Steve works as an analyst in a UK-based firm. He was asked to perform network monitoring to find any evidence of compromise. During the network monitoring, he came to know that there are multiple logins from different locations in a short time span. Moreover, he also observed certain irregular log in patterns from locations where the organization does not have business relations. This resembles that somebody is trying to steal confidential information.
Which of the following key indicators of compromise does this scenario present?
Bigbear246
Highly Voted 1 year, 8 months agoBionicBeaver
Most Recent 11 months agoAnzk
11 months, 2 weeks agokeloki2020
11 months, 4 weeks agoLordXander
1 year, 2 months agoArt007
1 year, 5 months agopinguin666
1 year, 8 months ago