By Jamal Uddin Shaikh, Cybersecurity Architect and Technology Lead , Appxone
Early in the morning, I was pulled up by the leader to analyze the FireEye incident. The entire security circle in the Moments of Friends was also boiling, but as the analysis deepened, it was found that it was a little “big-skilled”. There were no sophisticated tools and technical solutions that I wanted. They were all Red team simulation tools with known attack techniques used by Threat Actor. But from the perspective of a member of the Red team, a lot has been gained.