
Joint Cybersecurity Advisory
North Korea Using Social Engineering to Enable Hacking to Think Tanks, Academia, and Media
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
$0.99/mes por los primeros 3 meses

Compra ahora por $6.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Tom Brooks
Acerca de esta escucha
The Federal Bureau of Investigation (FBI), the US Department of State, and the National Security Agency (NSA), together with the Republic of Korea’s National Intelligence Service (NIS), National Police Agency (NPA), and Ministry of Foreign Affairs (MOFA), are jointly issuing this advisory to highlight the use of social engineering by Democratic People’s Republic of Korea (DPRK a.k.a. North Korea) state-sponsored cyber actors to enable computer network exploitation (CNE) globally against individuals employed by research centers and think tanks, academic institutions, and news media organizations.
These North Korean cyber actors are known to conduct spear-phishing campaigns posing as real journalists, academics, or other individuals with credible links to North Korean policy circles. The DPRK employs social engineering to collect intelligence on geopolitical events, foreign policy strategies, and diplomatic efforts affecting its interests by gaining illicit access to the private documents, research, and communications of their targets.
PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.
©2023 Tom Brooks (P)2023 Tom BrooksLos oyentes también disfrutaron...
-
AWS Certified Developer Associate
- Step by Step Certification Study Guide, to Pass the Developers Exam with Confidence
- De: Jamie Murphy
- Narrado por: Tom Brooks
- Duración: 3 h y 43 m
- Versión completa
-
General
-
Narración:
-
Historia
Are you aspiring to become an AWS Certified Developer? Are you looking for a comprehensive resource to prepare for the AWS Certified Developer exam? Look no further! This book is your ultimate guide to acing the AWS Certified Developer certification by providing you with a robust set of practice test questions and detailed answers to help you succeed.
-
-
Read by AI
- De Luke en 06-22-24
De: Jamie Murphy
-
Kali Linux
- Cybersecurity and Hacking Network
- De: Frank Eltrinos
- Narrado por: Rudy Norman
- Duración: 7 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Are you prepared to defend your network from cyberterrorism? Do you understand how the hacking process works? Unfortunately, for many individuals, the answer is no, leaving them exposed to dangers online. The potential dangers of hacking increases as people grow more interconnected. Your business could be held hostage, as you get locked out of your own network. Or, you could have your personal information exposed. Because of these risks, it’s essential that you secure your system.
De: Frank Eltrinos
-
AWS: Amazon Web Services
- A Complete Guide for Beginners and Advanced Users for Amazon Web Services
- De: John C. Evans
- Narrado por: Tom Chandler
- Duración: 6 h y 18 m
- Versión completa
-
General
-
Narración:
-
Historia
This brilliant guide brings to you all the essential practical tips for working with Amazon Web Services. This great book explains enough to understand the subject, without getting bogged down in the details. This is an all-to guide in shifting your perspective on the capabilities of the platform so you can successfully utilize it as a high-level AWS user.
-
-
good book
- De Sherri Anderson en 03-24-20
De: John C. Evans
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- De: Glenn Greenwald
- Narrado por: L. J. Ganser
- Duración: 9 h y 49 m
- Versión completa
-
General
-
Narración:
-
Historia
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
-
Best Read in Print Format
- De Alfredo Ramirez en 11-22-14
De: Glenn Greenwald
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- De: Kim Zetter
- Narrado por: Joe Ochman
- Duración: 13 h
- Versión completa
-
General
-
Narración:
-
Historia
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- De Greg en 11-22-14
De: Kim Zetter
-
AWS Certified Developer Associate
- Step by Step Certification Study Guide, to Pass the Developers Exam with Confidence
- De: Jamie Murphy
- Narrado por: Tom Brooks
- Duración: 3 h y 43 m
- Versión completa
-
General
-
Narración:
-
Historia
Are you aspiring to become an AWS Certified Developer? Are you looking for a comprehensive resource to prepare for the AWS Certified Developer exam? Look no further! This book is your ultimate guide to acing the AWS Certified Developer certification by providing you with a robust set of practice test questions and detailed answers to help you succeed.
-
-
Read by AI
- De Luke en 06-22-24
De: Jamie Murphy
-
Kali Linux
- Cybersecurity and Hacking Network
- De: Frank Eltrinos
- Narrado por: Rudy Norman
- Duración: 7 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Are you prepared to defend your network from cyberterrorism? Do you understand how the hacking process works? Unfortunately, for many individuals, the answer is no, leaving them exposed to dangers online. The potential dangers of hacking increases as people grow more interconnected. Your business could be held hostage, as you get locked out of your own network. Or, you could have your personal information exposed. Because of these risks, it’s essential that you secure your system.
