
North Korean hackers appear to have used the corrupted VoIP software to go after just a handful of crypto firms with “surgical precision.”
North Korean hackers appear to have used the corrupted VoIP software to go after just a handful of crypto firms with “surgical precision.”
A spy group working for the Kim regime has been feeding stolen coins into crypto mining services in an effort to throw tracers off their trail.
Russia, North Korea, Iran, and China have been caught using fake profiles to gather information. But the platform’s tools to weed them out only go so far.
Plus: Hive ransomware gang gets knocked offline, FBI confirms North Korea stole $100 million, and more.
DPRK hackers are tricking their way into jobs with western firms. A US government alert reminds employers they’re on the front lines—and potentially on the hook.
A new report suggests that a small but vibrant group of smartphones hackers may be challenging the world’s most digitally restrictive regime.
Plus: Spyware maker NSO Group deemed “valueless,” T-Mobile fails to buy its stolen data, and malware spreads on Telegram.
Disappointed with the lack of US response to the Hermit Kingdom’s attacks against US security researchers, one hacker took matters into his own hands.
The regime had a “banner year,” thanks to skyrocketing cryptocurrency values and a new generation of vulnerable startups.
The country’s hackers have gotten far more aggressive since 2015, when the Ministry of State Security largely took over the country’s cyberespionage.