Cyber EspionageDPRKFraudInsider ThreatThreat Intelligence
From Laptops to Laundromats: How DPRK IT Workers Infiltrated the Global Remote Economy
This report maps the entire ecosystem of a DPRK IT worker infiltration scheme: key actors, GitHub aliases, laundering flows,...