ethical-hacker video for a security team is reviewing an incident where an APT was detected. What should be their first step in the analysis?
A security team is reviewing an incident where an APT was detected. What should be their first step in the analysis?