De: Frank Eltrinos
-
AWS: Amazon Web Services
- A Complete Guide for Beginners and Advanced Users for Amazon Web Services
- De: John C. Evans
- Narrado por: Tom Chandler
- Duración: 6 h y 18 m
- Versión completa
-
General
-
Narración:
-
Historia
This brilliant guide brings to you all the essential practical tips for working with Amazon Web Services. This great book explains enough to understand the subject, without getting bogged down in the details. This is an all-to guide in shifting your perspective on the capabilities of the platform so you can successfully utilize it as a high-level AWS user.
-
-
good book
- De Sherri Anderson en 03-24-20
De: John C. Evans
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
No Place to Hide
- Edward Snowden, the NSA, and the U.S. Surveillance State
- De: Glenn Greenwald
- Narrado por: L. J. Ganser
- Duración: 9 h y 49 m
- Versión completa
-
General
-
Narración:
-
Historia
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency’s widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....
-
-
Best Read in Print Format
- De Alfredo Ramirez en 11-22-14
De: Glenn Greenwald
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- De: Kim Zetter
- Narrado por: Joe Ochman
- Duración: 13 h
- Versión completa
-
General
-
Narración:
-
Historia
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- De Greg en 11-22-14
De: Kim Zetter
-
The Plot to Hack America
- How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election
- De: Malcolm Nance
- Narrado por: Gregory Itzin
- Duración: 6 h y 13 m
- Versión completa
-
General
-
Narración:
-
Historia
In April 2016, computer technicians at the Democratic National Committee discovered that someone had accessed the organization's computer servers and conducted a theft that is best described as Watergate 2.0. In the weeks that followed, the nation's top computer security experts discovered that the cyber thieves had helped themselves to everything: sensitive documents, emails, donor information, even voice mails.
-
-
Short and Terrifying
- De Teadrinker en 03-19-17
De: Malcolm Nance
-
Data and Goliath
- The Hidden Battles to Collect Your Data and Control Your World
- De: Bruce Schneier
- Narrado por: Dan John Miller
- Duración: 9 h y 27 m
- Versión completa
-
General
-
Narración:
-
Historia
In Data and Goliath, Schneier reveals the full extent of surveillance, censorship, and propaganda in society today, examining the risks of cybercrime, cyberterrorism, and cyberwar. He shares technological, legal, and social solutions that can help shape a more equal, private, and secure world. This is an audiobook to which everyone with an Internet connection - or bank account or smart device or car, for that matter - needs to listen.
-
-
Great information
- De Jeremy en 06-12-15
De: Bruce Schneier
-
Computer Networking Beginners Guide
- Networking for Beginners. A Simple and Easy Guide to Manage a Network Computer System from the Basics
- De: Erick Stack
- Narrado por: Clay Bel le Fort
- Duración: 3 h y 23 m
- Versión completa
-
General
-
Narración:
-
Historia
Before the advent off the wireless technology era, the existing communication technologies were primarily powered by wired technology. From the telephone to the fax machine, communication was not possible without a physical connection between the communication device and the source of the power of the device. For instance, there had to be a connection between a wired telephone and the dial board for communication to be possible. Just as with every other wired device, wireless communication has successfully displaced wired communication.
De: Erick Stack
-
Hacking with Kali Linux
- Step by Step Guide to Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. Your First Hack and Computer Hacking Beginners Guide
- De: Anthony Hack
- Narrado por: Jordan Gunner
- Duración: 3 h y 18 m
- Versión completa
-
General
-
Narración:
-
Historia
Would you like to learn professional hacking techniques and strategies? Do you want to protect your data from hackers? Become a hacker yourself with this audiobook...Hacking is a very complicated series of processes that take a lot of effort and there are many things that you will need to learn. Hopefully, this audiobook will give you the most basic information so that you will be able to do this properly.
De: Anthony Hack
-
Hacking with Kali Linux
- The Comprehensive Guide on Kali Linux for Beginners Learn the Basics of CyberSecurity and Hacking
- De: Murphy Rangel
- Narrado por: Luciano Marin
- Duración: 3 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
This audiobook is aimed at beginners, and will take you through the basics of computer hacking. You will learn about the different types of hacking, the primary hacking methods, and different areas of a system that can be hacked. The subsequent section is dedicated about VPN and Tor network. You will discover some basic hacks you can do right away, and be pointed in the direction of software that will assist your hacking escapades.
