Poor North Korea Is A Cyber Superpower

There's no war, but a war-like situation prevails online between the United States and North Korea. 

The West often calls the communist country impoverished. A naive assessment if you consider Pyongyang's proclivity for destruction, even if it's of the virtual kind.

The North may be poor, it may be a hermit kingdom, but it's definitely not short of ideas that go a long way to punish its enemies and scuttle their plans even before a single bullet is fired. A cyber war is in full swing.

Hackers from the North are busy, stealing, pilfering from the West and the South. Seoul must be worried about the latest revelations of hacking.

It said war plans were stolen from the South's defence ministry a year ago. Which means the Kim regime was aware of an assassination plot against the feared and dangerous leader for a while.

One reason why the North's foes have not been able to make much headway with the secretive regime because their plans were not and are not secret. They are putting it out there, online, and Kim Jong-un and his cohorts are having a field day. They must be laughing all the way to their villas, mansions or their nuclear bunkers. Who needs friends when you have foes like these who don't know how to cover their tracks? 

It doesn't help that US President Trump is creating a much needed cyber diversion for North Korea with his comments. So much has been said after he promised 'fire and fury' that he is now beginning to sound comical.

'One thing will work' with N. Korea, he said, but we are certain that he will not launch any strike on an opponent who loves to taunt knowing that he has nuclear leverage.

These attacks from the North not only lay bare the West's and South Korea's vulnerabilities but also reveal its plots which kills the element of surprise.

Ein News:   Chart: Mark Humphrys

You Might Also Read: 

How Worried Should We Be About a Nuclear War With North Korea?:

N. Korea Is Ready For Global Cyber Conflict:

North Korea Denies Involvement In WannaCry:

 

« Where Should The Pentagon Focus In Cyberspace?
Unstructured Data: Threats You Cannot See »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IoT Security Foundation (IoTSF)

IoT Security Foundation (IoTSF)

IoTSF is a collaborative, non-profit organisation with a mission to raise the quality and drive pervasive security in the Internet of Things.

Menlo Security

Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email.

IT Security House

IT Security House

IT Security House is a leading European supplier of Cyber Security Intelligence and eCrime services.

CyberOwl

CyberOwl

CyberOwl builds on cutting-edge research and combines decades of experience in developing, securing and operating large distributed systems.

Cydome

Cydome

Cydome offers full-spectrum cybersecurity solutions tailored for the maritime industry.

Securitybulls

Securitybulls

Securitybulls is an information security firm offering an encyclopedic penetration testing & IT security assessment service for your organization.

IPQualityScore (IPQS)

IPQualityScore (IPQS)

IPQS anti-fraud tools provide a real-time fraud score to analyze how likely a user or visitor is to engage in fraudulent behavior.

SafeLogic

SafeLogic

SafeLogic provides strong encryption products for solutions in mobile, server, Cloud, appliance, wearable, and IoT environments that are pursuing compliance to strict regulatory requirements.

Pioneer Search

Pioneer Search

Pioneer Search is a UK based Technology & Change, Electronics Engineering, Cyber Security & Cloud and Data & Analytics Employment Agency.

Data Privacy Office (DPO)

Data Privacy Office (DPO)

Data Privacy Office is a company that specializes in privacy and personal data protection, following the highest standards in its sector.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

Crygma

Crygma

CRYGMA Quantum-Resistant Cryptographic Machines, the new standard in data encryption.

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures is an early-stage investment vehicle focused on cybersecurity, data analytics and automation startups.

Aspiron Search

Aspiron Search

Aspiron Search is a niche-focused Cybersecurity search firm that works exclusively with venture-backed Cybersecurity firms.

Cybersecurity Elastic Laboratory (CEL)

Cybersecurity Elastic Laboratory (CEL)

CEL specialize in providing top-tier services in vulnerability diagnosis and penetration testing, offering a comprehensive suite of solutions to mitigate cyber risks.

SOCRadar

SOCRadar

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI).