Publication Date – January 15, 2020
Potentially Exploited events are discovered with sinkholing technology.
- The hosts are identified in the course of looking for other events.
- An indicator that a system is either infected or misconfigured is when devices are acting suspiciously.