Joint Cybersecurity Advisory cover art

Joint Cybersecurity Advisory

North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media

Preview
LIMITED TIME OFFER

3 months free
Try for £0.00
£8.99/mo thereafter. Renews automatically. Terms apply. Offer ends 31 July 2025 at 23:59 GMT.
Pick 1 audiobook a month from our unmatched collection.
Listen all you want to thousands of included audiobooks, Originals, and podcasts.
Access exclusive sales and deals.
Premium Plus auto-renews for £8.99/mo after 3 months. Cancel monthly.

Joint Cybersecurity Advisory

By: Department of Justice FBI NSA Department of State
Narrated by: Tom Brooks
Try for £0.00

£8.99/mo after 3 months. Offer ends 31 July 2025 23:59 GMT. Cancel monthly.

Buy Now for £6.99

Buy Now for £6.99

Confirm Purchase
Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
Cancel

About this listen

The Federal Bureau of Investigation (FBI), the US Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and Ministry of Foreign Affairs (MOFA), are jointly issuing this advisory to highlight the use of social engineering by Democratic People’s Republic of Korea (DPRK a.k.a. North Korea) state-sponsored cyber actors to enable computer network exploitation (CNE) globally against individuals employed by research centers and think tanks, academic institutions, and news media organizations.

These North Korean cyber actors are known to conduct spear-phishing campaigns posing as real journalists, academics, or other individuals with credible links to North Korean policy circles. The DPRK employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to the private documents, research, and communications of their targets.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2023 Tom Brooks (P)2023 Tom Brooks
Security & Encryption Computer Security Technology

Listeners also enjoyed...

The Social Engineer's Playbook: A Practical Guide to Pretexting cover art
Cybersecurity cover art
Confessions of a CIA Spy cover art
Cyber Essentials cover art
Hacking with Kali Linux cover art
Hacking with Kali Linux cover art
Listening In cover art
Tor and the Dark Net cover art
Ransomware Protection Playbook cover art
Cyber Security cover art
A Vulnerable System cover art
Cyber Smart cover art
Cybercrime Investigators Handbook cover art
You'll See This Message When It Is Too Late cover art
Cybersecurity cover art
Essential CISA Exam Guide: Updated for the 26th Edition cover art
No reviews yet