Unprecedented investigation capturing live video footage and real-time activity from inside a North Korean IT worker operation, revealing the full scope of their infiltration tactics and remote work schemes.

In-depth analysis of DPRK-linked cyber operations and emerging threat landscapes

Investigation into how North Korean IT workers are evolving their tactics by posing as IT recruiters, systematically harvesting identities on freelance platforms to infiltrate organizations worldwide.

Exposing fraudulent recruiter profiles on GitHub and LinkedIn used by threat actors to target developers and infiltrate organizations through social engineering tactics.