News

Contagious Interview, first publicly documented by Palo Alto Networks Unit 42 in late 2023, is an ongoing campaign undertaken ...
North Korea is known to conduct hacking activities through front companies established in China. Cyber warfare often unfolds in the shadows, serving as a tool for surveillance and intelligence ...
PylangGhost grants persistent remote access, fingerprinting the device and establishing connections to command-and-control ...
A detailed report on North Korea’s cyber-crime operations has revealed the inner workings and structure behind Kim Jong Un’s plan to evolve a highly lucrative scheme in which trained tech ...
North Korean hackers use "PylangGhost" trojan posing as Coinbase recruiters to steal crypto credentials through fake job ...
One of the most alarming threats in this realm is the growing trend of operatives from North Korea – officially the Democratic People's Republic of Korea (DPRK) – posing as remote IT workers.
A growing number of the nation’s top tech firms have hired remote information technology workers, only to discover that the employees were actually North Korean cyber operatives. Their goal ...
North Korean infiltration of tech firms has been a known issue for years, ... North Korea has historically targeted US-based tech companies, ... assistant director of the FBI's cyber division, ...
The arm of GCHQ warns North Korean hackers were targeting cryptocurrency to raise revenue and attempting to steal defence data to improve Pyongyang's internal security and military capabilities.
What North Korea’s infiltration into American IT says about hiring. opinion. Sep 13, 2024 6 mins. Hiring IT Jobs Technology Industry.
Kim Seung-joo, from Korea University’s school of cybersecurity, worries that North Korea’s infiltration of the global tech sector positions the rogue state to pilfer corporate secrets or build ...