INTELLIGENCE > Hot Spots > North Korea


« Back to News

2017-04-26

North Korea More Likely To Launch A Cyber Attack Than A Military Strike

US Homeland Security are more concerned about a stealthy cyber attack on critical infrastructure than missiles from the Korean peninsular.

2017-04-21

Cyber Attacks Against Korean Missile Launches

The North Korean government appears to be marching toward its goal of nuclear weapons, slowly or otherwise.

2017-03-24

US Has A Secret Cyberwar Going Against North Korea

President Trump appears to be intensifying a sophisticated US effort to remotely manipulate data inside North Korea’s missile systems.

2016-12-14

Surprise: N Korea Hacked S Korea Cyber Command

N Korea appears to have hacked S Korea's cyber command in what could be the latest cyberattack against Seoul.

2016-11-07

North vs. South: Cyber Warfare In Korea Is Escalating

N. Korean government entities spearheading propaganda efforts are operating task forces to post comments on Internet portals in S. Korea.

2016-11-09

Was North Korea Behind The IoT DDoS Attack?

Multiple big-name sites, including Twitter, Spotify and GitHub, experienced slowdowns in an attack against DNS services took shape.Was it N. Korea?

2016-07-11

Did N. Korea Hack S. Korea’s Key Defense Contractor?

Naval shipbuilder Hanjin Heavy Industries & Construction has suffered a serious hack and North Korea is the top suspect,

2016-06-29

The Cyberwar Frontier In Korea

North Korea's "cyber army" has doubled in size to 6,000 troops and the South is racing to increase its capability to meet the rising threat.

2016-06-14

North Korea’s Psychological Cyberwar Against Its Neighbour

Zombie DDOS attacks, targeted email propaganda and planting fake news videos are all parts of a coordinated campaign against South Korea.

2016-03-22

North Korea Denies Cyber Attacks On South Korea

North Korea denies it conducted cyber attacks against officials from rival South Korea, calling the South's accusation that it did so a "fabrication".

2016-02-24

The Big Three: N. Korea, ISIS and CyberWar

U.S. Director of National Intelligence James Clapper identifies three major threats to US security in 2016.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Infinigate UK

Infinigate UK

Infinigate is a value-added distributor of IT security solutions to protect and defend IT networks, servers, devices, data, applications, as well as the cloud.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

Bedrock Automation

Bedrock Automation

Bedrock Automation provides the world’s most powerful, scalable and cyber secure industrial control system (ICS).

CyberGym

CyberGym

CyberGym is a global leader in cyber defense solutions and training services.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies is a developer and provider of personal information protection and cyber security solutions and services.

Coro Cybersecurity

Coro Cybersecurity

Coro (previously Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

Cybersecurity Association of Maryland (CAMI)

Cybersecurity Association of Maryland (CAMI)

CAMI’s mission is to create a global cybersecurity marketplace in Maryland and generate thousands of high-pay jobs through the cybersecurity industry.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

CYDES

CYDES

CYDES is the first event in Malaysia to showcase advanced solutions and technologies to address cyber defence and cyber security challenges for the public and private sectors.

Pragma Strategy

Pragma Strategy

Pragma is a CREST approved global provider of cybersecurity solutions. We help organisations strengthen cyber resilience and safeguard valuable information assets with a pragmatic approach.

Trianz

Trianz

Trianz Cybersecurity Services are Powered by One of the World’s Largest Databases on Digital Transformation. We Understand Evolving Risks, Technologies and Best Practices.

CACI International

CACI International

CACI is at the forefront of developing and delivering technological breakthroughs that transform and optimize government operations.

TechBase

TechBase

TechBase is an innovation and start-up center offering technology-oriented start-ups optimal conditions for successful business development.