Poor North Korea Is A Cyber Superpower

There's no war, but a war-like situation prevails online between the United States and North Korea. 

The West often calls the communist country impoverished. A naive assessment if you consider Pyongyang's proclivity for destruction, even if it's of the virtual kind.

The North may be poor, it may be a hermit kingdom, but it's definitely not short of ideas that go a long way to punish its enemies and scuttle their plans even before a single bullet is fired. A cyber war is in full swing.

Hackers from the North are busy, stealing, pilfering from the West and the South. Seoul must be worried about the latest revelations of hacking.

It said war plans were stolen from the South's defence ministry a year ago. Which means the Kim regime was aware of an assassination plot against the feared and dangerous leader for a while.

One reason why the North's foes have not been able to make much headway with the secretive regime because their plans were not and are not secret. They are putting it out there, online, and Kim Jong-un and his cohorts are having a field day. They must be laughing all the way to their villas, mansions or their nuclear bunkers. Who needs friends when you have foes like these who don't know how to cover their tracks? 

It doesn't help that US President Trump is creating a much needed cyber diversion for North Korea with his comments. So much has been said after he promised 'fire and fury' that he is now beginning to sound comical.

'One thing will work' with N. Korea, he said, but we are certain that he will not launch any strike on an opponent who loves to taunt knowing that he has nuclear leverage.

These attacks from the North not only lay bare the West's and South Korea's vulnerabilities but also reveal its plots which kills the element of surprise.

Ein News:   Chart: Mark Humphrys

You Might Also Read: 

How Worried Should We Be About a Nuclear War With North Korea?:

N. Korea Is Ready For Global Cyber Conflict:

North Korea Denies Involvement In WannaCry:

 

« Where Should The Pentagon Focus In Cyberspace?
Unstructured Data: Threats You Cannot See »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Mocana

Mocana

Mocana provides a software platform that allows you to develop, test and distribute more secure IoT devices and services.

Minerva Labs

Minerva Labs

Minerva’s patent pending solution keeps malware in a constant sleep state before it can infiltrate your network and cause any damage.

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

Enclave Networks

Enclave Networks

Our mission is to give IT professionals a simple way to rapidly build secure connectivity between any application, computer system, device or infrastructure - regardless of the underlying network.

QNu Labs

QNu Labs

QNu Labs’s quantum-safe cryptography products and solutions assure unconditional security of critical data on the internet and cloud across all industry verticals, globally.

Robert Walters

Robert Walters

Robert Walters is one of the world's leading global specialist professional recruitment and recruitment process outsourcing consultancies.

Defscope

Defscope

Defscope is an Azerbaijani company entirely focused on cybersecurity offering training, security consulting, and other professional services.

Baxter Clewis Consulting

Baxter Clewis Consulting

Baxter Clewis are cyber security and compliance experts. We provide Security Consulting, IT Assurance, and Technical Security services.

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

Davinsi Labs

Davinsi Labs

Davinsi Labs helps companies achieve Digital Service Excellence with specialized Security Intelligence and Service Intelligence solutions.

Three Wire Systems

Three Wire Systems

Three Wire is a leader in innovative and efficient technology solutions for government agencies and large enterprise corporations.

TrafficGuard

TrafficGuard

TrafficGuard is an award-winning digital ad verification and fraud prevention platform.

Security Risk Advisors (SRA)

Security Risk Advisors (SRA)

Security Risk Advisors deliver cybersecurity services to leading companies in the Financial Services, Healthcare, Pharmaceuticals, Technology and Retail industries.

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.

Liquid C2

Liquid C2

Liquid C2 offers leading solutions to streamline workplace operations, secure cloud storage, rapid data recovery, and scale growth.