An organization’s critical data was exfiltrated from a computer system in a cyberattack. A cloud analyst wants to identify the root cause and is reviewing the following security logs of a software web application:
Which of the following types of attacks occurred?
cwilson91
1 week, 4 days ago