red team
![Realm](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/06152013/realm-1500-400x200.webp)
Realm: Open-source adversary emulation framework
Realm is an open-source adversary emulation framework emphasizing scalability, reliability, and automation. It’s designed to handle engagements of any size. “Realm …
![cyber threat](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25143238/cyber-threat1-400x200.jpg)
Red teaming: The key ingredient for responsible AI
Developing responsible AI isn’t a straightforward proposition. On one side, organizations are striving to stay at the forefront of technological advancement. On the other …
![LSA Whisperer](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/18154559/lsa-whisperer-1500-400x200.webp)
LSA Whisperer: Open-source tools for interacting with authentication packages
LSA Whisperer consists of open-source tools designed to interact with authentication packages through their unique messaging protocols. Support is currently provided for the …
![free red teaming resources](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/14184223/free_red_teaming-1500-400x200.webp)
5 free red teaming resources to get you started
Red teaming is evaluating the effectiveness of your cybersecurity by eliminating defender bias and adopting an adversarial perspective within your organization. Tactics may …
![security](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/27150233/security-1600-400x200.webp)
How to design and deliver an effective cybersecurity exercise
Armed forces have always utilized war-gaming exercises for battlefield training to prepare for times of conflict. With today’s digital transformation, the same concept is …
![red teaming](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093618/red_teaming-400x200.jpg)
Red teaming in the AI era
As AI gets baked into enterprise tech stacks, AI applications are becoming prime targets for cyber attacks. In response, many cybersecurity teams are adapting existing …
![PyRIT](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25142811/pyrit-2-1400-400x200.jpg)
PyRIT: Open-source framework to find risks in generative AI systems
Python Risk Identification Tool (PyRIT) is Microsoft’s open-source automation framework that enables security professionals and machine learning engineers to find risks …
![risk management](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/11093921/riskmanagement-1400-2-400x200.jpg)
How purple teaming enhances inter-team collaboration and effectiveness in cybersecurity
In this Help Net Security video, Andrew Costis, Chapter Lead of the Adversary Research Team at AttackIQ, discusses how purple teaming allows security teams to break down …
![Jamieson O'Reilly](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16114229/jamieson-oreilly-2-dvuln-400x200.jpg)
Enhancing adversary simulations: Learn the business to attack the business
In this Help Net Security interview, Jamieson O’Reilly, Founder of DVULN, discusses adversary simulations, shedding light on challenges rooted in human behavior, …
![target](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/25133916/target1-400x200.jpg)
Purple teaming and the role of threat categorization
Organizations constantly work to ensure optimal threat detection and prevention across their systems. One question gets asked repeatedly: “Can we detect the threats we’re …
![Alexander Hagenah](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/04140117/alexander_hagenah-2-six_group-400x200.jpg)
Embracing offensive cybersecurity tactics for defense against dynamic threats
In this Help Net Security, Alexander Hagenah, Head of Cyber Controls at SIX, discusses the critical steps in creating effective offensive security operations and their impact …
![Adam Pennington](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/11112133/adam_pennington-2-mitre-400x200.jpg)
MITRE ATT&CK project leader on why the framework remains vital for cybersecurity pros
MITRE ATT&CK, a common language for cybersecurity professionals to communicate with each other and better understand real-world adversary behaviors, celebrates its 10th …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege