Kimsuky Cyberattack Targets Diehl Defence
North Korea-linked advanced persistent threat (APT) group Kimsuky has been implicated in a recent cyberattack on Diehl Defence, a German...
North Korea-linked advanced persistent threat (APT) group Kimsuky has been implicated in a recent cyberattack on Diehl Defence, a German...
The Sparkling Pisces threat group, also known as Kimsuky, THALLIUM, and Velvet Chollima, has emerged as a significant player in the landscape...
Konni, a threat actor linked to the North Korean state-sponsored group Kimsuky, has significantly escalated its cyber espionage activities...
The North Korea-associated threat actor Kimsuky, also known as Black Banshee, Emerald Sleet, or Springtail, has been observed altering its strategies by...
The North Korean hacking group Kimsuky has been exploiting vulnerabilities in ScreenConnect to disseminate a new malware variant named ToddleShark.
Kimsuky has unleashed a novel Golang-based information stealer dubbed "Troll Stealer," suspected to be part of a targeted data theft campaign.
In recent cybersecurity developments, the North Korean threat actor known as ScarCruft has been identified deploying sophisticated ...
The North Korean state-sponsored hacker group known as Kimsuky (APT43) has been conducting spear-phishing campaigns by impersonating journalists.
APT43 is a prolific cyber operator that supports the interests of the North Korean regime. The group combines moderately sophisticated technical capabilities
© 2024 | CyberMaterial | All rights reserved