An analyst is examining the logs for a web application's login form. They see thousands of failed logon attempts using various usernames and passwords. Internet research indicates that these credentials may have been compiled by combining account information from several recent data breaches.
Which type of attack would this be an example of?
Delsie
10 months agoAlton
8 months agoFrancine
8 months agoAlpha
8 months agoLeota
9 months agoBettina
9 months agoDelmy
9 months agoFrederick
9 months agoVallie
9 months agoEmile
9 months agoSheron
10 months agoFelicitas
10 months agoTijuana
10 months agoRolf
9 months agoAlfred
10 months agoBarrett
10 months agoMary
10 months agoEugene
10 months agoHoa
10 months agoKathrine
10 months agoIdella
10 months agoDaniel
10 months ago