Comments
-
I have questions. Can I say if the followings may also be the cause of the signature-driven intrusion? All of them create the outgoing connection. The suspect attached file in email, e.g., those execution file. The suspect web site's link, e.g., running code. The suspect file stored in file server.
-
Thank you very much.