Unusual Discoveries in DPRK IT Worker Profiles connected to Russia
Comingled multiple types of threats hidden within single North Korean operation.
Why should you care about the North Korean contributors. Describing risks associated with DPRK IT Workers for organizations.
The first month of hunting for DPRK IT Workers in the open source software ecosystem. Some successes, some challanges.
In the ever-evolving landscape of cybersecurity, traditional methods of tracking threat actors through hashes, IPs, and websites are not enough. Today...
On classifying GitHub profiles as potentially malicious using gh-fake-analyzer.
The investigation into the threat actor associated with DPRK activities has revealed several interesting insights into how to track this actor's activity based on their own presentation on GitHub.