Laptop Mules: How North Korea Is Infiltrating Remote Workforces (Part 2)

Hiring processes have become the new front line of cyber warfare. In our previous post, we detailed the tactics used by North Korean cyber operatives to infiltrate hiring processes using local accomplices to receive and configure corporate laptops, otherwise known as “laptop mules”. Below, we run through three real-life examples of these infiltration schemes, the […]
How to Implement Age Assurance for UK Online Safety Act Compliance

On April 24th, 2025, Ofcom, the independent regulator for communications services in the UK, published its Protection of Children Codes of Practice. These Codes comprise over 40 practical safety measures that digital platforms will be required to implement by July 25th, 2025 to comply with the UK Online Safety Act and avoid penalties of up to […]