A company's IT department noticed suspicious activity indicating that an external party might have unauthorized access to the network resources. The IT staff observed unusual outbound traffic patterns, particularly large amounts of data being sent to unfamiliar IP addresses. Which type of network threat is most likely occurring in this scenario?
Data exfiltration
Phishing
ARP spoofing
Rogue AP