An OPSEC error by an Iranian threat actor has laid bare the inner workings of the hacking group. IBM researchers say they found the videos on a virtual private cloud server that was left exposed due to a misconfiguration of security settings. The group has a long history of targeting the U.S. and Middle Eastern military, diplomatic, and government personnel for intelligence gathering and espionage to serve Iran’s geopolitical interests. The discovery emphasizes the need to secure your accounts by using stronger passwords, turning on two-factor authentication, and reviewing and limiting access to third-party apps.
Source: https://thehackernews.com/2020/07/iranian-hacking-training-videos.html

