A company recently discovered that an unauthorized user accessed its cloud storage and modified sensitive data. Upon investigation, it was found that the attacker used valid login credentials of an employee. This situation is most likely a case of:

  • Cross-Site Scripting (XSS) Vulnerability
  • Distributed Denial of Service
  • Insider Threat
  • Man-in-the-Middle (MitM) Attack
This scenario most likely represents an insider threat, where a trusted insider misuses their access privileges to harm the organization, in this case, by modifying data.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *