Assets, Threats, and Vulnerabilities | Weekly challenge 4 Quiz |
Security researchers inserted malicious code into the web-applications of various organizations. This allowed them to obtain the personally identifiable information (PII) of various users across multiple databases.
What type of attack did the researchers perform?
- Social engineering
- Ransomware
- Input sanitization
- Injection