A security analyst is conducting an investigation regarding a potential insider threat. An unauthorized USB device might have been used to exfiltrate proprietary data from a Linux system.
Which of the following options would identify the IoCs and provide the appropriate response?
Bright07
3 weeks, 1 day agoa18733c
1 month, 3 weeks agoBright07
3 months, 2 weeks agoSangSang
4 months, 3 weeks agotony_wang99
5 months, 1 week agoEAlonso
5 months, 3 weeks ago