OP 18 July, 2020 - 09:06 AM
"An OPSEC error by an Iranian threat actor has laid bare the inner workings of the hacking group by providing a rare insight into the "behind-the-scenes look into their methods."
IBM's X-Force Incident Response Intelligence Services (IRIS) got hold of nearly five hours worth of video recordings of the state-sponsored group it calls ITG18 (also called Charming Kitten, Phosphorous) that it uses to train its operators."
https://thehackernews.com/2020/07/irania...ideos.html
IBM's X-Force Incident Response Intelligence Services (IRIS) got hold of nearly five hours worth of video recordings of the state-sponsored group it calls ITG18 (also called Charming Kitten, Phosphorous) that it uses to train its operators."
https://thehackernews.com/2020/07/irania...ideos.html