-
-
Professional reader would help a lot
- De Philip Walker en 03-25-25
De: Murphy Rangel
-
Hacking with Kali Linux
- The Step-by-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
- De: David James Carmack
- Narrado por: Ivan Busenius
- Duración: 3 h y 58 m
- Versión completa
-
General
-
Narración:
-
Historia
Why should you learn hacking? First, to protect yourself. Cyber criminals are everywhere, stealing people’s sensitive data, infecting computers with ransomware, and gaining access to bank accounts. Once you’re aware of the techniques they use, you’ll be able to defend yourself. Second, you can become a “white hat hacker”, a cyber security expert who helps companies find vulnerabilities in their software. You can earn tens of thousands of dollars for discovering a single bug.
-
Kali Linux
- The Complete Guide to Learn Linux For Beginners and Kali Linux, Linux System Administration and Command Line, How to Hack with Kali Linux Tools, Computer Hacking and Networking
- De: Anthony Hack
- Narrado por: Robert Plank
- Duración: 3 h y 29 m
- Versión completa
-
General
-
Narración:
-
Historia
The word “hacking” has preconceived connotations, and most people don't quite grasp the whole concept that goes into the process of hacking. Hackers have a notorious reputation. But there’s a side of hacking that most people aren’t aware of: ethical hacking. You don't hear about the ethical hacking in the news, but there are people out there with the same job description fighting the malicious hackers daily, and they get the bad rep.
De: Anthony Hack
-
Darknet
- A Beginner's Guide to Staying Anonymous Online
- De: Lance Henderson
- Narrado por: John T. Parker
- Duración: 2 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
Want to surf the web anonymously? This audiobook is the perfect guide for anyone who wants to cloak their online activities. Whether you're on Usenet, Facebook, P2P, or browsing the web with standard browsers like Opera, Firefox, and Internet Explorer, I will show you how to become a ghost on the internet, leaving no tracks back to your isp, or anyone else.
-
-
Good information, even for techies.
- De J en 01-06-15
De: Lance Henderson
-
Kali Linux: Secure Your Network
- How to Prevent Cyber Terrorism and Defend Your Network with Kali Linux
- De: Frank Eltrinos
- Narrado por: Rudy Norman
- Duración: 3 h y 53 m
- Versión completa
-
General
-
Narración:
-
Historia
Increasingly, technology is becoming more advanced. A secure network can be a great tool, allowing you to store vast amounts of information. However, this has given more power to those with hacking skills, who can exploit poor cybersecurity. Thankfully, you can protect yourself. This audiobook will show you the techniques required to build a secure network in Kali Linux.
-
-
Useful book
- De Dee H. Williams en 05-17-20
De: Frank Eltrinos
-
AWS
- A Beginner’s Guide to the Basics of Amazon Web Service
- De: Adam Garren
- Narrado por: Helen Dove
- Duración: 5 h y 11 m
- Versión completa
-
General
-
Narración:
-
Historia
Amazon has become one of the world's most valuable assets that not only generate revenues from selling goods but has cloud computing and web hosting facilities as its potential profit drivers. This book offers a guide to AWS, for both beginner and advanced users. If you want to reduce your companies operating costs, and control the safety of your data, use this step-by-step guide for computing and networking in the AWS cloud.
De: Adam Garren
-
Computer Networking Beginners Guide
- Ultimate Guide to Master Communication System Including Cisco and Ccna, Wireless, and Cloud Technology, System...and IP Subnetting (Computer Networking Easy)
- De: Ramon Base
- Narrado por: Chris Lynch
- Duración: 3 h y 27 m
- Versión completa
-
General
-
Narración:
-
Historia
Are you a student or a professional who is keen to learn about computer networks? Are you fascinated by the world of computers and every other system that is responsible for the efficient operation of such a wonderful human invention? When you deal with computers on a daily basis, you should be aware of the backbone which supports this incredible invention. The truth is: Computers and technology rule the world today, and most of us are not aware of the network that is responsible for their efficient operation
-
-
Thankful to author for this audiobook
- De Joseph C. Gates en 10-29-19
De: Ramon Base
-
Computer Networking: All in One
- The Complete Guide to Understanding Wireless Technology, Network Security and Mastering Communication Systems. Includes Simples Approach to Learn Hacking Basics and Kali Linux
- De: Norman Laurence
- Narrado por: Cole Niblett
- Duración: 14 h y 4 m
- Versión completa
-
General
-
Narración:
-
Historia
Do you have a big interest in computers and how they work? Are you interested in learning how to become a hacker? Would you like to learn all of this in a safe and secure manner that can make life easier? Computer Networking: All in One contains all the knowledge you need to achieve your goals in the computer world.
-
-
Almost unlistenable
- De Kelly A. Ohlert en 12-31-21
De: Norman Laurence