INTELLIGENCE > Hot Spots > North Korea


« Back to News

2018-03-16

North Korea's Cyber Soldiers Are Concealed Abroad

Defectors from N Korea reveal the nation's hackers are in fact mostly based outside the country to give the regime enhanced deniability.

2018-03-06

N Korea Is A Bigger Cyber Threat Than Russia

North Korea poses a more considerable cyber-attack threat to the international community than Russia, say the experts at CrowdStrike.

2018-03-02

N Korean Hacking Widens To Target Multinationals

Reaper: North Korea's newest hacker army was busy attacking neighbouring states but is turning its attention to international corporations.

2018-03-01

North Korea's Cyber Army Has A New Battalion

The experts at FireEye have identified a new unit of N Korea's hacker army named APT37, capable of sophisticated international attacks.

2018-01-30

Looming Cyber Threats From Russia & N. Korea

Threats from Russia & N.Korea have increased and cybercriminals have improved their tactics, techniques & procedures, according to Flashpoint.

2018-01-10

Retaliation Against N Korea For WannaCry

The US and British governments appear to be preparing a cyber offensive against N. Korea in payback for the damaging Wannacry attack.

2017-12-11

Russia Is Providing North Korea With Internet Connectivity

By supplying North Korean hackers with added bandwidth and improved capability Russia is promoting even more destructive cyber attacks.

2017-12-06

North Koreans Study Bitcoin

Pyongyang University, considered the breeding ground for N. Korea’s army of hackers, is now offering courses on crypto-currencies.

2017-11-29

N. Korea Is Ready For Global Cyber Conflict

Not content with ICBMs, N Korea is also capable of causing damage worldwide through cyber-attacks on selected targets in defense, industry & media.

2017-11-21

N. Korean Hackers Plan to Devastate UK

Hacking groups linked to North Korea will continue to devastate the UK with major cyberattacks says former GCHQ Director Robert Hannigan.

2017-12-04

Poor North Korea Is A Cyber Superpower

North Korea may be poor, but has proved its destructive powers and is successfully engaged in a full scale cyberwar with South Korea and the US.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Advanced Resource Managers (ARM)

Advanced Resource Managers (ARM)

ARM provide specialist recruitment services for technology and engineering including cyber security.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

OIC-CERT

OIC-CERT

OIC-CERT is the Computer Emergency Response Team for Organisation of Islamic Cooperation (OIC) member countries.

Westminster eForum

Westminster eForum

Wesrtminster eForum runs a series of conferences on matters relating to the UKs Digital Strategy. Topics include Smart Cities and Cyber Security.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

Aveshka

Aveshka

Aveshka is a professional services firm focused on addressing complex threats and challenges including Cybersecurity and Information Technology.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

Tokio Marine HCC

Tokio Marine HCC

Tokio Marine HCC is a leading specialty insurance group with a Financial and Professional product line including Tech and Cyber.

Netlinkz

Netlinkz

Netlinkz has developed the Virtual Secure Network (VSN) overlay technology platform, a breakthrough in connectivity security, speed, and simplicity.

Saepio Solutions

Saepio Solutions

Saepio promote an all-encompassing approach to cybersecurity, ensuring the appropriate balance of budget and resource across Policy, Product and People.

East Midlands Cyber Resilience Centre (EMCRC)

East Midlands Cyber Resilience Centre (EMCRC)

The East Midlands Cyber Resilience Centre is set up to support and help protect businesses across the region against cyber crime.

Psybersafe

Psybersafe

Psybersafe is a hands-on, behaviour-changing training system that keeps your people and your business cyber safe.

European Data Protection Supervisor (EDPS)

European Data Protection Supervisor (EDPS)

The EDPS is the European Union’s independent data protection authority. We monitor and ensure the protection of personal data and privacy when EU institutions and bodies process personal information.

CyberSecureRIA

CyberSecureRIA

We founded CyberSecureRIA specifically to secure and support RIAs. We exist to secure SEC-registered RIAs, and keep them compliant with cybersecurity regulations.