CyberPatron © (@cyberpatronmc) 's Twitter Profile
CyberPatron ©

@cyberpatronmc

Welcome to CyberPatron. Your #1 cybersecurity community X account and aside being the best, we want you to be the best. For our services, DM @cyberpatronsrvc

ID: 1110864159904800768

linkhttp://www.thecyberpatron.com calendar_today27-03-2019 11:20:29

4,4K Tweet

36,36K Followers

19 Following

CyberPatron © (@cyberpatronmc) 's Twitter Profile Photo

A type of forensic evidence that can be used to detect unauthorized access attempts or other malicious activities is called: a. CVE b. IoC c. AIS d. OSINT