logo
episode-header-image
Nov 2024
33m 28s

Cyber Espionage and Financial Crime: Nor...

Palo Alto Networks and N2K Networks
About this episode

In this episode of Threat Vector, host David Moulton speaks with Assaf Dehan, Director of Threat Research at Palo Alto Networks’ Cortex team, about the rising cyber threat from North Korea. Dehan, a cybersecurity expert with over 18 years of experience, discusses the nation's strategic shift towards cybercrime for financial gain, highlighting the scale and sophistication of their operations. Together, they examine the evolution of North Korea’s hacking capabilities—from high-profile attacks like the 2014 Sony hack to current, more calculated cyber operations, including crypto heists and malware targeting global financial institutions.


Dehan breaks down how North Korea has leveraged cyber warfare as a cost-effective, asymmetric strategy, allowing the regime to target various sectors, from tech to defense, while evading accountability. With billions of dollars reportedly generated through cybercrime, North Korea’s unique blend of espionage, sabotage, and financial crime poses a dual threat to governments and businesses alike.


Read the latest Threat Research on North Korean Threat Actors at

https://unit42.paloaltonetworks.com/threat-assessment-north-korean-threat-groups-2024/ and https://unit42.paloaltonetworks.com/tag/north-korea/ 


Join the conversation on our social media channels:


About Threat Vector

Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.


The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.


Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.


Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

Up next
Aug 21
Communicating Cyber Risk Effectively to Your Board
In this episode of Threat Vector, host David Moulton speaks with Abby Adlerman, CEO of Boardspan, about how boards approach cybersecurity oversight. Drawing on decades of experience advising Fortune 100 companies and non-profits, Abby shares the OARS framework—Oversight, Accounta ... Show More
39m 14s
Aug 14
Designing Human-Centered Security Operations
Security analysts are drowning in tools, alerts, and tabs. In this episode of Threat Vector, David Moulton, Senior Director of Thought Leadership for Unit 42, talks with Patrick Bayle, SecOps Consulting Manager, and Liz Pinder, SecOps Consultant, both with deep experience in Secu ... Show More
40m 16s
Aug 7
Securing the Unsecurable: Inside the Black Hat NOC and Zero-Hour Resilience
In this episode of Threat Vector, host David Moulton speaks with Jason Reverri, Manager of Technical Product Engineering for Cortex at Palo Alto Networks, and James Holland, Distinguished Engineer for Technology Innovation at Palo Alto Networks, about the unique challenge of defe ... Show More
39m 38s
Recommended Episodes
Feb 2025
FBI Saves Millions and Lives in Cyber Hacking Take Down: Cyber Security Today for February 15, 2025
Cybersecurity Today: North Korean Hacks, AI Memory Breach, and School Data Comprimise In this episode of Cybersecurity Today, host Jim Love covers a range of crucial topics in the cybersecurity landscape. North Korean hackers are using new social engineering tactics to infiltrate ... Show More
9m 51s
Aug 2024
Cybersecurity leaders gear up for the ultimate test.
Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols ... Show More
33m 2s
Dec 2024
Decoding XDR: Allie Mellen on What’s Next [Threat Vector]
While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, Threat Vector by Palo Alto Networks. See you in 2025! Announcement: We are pleased to share an exciting announcement about Cortex XDR at the top of our show. You can learn more ... Show More
39m 59s
Nov 2024
China is an increasing threat in Cyber Security: Cyber Security Today for Monday, November 4, 2024
Chinese Cybersecurity Threats: Espionage in Silicon Valley, Canadian Government Infiltration, and Persistent Botnets In this special edition of Cyber Security Today, host Jim Love discusses three alarming stories illustrating the increasing cybersecurity threats posed by China. T ... Show More
7m 54s
Aug 2024
Almost letting hackers rule the web.
A Wordpress plugin vulnerability puts 5 million sites at risk. Google releases an emergency Chrome update addressing an actively exploited vulnerability. Cisco patches multiple vulnerabilities. Researchers say Slack AI is vulnerable to prompt injection. Widely used RFID smart car ... Show More
32m 7s
Apr 2025
When fake fixes hide real attacks.
Adversary nations are using ClickFix in cyber espionage campaigns. Japan’s Financial Services Agency issues an urgent warning after hundreds of millions in unauthorized trades. The critical Erlang/OTP’s SSH vulnerability now has public exploits. A flawed rollout of a new Microsof ... Show More
31m 36s
Jun 24
Iran’s digital threat after U.S. strikes.
Cybersecurity warnings about possible Iranian retaliation have surged. A potential act of sabotage disrupts the NATO Summit in The Hague. Canadian cybersecurity officials discover Salt Typhoon breached a major telecom provider. The U.S. House bans WhatsApp from all government dev ... Show More
31m 35s
Jun 10
Jedai tricks, human risks.
An unsecured Chroma database exposes personal information of Canva Creators. A researcher brute-forces Google phone numbers. Five zero-day vulnerabilities in Salesforce Industry Cloud are uncovered. Librarian Ghouls target Russian organizations with stealthy malware. SAP releases ... Show More
33m 59s
Apr 2025
Former cybersecurity officials lose clearances.
Trump targets former cybersecurity officials. Senator blocks CISA nominee over telecom security concerns. The acting head of NSA and Cyber Command makes his public debut. Escalation of Cyber Tensions in U.S.-China Trade Relations. Researchers evaluate the effectiveness of Large L ... Show More
32m 31s