Back to Entity Graph

🌍 North Korea Location

19 articles First seen: Dec 19, 2025 Last seen: 2d ago
Activity Timeline (90 days)
Co-occurring Entities
Articles (19)
Privileged but Powerless: Jieun Baek on Pyongyang's greatest weakness - Atlantic Council
The Atlantic Council’s Indo-Pacific Security Initiative (IPSI) will host a book launch event on June 12, 2026, featuring Nonresident Senior Fellow Jieun Baek and her latest book, *Privileged but Power
Privileged but Powerless: Jieun Baek on Pyongyang's greatest weakness - Atlantic Council
The Atlantic Council’s Indo-Pacific Security Initiative (IPSI) will host a book launch event on June 12, 2026, featuring Nonresident Senior Fellow Jieun Baek and her latest book, *Privileged but Power
Russian ship that sank near Spain may have been carrying nuclear reactors to North Korea | Russia | The Guardian
A Russian cargo ship, the **Ursa Major**, sank off the coast of **Murcia, Spain**, on **23 December 2024** after reporting **three mysterious explosions** in its engine room. The 142-metre Russian-fla
The Vietnam and Iran Wars — Similarities, Differences, and Hopefully Some Lessons Learned | by Art Collins | Mar, 2026 | Medium
The article compares the Vietnam War with the 2026 Iran conflict, arguing that both were launched with unrealistic expectations, weak public explanations, and no clear exit strategy. The author, a for
This New Malware Lives on the Blockchain and Can't Ever Be Deleted. Here's What It Can Do | PCMag
Researchers have uncovered a new malware campaign that hides malicious code on blockchains, making it difficult to remove once deployed. The attack began with fake freelance job offers on platforms su
Project Glasswing: Securing critical software for the AI era \ Anthropic
Project Glasswing is a new initiative launched by major tech companies, including Amazon Web Services, Google, and Microsoft, aimed at enhancing the security of critical software in light of advanced
North Korea's hijack of one of the web's most used open source projects was likely weeks in the making | TechCrunch
A recent cyberattack attributed to North Korea successfully hijacked the Axios open source project, a widely used tool for connecting applications to the internet. This breach, which occurred on March
North Korean IT Worker Unmasked After Refusing to Insult Kim Jong Un in Job Interview
A North Korean IT worker, identified as Taro Aikuchi, was exposed during a job interview when he refused to insult Kim Jong Un, a request made to gauge his loyalty. The incident, captured in a viral v
Hackers Are Posting the Claude Code Leak With Bonus Malware | WIRED
A recent WIRED investigation has unveiled a series of cybersecurity incidents, beginning with the unauthorized release of the source code for Anthropic's Claude Code, which hackers have exploited by e
RAIC Labs How Our AI Tracked the Chinese Balloon in Millions of Square Miles of Unlabeled Satellite Data - RAIC Labs
In February 2023, a Chinese balloon flying over the U.S. sparked significant media attention and political fallout. After the balloon was shot down, Synthetaic's RAIC (Rapid Automated Image Categoriza
Policy Change Index
The Policy Change Index (PCI) is an innovative open-source machine learning initiative designed to forecast significant policy changes in authoritarian regimes by analyzing their propaganda outputs. T
US military uses laser to down drone and FAA closes more El Paso airspace, officials say | AP News
The U.S. military recently employed a laser system to successfully down a drone operated by Border Protection, marking a significant development in the use of directed energy technology for surveillan
Chinese researchers suggest lasers and sabotage to counter Musk’s Starlink satellites | The Associated Press
Chinese researchers are developing various strategies, including space-shooting lasers and sabotage, to counter Elon Musk's Starlink satellites, which they view as a significant threat to China's secu
Article from forbes.com | Smry
# Article from forbes.com | Smry **Source**: [www.forbes.com](https://forbes.com/sites/paulocarvao/2026/02/20/should-ai-go-to-war-anthropic-and-the-pentagon-fight-it-out) | **Author**: Article from f
North Korea prison labor replaces home contract work
North Korea is shifting contract manufacturing work from household teams to prisons and state-run factories as Chinese businesses reduce orders due to issues like fraud and poor quality. Work allocate
THE MULTI-DOMAIN BLIND SPOT: THE FRAGMENTATION OF SPACE AND CYBER - War Room - U.S. Army War College
The article from the U.S. Army War College discusses the critical issue of fragmentation between the space and cyber domains, highlighting how modern adversaries exploit this disconnect to gain strate
Why Greenland is important for Golden Dome | The Strategist
Greenland plays a crucial role in the United States' Golden Dome missile-defense project, primarily due to its geographic positioning, which enhances the ability to intercept threats targeting the U.S
https://www.linkedin.com/pulse/eroding-global-stability-cybersecurity-strategies-china-jk9vc?utm_source=share&utm_medium=member_ios&utm_campaign=share_via
North Korean infiltrator caught working in Amazon IT department thanks to lag — 110ms keystroke input raises red…
A North Korean infiltrator was discovered working as a sysadmin at Amazon U.S. after unusual keystroke lag of over 110 milliseconds raised security concerns. Amazon's proactive security measures, incl
🏠Portal 📰Links Q&A 📅Events 💼Jobs