Page de couverture de Joint Cybersecurity Advisory

Joint Cybersecurity Advisory

North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media

Aperçu

30 jours d'essai gratuit à Audible Standard

Essayez l’abonnement standard gratuitement
Choisissez 1 livre audio par mois dans notre collection contenant plus de 900 000 titres.
Écoutez les livres audio que vous avez sélectionnés tant que vous êtes membre.
Profitez d’un accès illimité à des balados incontournables.
L'abonnement Standard se renouvelle automatiquement au tarif de 8,99 $/mois + taxes applicables après 30 jours. Annulation possible à tout moment.

Joint Cybersecurity Advisory

Auteur(s): Department of Justice FBI NSA Department of State
Narrateur(s): Tom Brooks
Essayez l’abonnement standard gratuitement

8,99 $/mois après 30 jours. Annulable en tout temps

Acheter pour 12,37 $

Acheter pour 12,37 $

À propos de cet audio

The Federal Bureau of Investigation (FBI), the US Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and Ministry of Foreign Affairs (MOFA), are jointly issuing this advisory to highlight the use of social engineering by Democratic People’s Republic of Korea (DPRK a.k.a. North Korea) state-sponsored cyber actors to enable computer network exploitation (CNE) globally against individuals employed by research centers and think tanks, academic institutions, and news media organizations.

These North Korean cyber actors are known to conduct spear-phishing campaigns posing as real journalists, academics, or other individuals with credible links to North Korean policy circles. The DPRK employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to the private documents, research, and communications of their targets.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2023 Tom Brooks (P)2023 Tom Brooks
Sécurité et chiffrement Sécurité informatique Technologie
Pas encore de commentaire