An analyst is examining the logs for a web application's login form. They see thousands of failed logon attempts using various usernames and passwords. Internet research indicates that these credentials may have been compiled by combining account information from several recent data breaches.
Which type of attack would this be an example of?
Delsie
1 months agoAlton
16 hours agoFrancine
2 days agoAlpha
8 days agoLeota
10 days agoBettina
10 days agoDelmy
15 days agoFrederick
17 days agoVallie
19 days agoEmile
27 days agoSheron
2 months agoFelicitas
2 months agoTijuana
2 months agoRolf
22 days agoAlfred
1 months agoBarrett
1 months agoMary
2 months agoEugene
2 months agoHoa
2 months agoKathrine
1 months agoIdella
1 months agoDaniel
2 months ago