An OPSEC error by an Iranian threat actor has laid bare the inner workings of the hacking group by providing a rare insight into the "behind-the-scenes look into their methods."
IBM's X-Force Incident Response Intelligence Services (IRIS) got hold of nearly five hours worth of video recordings of the state-sponsored group it calls ITG18 (also called Charming Kitten, Phosphorous, or APT35) that
Top News
-
Tenable Acquires Eureka Security To Provide Data Security Across Infrastructure
Tenable® Holdings, Inc., a leading Exposure Management company, has announced a definitive agreement to acquire Eureka Security, Inc., a prominent...
-
SPECTR Malware Targets Ukraine Defense Forces in SickSync Campaign
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting defense forces in the country with a malware called...
-
FBI thu giữ 7.000 khóa giải mã LockBit, sẵn sàng hỗ trợ nạn nhân ransomware
FBI kêu gọi nạn nhân trong các vụ tấn công mã độc đòi tiền chuộc (ransomware) của LockBit lên tiếng sau khi tiết lộ đã thu hơn 7.000 khóa giải...