Thirty-one North Korean commandos slipped past American and South Korean sentries on Jan. 17, 1968, cutting through the DMZ ...
NIS counterespionage chief Bae Jeong-seok said revising the espionage law is only "normalization," not a full counterintelligence upgrade.
In this executive Q&A, Ji Won Kim, a partner at Norton Rose Fulbright, outlines how North Korean operatives exploit remote ...
Kim Jong-un hugged the returning troops and awarded the country’s highest medal to nine soldiers killed in action.
Dr. Eric Patterson reveals how 30 years of teaching exposed five critical gaps in students' understanding of socialism and ...
A Maryland fraud case reveals a deeper shift in North Korea’s evolving cyber playbook and global crypto ambitions.
A man in Maryland has been sentenced to a 15-month prison sentence and three years of supervised release after a revelation ...
The scheme enabled overseas DPRK operatives to access sensitive government systems through fraudulent IT jobs.
Border Security Force IG of the North Bengal Frontier, Mukesh Tyagi, stated that the India-Bangladesh border remains secure ...
“North Korean social engineering schemes are complex and elaborate, often compromising victims with sophisticated technical ...
In an unprecedented intelligence operation, security researchers exposed how North Korean IT recruiters target and lure ...