North Korea is reportedly recruiting graduates from Pyongyang University of Science and Technology for cyber warfare.
North Korean defector Jang Se-yul, who worked in the North’s electronic warfare command, and another defector Yi Chol claimed on Wednesday in a news conference in Seoul that graduates from the university are assigned to the military for cyber terrorism.
The defectors also said that training institutions affiliated with the Ministries of People’s Armed Forces and People’s Security send trainees to the university to learn advanced science and technology.
The defectors urged South Korean religious and civic groups to reconsider their aid to the North Korean university, which was jointly established by the two Koreas in 2009 and produced its first graduates last year.
Ein News:
Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.
TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.
Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.
IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.
Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.
Dataguise provides a data-centric security solution to detect, protect, and monitor sensitive data in real time across all data repositories, both on premises and in the cloud.
SharGate provide a cloud-based website security solution to protect websites from being hacked.
Atomicorp, the leader in Secure Linux, is a developer of solutions for the protection and support of cloud, virtual, shared, and dedicated web hosting environments.
AllegisCyber is an investment company with a focus on seed and early stage investing in cybersecurity and its applications in emerging technology markets.
CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses.
Digital Magics is an incubator for innovative startups which offer content and services with high technological value. Areas of focus include IoT, Enterprise Software, AI, Industry 4.0 and Blockchain.
Pelta Cyber Security is the cyber security consulting and solutions division of Softworld Inc. We provide staffing and recruitment services as well as consulting and solutions for outsourced projects.
Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.
Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.
CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.
Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes.
The Esprinet Group is an enabler of the technology ecosystem: a team of people who promote access to technology through an extensive network of professional resellers.
AArete is a global management and technology consulting firm specializing in strategic profitability improvement, digital transformation, and advisory services.
Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.
PureSoftware is a global software products and digital services company that is driving transformation for the world’s top organizations across various industry verticals.
SURF Security has transformed the browser into your strongest security asset while providing complete end-user privacy – all with full compliance.