News

North Korea’s prosperous cyber-crime operations are similar ... “The profits—from ransomware, cryptocurrency theft, financial fraud, and insider infiltration— flow upward to fund weapons development ...
Officials uncover how North Korean operatives used stolen identities and remote-controlled tech to infiltrate American ...
The second phase of findings from a joint government–private sector task force investigating the recent hacking of SK Telecom ...
A recent Wall Street Journal investigation highlights the story of Christina Chapman, a Minnesota native and popular TikTok ...
Cybersecurity firms say that the intricate scam to amass funding for North Korea’s weapons program is happening “on a scale we haven’t seen before.” ...
North Korean infiltration of tech firms has been a known ... third countries like China before making their way back to North Korea. North Korea has historically targeted US-based tech companies ...
A LinkedIn message drew a former waitress in Minnesota into a type of intricate scam involving illegal paychecks and stolen ...
May 14, 2025 (GLOBE NEWSWIRE) -- DTEX Systems, the trusted leader of insider risk management, has released a groundbreaking report exposing North Korea ... of DPRK’s cyber hierarchy, a covert ...
One of the most alarming threats in this realm is the growing trend of operatives from North Korea – officially ... Add this scenario to your cyber incident response plan and test for it.
Kim Seung-joo, from Korea University’s school of cybersecurity, worries that North Korea’s infiltration of the ... that can be used for future cyber-attacks. Its hackers are already highly ...
North Korea’s prosperous cyber-crime operations are similar ... financial fraud, and insider infiltration— flow upward to fund weapons development and sanctions evasion,” states the report ...