BREAKING
6h agoWomen sue the men who used their Instagram feed to create AI porn influencers///6h agoWomen sue the men who used their Instagram feed to create AI porn influencers///
BACK TO GLOSSARY
CONConceptsWar

North Korea

12 mentions across all digests

East Asian nation-state responsible for state-sponsored cyberattacks, having stolen approximately $2 billion in cryptocurrency in 2025 alone through hacking groups targeting DeFi platforms and social engineering campaigns.

/// Stats
First Seen2026-04-07
Last Seen2026-04-25
Total Mentions12
Subject Mentions4
Last 7 Days1
Sources6
Peak Relevance5/5
Active Predictions2
/// Recent Stories
2026-04-23HIGH

Inside Lazarus: How North Korea uses AI to industrialize attacks on developers

North Korea's HexagonalRodent APT weaponized mainstream generative AI tools (Cursor, ChatGPT) to automate social engineering and supply chain attacks targeting developers—stealing $12M in cryptocurrency while compromising the fast-draft VSCode extension.

2026-04-21HIGH

Nation-states want to cause harm, not just steal cash - stop handing your cyber defenses to the cheapest contractor

UK National Cyber Security Centre CEO warns that China now represents a peer-level competitor in cyberspace with sophisticated state-sponsored attacks, citing an average of four nationally significant incidents per we...

2026-04-20HIGH

North Korea hackers blamed for $290M crypto theft

State-sponsored North Korean hackers exploited LayerZero's cross-chain bridge to steal $290M from Kelp DAO, exposing how DeFi infrastructure vulnerabilities attract systematic geopolitical threats.

2026-04-14HIGH

Fraudulent Cryptocurrency App in Mac App Store Stole $9.5 Million From 50-Some Users

$285M Drift Protocol exploit using durable nonces and social engineering reveals Circle's inability to freeze stolen USDC, exposing stablecoin governance centralization risks.

2026-04-11HIGH

Two different attackers poisoned popular open source tools - and showed us the future of supply chain compromise

March 2026 supply chain attacks poisoned Trivy and Axios via social engineering, stealing secrets from tens of thousands of organizations across development pipelines and cloud environments with planned follow-up exploitation.