INTELLIGENCE > Hot Spots > North Korea


« Back to News

2025-04-14

North Korean Hackers For Hire

By pretending to be legitimate remote workers to get jobs in US and EU companies, nation-state hackers aim to carry out financial fraud and IP theft.

2025-03-31

MS Windows Zero Day Vulnerability Widely Exploited

Update: A known security flaw in Microsoft Windows has been used by numerous state-sponsored groups for data theft and espionage since 2017.

2025-02-03

US Nationals Indicted For Fraudulent Remote IT Work

The FBI has uncovered a plot to install North Korean IT workers as remote employees to generate revenue for North Korea and evade sanctions.

2024-11-25

Hackers Steal $10M Via LinkedIn

North Korean hackers masquerading as recruiters for high profile financial services firms using LinkedIn to contact prospective targets.

2024-08-20

North Korean IT Contractor Fraud

Laptop Farming: North Korean IT workers were logging on to work from locations in China, while appearing to be contractors located in the US.

2024-08-07

KnowBe4 Duped Into Hiring A North Korean Hacker

Laptop Mule Farm Espionage: North Korean threat actors attempt to penetrate US organisations by posing as remote IT workers. 

2024-07-26

Most Wanted - North Korean Hackers 

$10m Reward: Information leading to the location of Rim Jong Hyok, known to be associated with the Andariel state-sponsored hacking group.

2024-07-03

South Korea Hit By DDoS Attacks

Major Disruption: South Korea is subject to widespread cyber attacks targeting government, critical infrastructure & financial institutions.

2023-12-19

Joint Opposition To Online Threats From North Korea

The USA, Japan and South Korea have established a high-level consultative body designed to counter North Korea’s cyber activities.

2022-12-01

Defending Against North Korea's Cyber Threats

The US and South Korea are to cooperate on mutual defense measures to combat the cybercrime capabilities of North Korea's state sponsored hackers.

2022-08-22

Lazarus Targets FinTech Engineers With MacOS Malware

Lazarus group is using a malicious macOS exploit to impersonate Coinbase with fake job posting to lure unwitting workers in the FinTech sector.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSO

CSO

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks.

Clearswift

Clearswift

Clearswift is trusted by businesses, governments and defense organizations globally for its Adaptive Cyber Security and Data Loss Prevention solutions.

IOTA Foundation

IOTA Foundation

The IOTA Foundation is a non-profit R&D organisation focused on developing the next generation of protocols for the connected world.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

Yaana Technologies

Yaana Technologies

Yaana is a leading provider of intelligent compliance solutions including lawful interception, data retention & disclosure, and advanced security analytics.

Scantist

Scantist

Scantist is a cyber-security spin-off from Nanyang Technological University (Singapore) which leverages its expertise to provide vulnerability management solutions to enterprise clients.

Kippeo Technologies

Kippeo Technologies

Kippeo is a security systems integrator providing innovative solutions that look at all the parameters and connect all the dots.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

Qmulos

Qmulos

Qmulos’ real-time continuous monitoring risk management suite, Q-Compliance, provides a massively flexible and scalable solution to optimizing operational security.

UTMStack

UTMStack

UTMStack is a Unified Security Management system that includes SIEM, Vulnerability Management, Network and Host IDS/IPS, Asset Discovery, Endpoint Protection and Incident Response.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

Tonex

Tonex

Tonex providing industry-leading technology training, courses, seminars, workshops, and consulting services to companies and government organizations around the world.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.

Blue Cloud Softech Solutions

Blue Cloud Softech Solutions

Blue Cloud Softech propels inspiring digital transformations. We provide AI products, cybersecurity, healthcare technology, and cloud solutions.

GlassHouse Technology

GlassHouse Technology

GlassHouse supports customers in their digitalization journey with our deep technical expertise in Managed Cloud and Security Services, SAP Infrastructure Service and Business Continuity Services.

Edera

Edera

Edera is changing the way containers are run and secured, making isolation a reality and fundamentally transforming computing in the process.

Veracity Trust Network

Veracity Trust Network

Veracity Trust Network safeguards organisations from the threat of bot attacks on their public facing platforms.