Which of the following should be monitored by threat intelligence researchers who search for leaked
credentials?
A. Common Weakness Enumeration
B. OSINT
C. Dark web
D. Vulnerability databases
credentials?
A. Common Weakness Enumeration
B. OSINT
C. Dark web
D. Vulnerability databases