korea will get more aggressive in targeting the UK finance sector.

2017-10-25

Nuclear Missiles Are Not N.Korea’s Only Threat

North Korea has launched 22 missiles in 15 tests in 2017. But the true risk is lies in its cyberattack capabilities, which are in very active service.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Digitus Biometrics

Digitus Biometrics

Digitus Biometrics is a market leader in biometric access control. We can secure access to any entry point, from the front door to the server rack cabinet.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

Zymr

Zymr

Zymr specialize in cloud computing solutions including Cloud Security, Cloud Mobility, Cloud Apps, Cloud Infrastructure and Cloud Orchestration.

Cloudsine

Cloudsine

Cloudsine (formerly Banff Cyber Technologies) is a cloud technology company specializing in cloud adoption, security and innovation.

Citalid

Citalid

The Citalid cyber risk management platform combines threat and business intelligence to identify the risks scenarios you face.

SilverSky

SilverSky

SilverSky offers a comprehensive suite of products and services that deliver unprecedented simplicity and expertise for compliance and cybersecurity programs.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

Drip7

Drip7

Drip7 is a micro-learning platform that is re-inventing the way companies train their employees and build lasting cultural change around the importance of cybersecurity.

Liberman Networks

Liberman Networks

Liberman Networks is an IT solutions provider company that provides security, management, monitoring, BDR and cloud solutions.

PacketViper

PacketViper

PacketViper’s Deception360 actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.

Dawgen Global

Dawgen Global

Dawgen Global is an integrated multidisciplinary professional service firm in the Caribbean Region providing a range of services including Risk Management and Information Systems Assurance.

Invicti Security

Invicti Security

Invicti Security is an AppSec leader transforming the way web applications are secured.

IONOS

IONOS

IONOS is a leading provider of cloud infrastructure, cloud services, and hosting with more than 8.5 million customers contracts.

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

Solcon Capital

Solcon Capital

Solcon Capital is a forward-looking, technology-focused investment firm that is committed to identifying and investing in the most promising areas of innovation and development in the tech industry.

Kivera

Kivera

Kivera enforces your organisation governance and security policies across cloud deployments preventing misconfigurations turning into attack vectors.