north-korea

Preview image for: Axios NPM Compromise: A Deep Dive into Supply Chain Vulnerability and Precision Threat Actor Tactics

Axios NPM Compromise: A Deep Dive into Supply Chain Vulnerability and Precision Threat Actor Tactics

Axios NPM package briefly compromised, exposing supply chain risks. Analysis of suspected North Korean threat actor tactics and defensive strategies.
Preview image for: Google Uncovers State-Backed Hackers Weaponizing Gemini AI for Advanced Reconnaissance and Attack Support

Google Uncovers State-Backed Hackers Weaponizing Gemini AI for Advanced Reconnaissance and Attack Support

Google reports North Korea's UNC2970 using Gemini AI for target recon, accelerating cyberattacks and information operations.
X
To give you the best possible experience, https://iplogger.org uses cookies. Using means you agree to our use of cookies. We have published a new cookies policy, which you should read to find out more about the cookies we use. View Cookies politics