News

Microsoft enhances European cybersecurity with AI against cyber threats, collaborating with governments and tracking ...
Officials uncover how North Korean operatives used stolen identities and remote-controlled tech to infiltrate American ...
The second phase of findings from a joint government–private sector task force investigating the recent hacking of SK Telecom has revealed that the breach dates back three years. Investigators also ...
North Korea’s cyber operations have stolen over $1.3 ... Today, its operations involve deep infiltration of crypto platforms, covert funding networks, and exploitation of global labor markets.
Using AI and stolen information to craft false identities, they are becoming an 'increasing menace' to top tech companies in ...
North Korea’s prosperous cyber-crime operations are similar ... financial fraud, and insider infiltration— flow upward to fund weapons development and sanctions evasion,” states the report ...
confirming Kraken’s suspicions of an infiltration attempt. This incident underscores a broader trend of North Korean cyber operations targeting the cryptocurrency sector, driven by the regime ...
One of the most alarming threats in this realm is the growing trend of operatives from North Korea – officially ... Add this scenario to your cyber incident response plan and test for it.
A growing number of the nation’s top tech firms have hired remote information technology workers, only to discover that the employees were actually North Korean cyber operatives. Their goal?
The National Cyber Security Centre (NCSC ... Authorities in the US and South Korea have also reported similar infiltration attempts, with some Fortune 100 companies unwittingly hiring North Korean ...
Kim Seung-joo, from Korea University’s school of cybersecurity, worries that North Korea’s infiltration of the ... that can be used for future cyber-attacks. Its hackers are already highly ...