A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped.
The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites.
The technician will define this threat as:
CKRET
Highly Voted 3 years, 4 months agoRevZig67
Highly Voted 3 years, 1 month agoblacksheep6r
Most Recent 4 months, 3 weeks agoBiteSize
9 months, 1 week agoDelab202
9 months, 1 week ago23169fd
9 months, 1 week agoFOURDUE
2 years, 5 months agotwirlerrose
3 years, 3 months agoBlackdaRipper
3 years, 4 months agozapato
3 years, 4 months ago