Security researchers inserted malicious code into the web-applications of various organizations. This allowed them to obtain the personally identifiable information (PII) of various users across multiple databases.

Assets, Threats, and Vulnerabilities | Weekly challenge 4 Quiz | 

Security researchers inserted malicious code into the web-applications of various organizations. This allowed them to obtain the personally identifiable information (PII) of various users across multiple databases.

What type of attack did the researchers perform?

  • Social engineering
  • Ransomware
  • Input sanitization
  • Injection

 

Leave a Comment