A security analyst learns that an attack vector, which was used as a part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of initial exploit. Which of the following logs should the analyst review first?
Anyio
Highly Voted 5 months, 1 week agotomahawk117
Most Recent 4 months agoKonversation
3 months ago