logo
episode-header-image
Nov 2024
33m 28s

Cyber Espionage and Financial Crime: Nor...

Palo Alto Networks and N2K Networks
About this episode

In this episode of Threat Vector, host David Moulton speaks with Assaf Dehan, Director of Threat Research at Palo Alto Networks’ Cortex team, about the rising cyber threat from North Korea. Dehan, a cybersecurity expert with over 18 years of experience, discusses the nation's strategic shift towards cybercrime for financial gain, highlighting the scale and sophistication of their operations. Together, they examine the evolution of North Korea’s hacking capabilities—from high-profile attacks like the 2014 Sony hack to current, more calculated cyber operations, including crypto heists and malware targeting global financial institutions.


Dehan breaks down how North Korea has leveraged cyber warfare as a cost-effective, asymmetric strategy, allowing the regime to target various sectors, from tech to defense, while evading accountability. With billions of dollars reportedly generated through cybercrime, North Korea’s unique blend of espionage, sabotage, and financial crime poses a dual threat to governments and businesses alike.


Read the latest Threat Research on North Korean Threat Actors at

https://unit42.paloaltonetworks.com/threat-assessment-north-korean-threat-groups-2024/ and https://unit42.paloaltonetworks.com/tag/north-korea/ 


Join the conversation on our social media channels:


About Threat Vector

Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.


The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.


Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.


Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

Up next
Jul 3
Hunting Threats in Developer Environments
Cyber attackers are increasingly targeting the very tools developers trust—integrated development environments (IDEs), low-code platforms, and public code repositories. In this episode of Threat Vector, host David Moulton speaks with Daniel Frank and Tom Fakterman from Palo Alto ... Show More
25m 5s
Jun 26
The 90,000 Credential Wake-Up Call
In this episode of Threat Vector, host David Moulton is joined by ⁠Nathaniel Quist⁠, Manager of Cloud Threat Intelligence at Palo Alto Networks’ Cortex. Together, they break down a large-scale cloud extortion campaign that exposed over 90,000 credentials across more than 1,100 cl ... Show More
34m 17s
Jun 18
Cut the Noise, Ditch the Nonsense, Earn the Trust
In this episode of Threat Vector, host David Moulton sits down with Tyler Shields, Principal Analyst at ESG, entrepreneur, and cybersecurity marketing expert, to discuss the fine line between thought leadership and echo chambers in the industry. Tyler breaks down what true though ... Show More
33m 55s
Recommended Episodes
Feb 2025
FBI Saves Millions and Lives in Cyber Hacking Take Down: Cyber Security Today for February 15, 2025
Cybersecurity Today: North Korean Hacks, AI Memory Breach, and School Data Comprimise In this episode of Cybersecurity Today, host Jim Love covers a range of crucial topics in the cybersecurity landscape. North Korean hackers are using new social engineering tactics to infiltrate ... Show More
9m 51s
Aug 2024
Cybersecurity leaders gear up for the ultimate test.
Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols ... Show More
33m 2s
Nov 2024
China is an increasing threat in Cyber Security: Cyber Security Today for Monday, November 4, 2024
Chinese Cybersecurity Threats: Espionage in Silicon Valley, Canadian Government Infiltration, and Persistent Botnets In this special edition of Cyber Security Today, host Jim Love discusses three alarming stories illustrating the increasing cybersecurity threats posed by China. T ... Show More
7m 54s
Aug 2024
Almost letting hackers rule the web.
A Wordpress plugin vulnerability puts 5 million sites at risk. Google releases an emergency Chrome update addressing an actively exploited vulnerability. Cisco patches multiple vulnerabilities. Researchers say Slack AI is vulnerable to prompt injection. Widely used RFID smart car ... Show More
32m 7s
Apr 21
When fake fixes hide real attacks.
Adversary nations are using ClickFix in cyber espionage campaigns. Japan’s Financial Services Agency issues an urgent warning after hundreds of millions in unauthorized trades. The critical Erlang/OTP’s SSH vulnerability now has public exploits. A flawed rollout of a new Microsof ... Show More
31m 36s
Jun 24
Iran’s digital threat after U.S. strikes.
Cybersecurity warnings about possible Iranian retaliation have surged. A potential act of sabotage disrupts the NATO Summit in The Hague. Canadian cybersecurity officials discover Salt Typhoon breached a major telecom provider. The U.S. House bans WhatsApp from all government dev ... Show More
31m 35s
Jun 10
Jedai tricks, human risks.
An unsecured Chroma database exposes personal information of Canva Creators. A researcher brute-forces Google phone numbers. Five zero-day vulnerabilities in Salesforce Industry Cloud are uncovered. Librarian Ghouls target Russian organizations with stealthy malware. SAP releases ... Show More
33m 59s
Apr 10
Former cybersecurity officials lose clearances.
Trump targets former cybersecurity officials. Senator blocks CISA nominee over telecom security concerns. The acting head of NSA and Cyber Command makes his public debut. Escalation of Cyber Tensions in U.S.-China Trade Relations. Researchers evaluate the effectiveness of Large L ... Show More
32m 31s
Feb 2025
Pay the ransom or risk data carnage.
Qilin ransomware gang claims responsibility for attack against Lee Enterprises. Thai police arrest suspected hacker behind more than 90 data leaks. JavaGhost uses compromised AWS environments to launch phishing campaigns. LotusBlossum cyberespionage campaigns target Southeast Asi ... Show More
31m 19s