Scenario 1: An internal host starts downloading large files from an external IP address. Further investigation reveals that the files are malware updates downloaded from a command and control server to enhance the malware's capabilities.
Scenario 2: A sudden spike in outbound HTTPS traffic is detected from a server that is normally inactive. Analysis shows that the traffic involves downloading encrypted payloads, indicating an update to an existing malware strain.