A security engineer is reviewing log files after a third party discovered usernames and passwords for the organization's accounts. The engineer sees there was a change in the IP address for a vendor website one week earlier. This change lasted eight hours. Which of the following attacks was MOST likely used?
sujon_london
Highly Voted 1 year, 9 months agoNemish71
Most Recent 1 year, 1 month agoadamer91
1 year, 6 months agofryderyk
1 year, 6 months ago