INTELLIGENCE > Hot Spots > North Korea


« Back to News

2017-11-27

North Korea Denies Involvement In WannaCry

North Korea has challenged accusations of being behind Wannacry ransomware calling them a “wicked attempt” to tighten sanctions.

2017-11-06

Russia Provides New Internet Connection to N.Korea

A major Russian telecommunications company appears to have begun providing an Internet connection to North Korea.

2017-11-06

Cyberwarfare: US Launches DDoS Attacks Against N. Korean Spy Agency

Under orders from President Trump to get more aggressive, US Cyber Command has been DDoS-ing North Korea.

2017-10-31

Microsoft Chief Says N. Korea Was Behind 'WannaCry'

Brad Smith confirms N. Korea was behind the devastating WannaCry ransomware attack that temporarily crippled UK Healthcare organisations.

2017-10-11

N.Korea Will Target UK Financial Services

They are after our money: Former GCHQ Director Robert Hannigan says N. Korea will get more aggressive in targeting the UK finance sector.

2017-10-25

Nuclear Missiles Are Not N.Korea’s Only Threat

North Korea has launched 22 missiles in 15 tests in 2017. But the true risk is lies in its cyberattack capabilities, which are in very active service.

2017-10-18

Could the US Use A Cyber Attack To Take Down N. Korea?

Both sides have shown off their military and nuclear might, but is it possible to stop a war before it starts with a few clicks of a button?

2017-10-05

N.Korea's Cyber Threats To S.Korea

Alongside the escalating missile threat N Korea is stepping up cyber intrusions with fake communications and hacking attacks.

2017-09-12

US Conducts Computer War Games in Response to North Korea Missile Launch

The US military and Pacific allies conduct air drills over the Korean peninsula in conjunction with computer attack simulations.

2017-09-11

Will Cyber Warfare Remove Kim From N. Korea?

Military invasion. Sending in a hit squad. Tougher sanctions. Maybe there is a safer route to deposing the renegade N Korean leader.

2017-09-02

How Worried Should We Be About a Nuclear War With North Korea?

Rhetoric from both Kim Jong-Un and Donald Trump has once again raised the spectre of nuclear war. Opinion by Patricia Lewis

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

C3IA Solutions

C3IA Solutions

C3IA Solutions is an NCSC-certified Cyber Consultancy providing assured, tailored advice to keep your information secure and data protected.

Qualys

Qualys

Qualys is a pioneer and leading provider of cloud security and compliance solutions.

National Cyber Security Centre Portugal (CNCS)

National Cyber Security Centre Portugal (CNCS)

CNCS is the operational coordinator and Portuguese national authority in cybersecurity working with State entities, and digital service providers

Tempered Networks

Tempered Networks

Tempered Networks delivers the first purpose-built platform for IIoT cybersecurity that allows customers to connect and secure devices in minutes without the need for specialized skills.

Cyber Security Centre - Daffodil International University

Cyber Security Centre - Daffodil International University

Cyber Security Centre, DIU is a non-profitable organization which is focused on applied research in cyber security.

SkillCube

SkillCube

SkillCube is one of the pioneers in India focusing on Cyber Security Skill Development Solutions.

Department of Justice - Office of Cybercrime (DOJ-OOC)

Department of Justice - Office of Cybercrime (DOJ-OOC)

The Office of Cybercrime within the Philippines Department of Justice is the Central Authority in all matters relating to international mutual assistance and extradition for cybercrime.

Ethyca

Ethyca

Ethyca builds automated data privacy infrastructure and tools for developers and privacy teams to easily build products that comply with GDPR, CCPA Privacy Regulations.

Cornami

Cornami

Cornami delivers real-time computing on encrypted data sets, which is vital for data privacy and cloud security.

Kriptos

Kriptos

Kriptos helps businesses improve their cybersecurity, risk, and compliance strategies by locating critical information through a technology that automatically classifies and labels documents using AI.

Topsec Cloud Solutions

Topsec Cloud Solutions

The Topsec Managed Email Security Platform eliminates Spam, Viruses, Malware, and Phishing.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

Aikido Technology Services

Aikido Technology Services

Aikido Technology Services is a leading-edge technology solutions provider, servicing the Pacific North West USA. We offer affordable IT solutions designed to streamline and secure your business.

Eviden

Eviden

Eviden is an Atos business that brings together its digital, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation.

FTI Consulting

FTI Consulting

FTI Consulting is a global business advisory firm dedicated to helping organizations manage change, mitigate risk and resolve disputes.

Seal Security

Seal Security

Seal Security revolutionizes software supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management.