A security analyst learns that an attack vector, which was used as a part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of initial exploit. Which of the following logs should the analyst review first?
tomahawk117
1 week, 4 days agoAnyio
1 month, 2 weeks ago