Friday, July 17, 2020
Iranian Hackers Accidentally Exposed Their Training Videos (40 GB) Online
An OPSEC error by an Iranian threat actor has laid bare the inner workings of the hacking group by providing a rare insight into the “behind-the-scenes look into their methods.” IBM’s X-Force Incident Response Intelligence Services (IRIS) got hold of nearly five hours worth of video recordings of the state-sponsored group it calls ITG18 (also called Charming Kitten, Phosphorous, or APT35) that
Subscribe to:
Post Comments (Atom)
Featured Post
Hackers Exploiting ProxyLogon and ProxyShell Flaws in Spam Campaigns
Threat actors are exploiting ProxyLogon and ProxyShell exploits in unpatched Microsoft Exchange Servers as part of an ongoing spam campaign
Popular Posts
-
Threat actors are exploiting ProxyLogon and ProxyShell exploits in unpatched Microsoft Exchange Servers as part of an ongoing spam campaign
-
Venezuela used to be the richest country in Latin America, sitting on the world’s largest oil reserves. Yet Venezuelans are scrambling for m...
-
Tired of home security cameras that add nothing to your home (besides, well, surveillance)? The Ulo, created by Luxembourg-based Mu Design, ...
No comments:
Post a Comment