News

North Korean threat actors planted 67 malicious packages in the Node Package Manager (npm) online repository to deliver a new ...
Uploading malicious code to npm is just a setup. The real attack most likely happens elsewhere - on LinkedIn, Telegram, or Discord. North Korean attackers would pose as recruiters, or HR managers in ...
North Korean hackers continue attacking open-source software via npm packages. 67 new malicious packages with XORIndex Loader ...
Socket has identified a new malware loader called XORIndex incorporated into malicious packages published to the npm registry ...
Song Kum Hyok is accused of masterminding a scheme in which North Korean cyber operatives posed as U.S. remote IT workers for ...
China is using “cultural development” to shape “an ideologically and psychologically friendly environment in North Korea.” ...
A North Korean man crossed the DMZ on foot before midnight Thursday, asking South Korean troops for help in a rare defection ...
Using falsified and stolen IDs, prosecutors say, North Koreans secure jobs that help finance the regime by evading sanctions.
Thousands of IT workers are trapped inside a global operation that funds North Korea’s weapons program, but one managed to ...
Analyzing the possibility of North Korean military involvement in Ukraine. Examining Kim Jong-un's support for Russia and the ...