INTELLIGENCE > Hot Spots > North Korea


« Back to News

2020-04-23

Increased Cyber Threats From North Korea

US security agencies are warning Financial institutions they could soon be attacked by a fresh wave of North Korean state-sponsored hackers.

2019-10-01

N. Korean Hackers Attacking Cash Machines In India

DTrack: Hackers with ties to North Korea have developed a new malware variation to steal data from cards inserted into ATM machines in India.

2019-09-23

US Sanctions Against N. Korean Hacking Groups

Three hacking groups stand accused of stealing possibly hundreds of millions of dollars from financial institutions around the world.

2019-08-16

United Nations Investigating N Korean Cyber Attacks

S. Korea was hard hit by ten attacks by N. Korean hackers. India had three, Bangladesh and Chile were hit by three attacks plus 13 more countries.

2019-08-14

N. Korea’s Hackers Stole $2b To Fund Its Missile Program

Money stolen from foreign financial institutions by cyber-attacks is now being spent on North Korea's frightening nuclear weapons build-up.

2019-08-06

Surge Of Attacks On Banking & Finance Using N Korean Tools

The experts at F-Secure say the threat landscape for the financial sector might be getting even worse as criminals use nation-state hacker tools.

2019-04-25

N. Korea’s 4Cs: Crypto-Currency-Cyber-Crime

North Korea goes to extreme lengths to evade international sanctions and to raise funds. Now it is expanding its efforts to exploit crypto-currencies.

2019-02-06

N. Korea Could Expand Cyber Espionage Activities

In response to the stifling effects of international sanctions, N Korea's hackers could become more important to the regime than ever before.

2018-10-31

North Korea Is Using The Internet Like The Mafia

North Korea has “dramatically” changed its Internet use patterns, as Kim Jong Un directs hacking operations ‘like a Criminal Syndicate’.

2018-09-07

Organizations Hit With North Korea-Linked Ryuk Ransomware

A recent wave of ransomware attacks against organizations have been linked to a notorious North Korean threat actor.

2018-06-01

N Korean Cyber Attacks Continue Despite Peace Talks

Experts see an intensification in the level of cyber attacks from N Korea in the build up to talks with S Korea and the US on de-nuclearisation.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

FAMOC

FAMOC

FAMOC is an enterprise mobile management solution that delivers comprehensive security and management for applications, documents, email, and mobile devices.

Mobile Mentor

Mobile Mentor

Mobile Mentor is an independent provider of enterprise mobility solutions in New Zealand and Australia.

Joe Security

Joe Security

Joe Security specializes in the development of automated malware analysis systems for malware detection and forensics.

ThreatHunter.ai

ThreatHunter.ai

ThreatHunter.ai (formerly Milton Security) is a business that tracks down and mitigates attacks in real time using our ARGOS Platform and our Elite Threat Hunters.

Repository of Industrial Security Incidents (RISI)

Repository of Industrial Security Incidents (RISI)

RISI is a database of cyber security incidents that have (or could have) affected process control, industrial automation or SCADA systems.

Sothis

Sothis

Sothis is an information technology services company offering a range of solutions including cybersecurity, managed security services, information governance and compliance.

Gospel Technology

Gospel Technology

Gospel presents a totally new way of accessing and controlling data which is enterprise grade scalable, highly resilient, and secure.

Desec Security

Desec Security

Desec's training platform allows professionals around of the world to acquire knowledge and practical experience in Information Security.

ShorePoint

ShorePoint

ShorePoint helps customers focus on visibility, analytics and context to make timely and informed risk-based decisions to protect their infrastructure.

Human Security

Human Security

Human (formerly White Ops) Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

Black Hills Information Security (BHIS)

Black Hills Information Security (BHIS)

Black Hills Information Security provide security testing and vulnerability assessment services.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

KirkpatrickPrice

KirkpatrickPrice

KirkpatrickPrice is dedicated to providing you with innovative security guidance and efficient audit services.

Herzing College

Herzing College

Herzing College Ottawa offers an accelerated 12-month Cybersecurity Specialist training program. This program is developed by industry experts and based on leading IT security certifications.

RAND Corporation

RAND Corporation

The RAND Corporation is a non-profit institution that helps improve policy and decision making through research and analysis.

Domotz

Domotz

Domotz enables IT teams to monitor and manage their networks remotely, while ensuring that the security and the operational efficiency of their organizations are properly maintained.