News

North Korean cyber operations use fake US companies to target crypto developers with malware, violating US sanctions.
A recent investigation has uncovered that the North Korean state-sponsored hacking group known as Lazarus has registered ...
Cryptocurrency exchange Bybit's CEO Ben Zhou said that 27.95% of the funds lost in the $1.4 billion exploit engineered by the ...
The Lazarus Group, North Korea’s state-backed cyber unit, has established multiple fake companies registered in the United States to lure blockchain developers into downloading malware ...
North Korean cyber operatives quietly formed two companies in the US and used them to slip harmful code to job-seeking ...
North Korea's Lazarus hacking group. Following February's $1.4 billion hack of crypto exchange Bybit — the largest cyber heist in history — THORChain emerged as central to North Korea's ...
The companies, Blocknovas LLC and Softglide LLC were set up in the states of New Mexico and New York using fake personas and ...
North Korea’s Lazarus Group used fake US firms like Blocknovas in a crypto malware campaign. The FBI seized domains tied to fake job offers targeting developers.
With 28% of the hacked funds having “gone dark,” the exchange has called for more help decoding mixer transactions.
Kaspersky’s GReAT team has uncovered a new Lazarus campaign, combining a watering hole attack with the "exploitation of ...
In a recent espionage campaign, the infamous North Korean threat group Lazarus targeted multiple organizations in the software, IT, finance, and telecommunications sectors in South Korea.