A security analyst learns that an attack vector, which was used as a part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of initial exploit. Which of the following logs should the analyst review first?
tomahawk117
2 months agoKonversation
1 month, 1 week agoAnyio
3 months, 1 week ago