logo
episode-header-image
Nov 2024
33m 28s

Cyber Espionage and Financial Crime: Nor...

Palo Alto Networks and N2K Networks
About this episode

In this episode of Threat Vector, host David Moulton speaks with Assaf Dehan, Director of Threat Research at Palo Alto Networks’ Cortex team, about the rising cyber threat from North Korea. Dehan, a cybersecurity expert with over 18 years of experience, discusses the nation's strategic shift towards cybercrime for financial gain, highlighting the scale and sophistication of their operations. Together, they examine the evolution of North Korea’s hacking capabilities—from high-profile attacks like the 2014 Sony hack to current, more calculated cyber operations, including crypto heists and malware targeting global financial institutions.


Dehan breaks down how North Korea has leveraged cyber warfare as a cost-effective, asymmetric strategy, allowing the regime to target various sectors, from tech to defense, while evading accountability. With billions of dollars reportedly generated through cybercrime, North Korea’s unique blend of espionage, sabotage, and financial crime poses a dual threat to governments and businesses alike.


Read the latest Threat Research on North Korean Threat Actors at

https://unit42.paloaltonetworks.com/threat-assessment-north-korean-threat-groups-2024/ and https://unit42.paloaltonetworks.com/tag/north-korea/ 


Join the conversation on our social media channels:


About Threat Vector

Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.


The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.


Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.


Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

Up next
Today
Securing Modern Workforce
Hybrid work has changed the game, but has your security kept up? In this episode of Threat Vector, David Moulton sits down with Harish Singh, Vice President and Global Head of Infrastructure and Application Management at Wipro, to unpack the evolving cybersecurity landscape at th ... Show More
32m 7s
Oct 2
The High Cost of Chasing Compliance, Not Security
Welcome to Threat Vector, the Palo Alto Networks podcast. In this episode, host David Moulton speaks with Joey Smith, Vice President & Chief Information Security Officer at Schnuck Markets. Joey brings experience from leading incident response and forensics at MasterCard to spear ... Show More
37m 44s
Sep 25
What Happened to Hacker Culture?
Join David Moulton, Senior Director of Thought Leadership for Unit 42, as he sits down with Kyle Wilhoit,Technical Director of Threat Research at Unit 42, for an intimate conversation about the evolution of hacker culture and cybersecurity. From picking up 2600: The Hacker Quarte ... Show More
38m 2s
Recommended Episodes
Feb 2025
FBI Saves Millions and Lives in Cyber Hacking Take Down: Cyber Security Today for February 15, 2025
Cybersecurity Today: North Korean Hacks, AI Memory Breach, and School Data Comprimise In this episode of Cybersecurity Today, host Jim Love covers a range of crucial topics in the cybersecurity landscape. North Korean hackers are using new social engineering tactics to infiltrate ... Show More
9m 51s
Aug 2024
Cybersecurity leaders gear up for the ultimate test.
Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols ... Show More
33m 2s
Dec 2024
Decoding XDR: Allie Mellen on What’s Next [Threat Vector]
While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, Threat Vector by Palo Alto Networks. See you in 2025! Announcement: We are pleased to share an exciting announcement about Cortex XDR at the top of our show. You can learn more ... Show More
39m 59s
Nov 2024
China is an increasing threat in Cyber Security: Cyber Security Today for Monday, November 4, 2024
Chinese Cybersecurity Threats: Espionage in Silicon Valley, Canadian Government Infiltration, and Persistent Botnets In this special edition of Cyber Security Today, host Jim Love discusses three alarming stories illustrating the increasing cybersecurity threats posed by China. T ... Show More
7m 54s
Aug 2024
Almost letting hackers rule the web.
A Wordpress plugin vulnerability puts 5 million sites at risk. Google releases an emergency Chrome update addressing an actively exploited vulnerability. Cisco patches multiple vulnerabilities. Researchers say Slack AI is vulnerable to prompt injection. Widely used RFID smart car ... Show More
32m 7s
Apr 2025
When fake fixes hide real attacks.
Adversary nations are using ClickFix in cyber espionage campaigns. Japan’s Financial Services Agency issues an urgent warning after hundreds of millions in unauthorized trades. The critical Erlang/OTP’s SSH vulnerability now has public exploits. A flawed rollout of a new Microsof ... Show More
31m 36s
Jun 2025
Iran’s digital threat after U.S. strikes.
Cybersecurity warnings about possible Iranian retaliation have surged. A potential act of sabotage disrupts the NATO Summit in The Hague. Canadian cybersecurity officials discover Salt Typhoon breached a major telecom provider. The U.S. House bans WhatsApp from all government dev ... Show More
31m 35s
Feb 2025
Pay the ransom or risk data carnage.
Qilin ransomware gang claims responsibility for attack against Lee Enterprises. Thai police arrest suspected hacker behind more than 90 data leaks. JavaGhost uses compromised AWS environments to launch phishing campaigns. LotusBlossum cyberespionage campaigns target Southeast Asi ... Show More
31m 19s
Nov 2024
Canada cuts TikTok ties.
Canada orders ByteDance to shut down local operations. Cisco releases urgent patches for multiple vulnerabilities. SteelFox malware delivers a crypto-miner and info-stealer. North Korean campaigns pursue fake jobs and remote workers. A suspected cyber intrusion disrupts Washingto ... Show More
36m 42s