Poor North Korea Is A Cyber Superpower

There's no war, but a war-like situation prevails online between the United States and North Korea. 

The West often calls the communist country impoverished. A naive assessment if you consider Pyongyang's proclivity for destruction, even if it's of the virtual kind.

The North may be poor, it may be a hermit kingdom, but it's definitely not short of ideas that go a long way to punish its enemies and scuttle their plans even before a single bullet is fired. A cyber war is in full swing.

Hackers from the North are busy, stealing, pilfering from the West and the South. Seoul must be worried about the latest revelations of hacking.

It said war plans were stolen from the South's defence ministry a year ago. Which means the Kim regime was aware of an assassination plot against the feared and dangerous leader for a while.

One reason why the North's foes have not been able to make much headway with the secretive regime because their plans were not and are not secret. They are putting it out there, online, and Kim Jong-un and his cohorts are having a field day. They must be laughing all the way to their villas, mansions or their nuclear bunkers. Who needs friends when you have foes like these who don't know how to cover their tracks? 

It doesn't help that US President Trump is creating a much needed cyber diversion for North Korea with his comments. So much has been said after he promised 'fire and fury' that he is now beginning to sound comical.

'One thing will work' with N. Korea, he said, but we are certain that he will not launch any strike on an opponent who loves to taunt knowing that he has nuclear leverage.

These attacks from the North not only lay bare the West's and South Korea's vulnerabilities but also reveal its plots which kills the element of surprise.

Ein News:   Chart: Mark Humphrys

You Might Also Read: 

How Worried Should We Be About a Nuclear War With North Korea?:

N. Korea Is Ready For Global Cyber Conflict:

North Korea Denies Involvement In WannaCry:

 

« Where Should The Pentagon Focus In Cyberspace?
Unstructured Data: Threats You Cannot See »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

International Telecommunication Union (ITU)

International Telecommunication Union (ITU)

ITU is the United Nations specialized agency for information and communication technologies – ICTs. Areas of activity include cybersecurity.

SecureDevice

SecureDevice

SecureDevice is a Danish IT Security company.

ISGroup (Information Security Group)

ISGroup (Information Security Group)

ISGroup services include network penetration testing, Web application penetration testing, ethical hacking, vulnerability assessments, code review and associated training.

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center is a not-for-profit organization focused on regional cybersecurity excellence and readiness, with a special emphasis on the maritime community.

Vintegris

Vintegris

Vintegris are a Certification Authority and manufacturer of innovative systems and applications for the full cycle of digital identity.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CyberSecurity Non-Profit (CSNP)

CyberSecurity Non-Profit (CSNP)

CyberSecurity Non-Profit (CSNP) is a 501(c)(3) non-profit organization dedicated to promoting cybersecurity awareness and education.

Aversafe

Aversafe

Aversafe provides individuals, employers and certificate issuers around the world with a first line of defense against credential fraud.

FraudLabs Pro

FraudLabs Pro

FraudLabs Pro detects fraud and helps merchants to reduce e-commerce chargebacks by identifying high risk transactions.

Solvere One

Solvere One

Solvere One is a managed service provider (MSP) focused on corporate consulting and partnership.

Avalanchio Technologies

Avalanchio Technologies

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL or SQL.

Raiven Capital

Raiven Capital

Raiven Capital is a global early-stage technology venture capital fund. We focus on founder-led, driven companies on the leading edge of disruption.

Kralos

Kralos

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.

Onum

Onum

Onum helps security and IT leaders focus on the data that's most important. Gain control of your data by cutting through the noise for deep insights in real time.

Verosint

Verosint

Verosint (formerly 443ID) provides real-time account fraud prevention that reveals fraudsters hiding in user accounts and proactively blocks them before their attacks can cause harm.