Security News
Reports of malware campaigns invariably focus on two critical conclusions: attribution and who was the intended target of the attack. It is challenging to draw swift conclusions on the former, due...
Following trails of reused code, security researchers at Intezer and McAfee have uncovered new links between malware families attributed to North Korean threat groups and tracked most of the...
The U.S. Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have published another report on the US-CERT website detailing a piece of malware allegedly used by the...
A threat actor linked to North Korea’s Lazarus Group has stopped targeting organizations in the United States, but remains active in Europe and East Asia. read more
The U.S. Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have issued another joint technical alert on the North Korea-linked threat group known as Hidden Cobra....
'Joanap' and 'Brambul' harvest info about your systems and send it home US CERT has issued a Technical Alert that says two strains of malware are tools of the North Korean government.…
North Korea on Wednesday denied hacking the database of a UN committee tasked with monitoring sanctions against Pyongyang, and called on Washington to focus on peace efforts ahead of a planned...
'SiliVaccine' uses ancient, stolen, Trend Micro A-V engine and bad home-brew crypto North Korea’s very own anti-virus software has been revealed as based on a ten-year-old application made by...
Samples of North Korean antivirus software called SiliVaccine crib software code from a competitor and come loaded with malware and a backdoor.
Researchers have analyzed an older version of North Korea’s SiliVaccine antivirus and discovered that it uses an outdated scanning engine from Japanese security solutions provider Trend Micro. read more