Company Details
national-committee-on-north-korea
6
1,001
54172
ncnk.org
0
NAT_1476043
In-progress

National Committee on North Korea Company CyberSecurity Posture
ncnk.orgThe National Committee on North Korea (NCNK) is a non-governmental organization of persons with significant and diverse expertise related to the Democratic People’s Republic of Korea. NCNK and its members support principled engagement with North Korea as a means to promote peace and stability on the Korean Peninsula and to improve the lives of the people of North Korea. NCNK also works to provide policymakers, the academic and think tank community, and the general public with substantive and balanced information about developments in North Korea. NCNK was founded by Mercy Corps, a global aid and development organization, in 2004.
Company Details
national-committee-on-north-korea
6
1,001
54172
ncnk.org
0
NAT_1476043
In-progress
Between 700 and 749

NCNK Global Score (TPRM)XXXX

Description: North Korea is experiencing a significant internet outage, affecting key websites like its main news outlets and the Foreign Ministry. The disruption appears to be internal rather than a cyberattack. The country's entire internet infrastructure is currently undetectable by monitoring systems, raising questions about the cause.


National Committee on North Korea has 0.0% fewer incidents than the average of same-industry companies with at least one recorded incident.
National Committee on North Korea has 53.85% more incidents than the average of all companies with at least one recorded incident.
National Committee on North Korea reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
NCNK cyber incidents detection timeline including parent company and subsidiaries

The National Committee on North Korea (NCNK) is a non-governmental organization of persons with significant and diverse expertise related to the Democratic People’s Republic of Korea. NCNK and its members support principled engagement with North Korea as a means to promote peace and stability on the Korean Peninsula and to improve the lives of the people of North Korea. NCNK also works to provide policymakers, the academic and think tank community, and the general public with substantive and balanced information about developments in North Korea. NCNK was founded by Mercy Corps, a global aid and development organization, in 2004.


Founded in 2010 and operating out of Canada, the Carlisle Institute is a not-for-profit research center and think tank that focuses on issues associated with globalization and their social implications. The Carlisle Institute is an independent, non-partisan and impartial organization funded by its m

What is the Academy? Since the National Academy of Social Insurance was founded in 1986, it has been a national leader on social insurance policy. Throughout the Academy’s nearly 40-year history, the Academy and our members have championed the safeguarding, strengthening, and updating of America’s

At CEA Tech we feel strongly that technology research is a crucial component of both innovation and value creation. It is this belief that has driven our successful technology development activities over the past 50 years. CEA Tech is the CEA’s (the French Atomic Energy and Alternative Energy Commi

Créé en 2008, l’Institut Matériaux Microélectronique Nanoscience de Provence (IM2NP) est une grande unité de recherche pluridisciplinaire d’environ 300 personnes située aux confluents de la physique, de la chimie et de la micro-électronique. L’IM2NP possède un large spectre de compétences qui lui pe

India’s sole think-tank that concentrates, with unwavering focus, upon the entire gamut of subjects and disciplines relevant to the maritime domain. As a serious think-tank, the NMF undertakes intellectual, academic and interactive activities related to research, advocacy, and convening. It also has

The New Policy Institute (NPI) is a British think tank based in London. NPI was founded in 1996 with a mission of advancing social justice in a market economy. It conducts research and consultancy work across a range of economic and social policy areas including poverty, social security, housing, an
.png)
Here's a look at hacking incidents during the 2016 presidential race between Donald Trump and Hillary Clinton. For details about investigations into hacking...
As the Trump administration recalibrates America's global priorities, containing Pyongyang should be at the top of its agenda.
The Federal Communications Commission's new Council on National Security is sharpening its focus on telecommunications supply chain threats.
The dual-use nature of AI highlights the growing importance of addressing AI security in South Korea's national defense.
Defense Department leaders delivered a stark warning about adversaries exploiting cyberspace and threatening national security during a...
This webinar explores the experiences of Brunei and Singapore in combatting cyber threats and efforts to address security for the future.
Russian meddling with the 2016 U.S. presidential election, cyber attacks on national power grids and clandestine attacks on North Korean...
North Korea's cyberattacks have targeted a wide range of sectors globally, including medical institutions, defense contractors,...
Annual report says Beijing making 'steady but uneven' progress on capabilities to capture Taiwan.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of National Committee on North Korea is http://www.ncnk.org.
According to Rankiteo, National Committee on North Korea’s AI-generated cybersecurity score is 734, reflecting their Moderate security posture.
According to Rankiteo, National Committee on North Korea currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, National Committee on North Korea is not certified under SOC 2 Type 1.
According to Rankiteo, National Committee on North Korea does not hold a SOC 2 Type 2 certification.
According to Rankiteo, National Committee on North Korea is not listed as GDPR compliant.
According to Rankiteo, National Committee on North Korea does not currently maintain PCI DSS compliance.
According to Rankiteo, National Committee on North Korea is not compliant with HIPAA regulations.
According to Rankiteo,National Committee on North Korea is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
National Committee on North Korea operates primarily in the Think Tanks industry.
National Committee on North Korea employs approximately 6 people worldwide.
National Committee on North Korea presently has no subsidiaries across any sectors.
National Committee on North Korea’s official LinkedIn profile has approximately 1,001 followers.
National Committee on North Korea is classified under the NAICS code 54172, which corresponds to Research and Development in the Social Sciences and Humanities.
No, National Committee on North Korea does not have a profile on Crunchbase.
Yes, National Committee on North Korea maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/national-committee-on-north-korea.
As of December 05, 2025, Rankiteo reports that National Committee on North Korea has experienced 1 cybersecurity incidents.
National Committee on North Korea has an estimated 812 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Title: North Korean Internet Outage
Description: North Korea is experiencing a significant internet outage, affecting key websites and the Foreign Ministry. The cause is suspected to be internal rather than a cyberattack.
Date Detected: Saturday
Type: Internet Outage
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Systems Affected: Main news websitesForeign Ministry website
Downtime: Ongoing

Entity Name: North Korea
Entity Type: Government
Industry: Public Sector
Location: North Korea

Source: Reuters
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Reuters.

Investigation Status: Ongoing

Root Causes: Internal issue suspected
Most Recent Incident Detected: The most recent incident detected was on Saturday.
Most Significant System Affected: The most significant system affected in an incident was Main news websitesForeign Ministry website.
Most Recent Source: The most recent source of information about an incident is Reuters.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
.png)
Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.
Monkeytype is a minimalistic and customizable typing test. In 25.49.0 and earlier, there is improper handling of user input which allows an attacker to execute malicious javascript on anyone viewing a malicious quote submission. quote.text and quote.source are user input, and they're inserted straight into the DOM. If they contain HTML tags, they will be rendered (after some escaping using quotes and textarea tags).
SysReptor is a fully customizable pentest reporting platform. Prior to 2025.102, there is a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated users to execute malicious JavaScript in the context of other logged-in users by uploading malicious JavaScript files in the web UI. This vulnerability is fixed in 2025.102.
Taiko Alethia is an Ethereum-equivalent, permissionless, based rollup designed to scale Ethereum without compromising its fundamental properties. In 2.3.1 and earlier, TaikoInbox._verifyBatches (packages/protocol/contracts/layer1/based/TaikoInbox.sol:627-678) advanced the local tid to whatever transition matched the current blockHash before knowing whether that batch would actually be verified. When the loop later broke (e.g., cooldown window not yet passed or transition invalidated), the function still wrote that newer tid into batches[lastVerifiedBatchId].verifiedTransitionId after decrementing batchId. Result: the last verified batch could end up pointing at a transition index from the next batch (often zeroed), corrupting the verified chain pointer.
A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.