A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped.
The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites.
The technician will define this threat as:
CKRET
Highly Voted 3 years, 2 months agoRevZig67
Highly Voted 2 years, 11 months agoblacksheep6r
Most Recent 2 months, 4 weeks agoBiteSize
7 months, 1 week agoDelab202
7 months, 1 week ago23169fd
7 months, 1 week agoFOURDUE
2 years, 3 months agotwirlerrose
3 years, 1 month agoBlackdaRipper
3 years, 2 months agozapato
3 years, 2 months ago