A threat intelligence analyst who works for a technology firm received this report from a vendor.
"There has been an intellectual property theft campaign executed against organizations in the technology industry. Indicators for this activity are unique to each intrusion. The information that appears to be targeted is R&D data. The data exfiltration appears to occur over months via uniform TTPs. Please execute a defensive operation regarding this attack vector."
Which of the following combinations suggests how the threat should MOST likely be classified and the type of analysis that would be MOST helpful in protecting against this activity?
slcc99
Highly Voted 5 years, 1 month agos3curity
Highly Voted 5 years, 5 months ago[Removed]
4 years, 7 months agoJeend
Most Recent 2 years, 4 months agoAcrisius
4 years, 5 months agoT_rev93
5 years, 2 months agoVanDangle
5 years, 4 months ago