CYBERNEWSMEDIA Network:||
AD · 970×250

Cybercrime·Malware & Threats

Here’s How North Korean Hackers Stole Data From Isolated Network Segment

During an attack on the defense industry, the North Korea-linked threat group known as Lazarus was able to exfiltrate data from a restricted network segment by taking control of a router and setting it up as a proxy server. The post Here’s How North Korean Hackers Stole Data From Isolated Network Segment appeared first on SecurityWeek.

During an attack on the defense industry, the North Korea-linked threat group known as Lazarus was able to exfiltrate data from a restricted network segment by taking control of a router and setting it up as a proxy server.

Latest News

CYBERNEWSMEDIAPublisher