Poor North Korea Is A Cyber Superpower

There's no war, but a war-like situation prevails online between the United States and North Korea. 

The West often calls the communist country impoverished. A naive assessment if you consider Pyongyang's proclivity for destruction, even if it's of the virtual kind.

The North may be poor, it may be a hermit kingdom, but it's definitely not short of ideas that go a long way to punish its enemies and scuttle their plans even before a single bullet is fired. A cyber war is in full swing.

Hackers from the North are busy, stealing, pilfering from the West and the South. Seoul must be worried about the latest revelations of hacking.

It said war plans were stolen from the South's defence ministry a year ago. Which means the Kim regime was aware of an assassination plot against the feared and dangerous leader for a while.

One reason why the North's foes have not been able to make much headway with the secretive regime because their plans were not and are not secret. They are putting it out there, online, and Kim Jong-un and his cohorts are having a field day. They must be laughing all the way to their villas, mansions or their nuclear bunkers. Who needs friends when you have foes like these who don't know how to cover their tracks? 

It doesn't help that US President Trump is creating a much needed cyber diversion for North Korea with his comments. So much has been said after he promised 'fire and fury' that he is now beginning to sound comical.

'One thing will work' with N. Korea, he said, but we are certain that he will not launch any strike on an opponent who loves to taunt knowing that he has nuclear leverage.

These attacks from the North not only lay bare the West's and South Korea's vulnerabilities but also reveal its plots which kills the element of surprise.

Ein News:   Chart: Mark Humphrys

You Might Also Read: 

How Worried Should We Be About a Nuclear War With North Korea?:

N. Korea Is Ready For Global Cyber Conflict:

North Korea Denies Involvement In WannaCry:

 

« Where Should The Pentagon Focus In Cyberspace?
Unstructured Data: Threats You Cannot See »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Titus

Titus

Titus is a global leader in enterprise-grade data protection solutions.

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN) is a not for profit group of professionals in the field of Information Security in Nigeria and Diaspora.

Xcitium

Xcitium

Xcitium (formerly Comodo) is and industry leading provider of state-of-the-art endpoint protection solutions. Our Zero threat platform isolates and removes all ransomware & malware infectictions.

Aqua Security Software

Aqua Security Software

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines.

Napatech

Napatech

Napatech develops and manufactures high speed network accelerators specifically designed for real-time network monitoring and analysis applications.

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

Atea

Atea

Atea is the market leader in IT infrastructure for businesses and public-sector organizations in Europe’s Nordic and Baltic regions.

The Media Trust

The Media Trust

The Media Trust continuously scans websites, ad tags and mobile apps and alerts on anomalies affecting websites and visitors.

Cybersecurity Professionals

Cybersecurity Professionals

Search vacancies from top cyber security jobs worldwide on CyberSecurity Professionals. View IT security jobs or upload your CV to be seen by recruiters from industry leading firms.

RiskXchange

RiskXchange

RiskXchange's cybersecurity risk rating solution helps businesses solve complex cybersecurity and compliance challenges by providing a 360-degree view of your cybersecurity posture.

443ID

443ID

443ID brings OSINT data to Identity Security professionals on any digital platform.

Infosec Institute

Infosec Institute

Infosec is a leading cybersecurity training company, we help IT and security professionals advance their careers with skills development and certifications.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

Bleach Cyber

Bleach Cyber

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security.

Mogwai Labs

Mogwai Labs

Mogwai Labs deliver cutting-edge penetration tests, security assessments and trainings, to safeguard your applications, networks and cloud environments from cyber threats.

Aspiron Search

Aspiron Search

Aspiron Search is a niche-focused Cybersecurity search firm that works exclusively with venture-backed Cybersecurity firms.