An analyst is examining the logs for a web application's login form. They see thousands of failed logon attempts using various usernames and passwords. Internet research indicates that these credentials may have been compiled by combining account information from several recent data breaches.
Which type of attack would this be an example of?
Delsie
2 months agoAlton
24 days agoFrancine
25 days agoAlpha
1 months agoLeota
1 months agoBettina
1 months agoDelmy
1 months agoFrederick
1 months agoVallie
1 months agoEmile
2 months agoSheron
3 months agoFelicitas
3 months agoTijuana
3 months agoRolf
1 months agoAlfred
2 months agoBarrett
2 months agoMary
2 months agoEugene
3 months agoHoa
3 months agoKathrine
2 months agoIdella
2 months agoDaniel
3 months ago