{"id":4158,"date":"2025-10-15T09:22:23","date_gmt":"2025-10-15T07:22:23","guid":{"rendered":"https:\/\/enthec.com\/?p=4158"},"modified":"2025-10-15T09:22:23","modified_gmt":"2025-10-15T07:22:23","slug":"red-team-in-cybersecurity-how-it-works","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/","title":{"rendered":"Red team in cybersecurity: how it works"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The term <\/span><b>red team<\/b> <span style=\"font-weight: 400;\">is sparking interest in the world of computer security: what exactly does it mean, how does it work, and why is it useful? In this article, we&#8217;ll clearly and comprehensively explain what it is, its advantages, its limitations, and how it fits into a modern defense strategy like the one we offer at Enthec with our Kartos solution.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Before diving in, it&#8217;s a good idea to learn a little about Kartos: it&#8217;s a cyber surveillance solution designed for businesses that seeks to offer Continuous Threat Exposure Management (CTEM). In other words, Kartos helps you permanently identify weak points in your infrastructure, prioritize the most dangerous ones, and ensure that vulnerabilities don&#8217;t reappear. <\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What is a red team?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A red team is a specialized team that simulates the role of a real attacker to test an organization&#8217;s security. Rather than just performing spot tests, their approach seeks to replicate advanced techniques, combining technical, human, and sometimes physical methods to determine  <\/span><b>if an adversary could compromise critical assets without being detected<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the cybersecurity sector, \u201cred teaming\u201d means turning those simulations into<\/span> <b>intentional and structured exercises,<\/b> <span style=\"font-weight: 400;\">with defined objectives, clear rules, and mechanisms to learn from the results.<\/span><\/p>\n<p>Unlike a routine vulnerability audit or scan, a red team seeks to emulate how a real attacker, with the resources, skills, and patience, would attempt to infiltrate, hide, move laterally, and achieve a goal (e.g., exfiltrate data).<\/p>\n<p><span style=\"font-weight: 400;\">A red team executes an adversary emulation exercise on a network, system, or IT environment to identify critical flaws and gaps that are difficult to detect using other methods.<\/span><\/p>\n<h3><b>Red teaming vs. penetration testing (pentesting)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">It is common to confuse red team with<\/span> <span style=\"font-weight: 400;\"><a href=\"https:\/\/enthec.com\/en\/main-advantages-and-disadvantages-of-pentesting-in-a-company\/\">pentesting<\/a>,<\/span> <span style=\"font-weight: 400;\">but there are key differences:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pentesting is usually more limited in time or scope, <\/span><b>focusing on finding specific known vulnerabilities<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\">The red team, on the other hand, is more free and prolonged, <strong>aimed at seeing if an attacker can achieve a fundamental objective, <\/strong>not just list faults.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Red teaming also assesses the detection and response capabilities of internal teams, not just the presence of vulnerabilities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The red team often operates without warning or with minimal visibility to simulate real-life conditions.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">A red team exercise can last weeks, involve multiple vectors (email, remote access, phishing, deception, social engineering), and conclude with a report detailing the progress made, the detections, and the defensive flaws that need to be addressed.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-4153 aligncenter\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/10\/red-team-ciberseguridad.jpg\" alt=\" red team in cybersecurity\" width=\"650\" height=\"595\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/10\/red-team-ciberseguridad.jpg 650w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/10\/red-team-ciberseguridad-300x275.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/10\/red-team-ciberseguridad-350x320.jpg 350w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><b>How a red team works: typical stages<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To better understand this, I&#8217;ll break down the typical phases of a red team exercise:<\/span><\/p>\n<h3><b>1. Definition of objectives and scope<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Before attacking, the intended targets are agreed upon (e.g., accessing sensitive data, gaining administrator access, leaking information), and systems are evaluated as either within or outside the perimeter (what is excluded). Rules of engagement are also established to prevent unwanted damage. <\/span><\/p>\n<h3><b>2. Reconnaissance\/intelligence<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The team gathers public, internal, or compromised information about the organization: domains, employees, networks, exposed services&#8230; This allows for the construction of realistic attack scenarios. <\/span><\/p>\n<h3><b>3. Initial exploitation\/entry point<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Here, the red team uses <a href=\"https:\/\/enthec.com\/en\/real-time-vulnerability-management-a-step-forward-in-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">vulnerabilities<\/a>, <a href=\"https:\/\/enthec.com\/en\/phishing-what-is-it-and-how-many-types-are-there\/\" target=\"_blank\" rel=\"noopener\">phishing<\/a>, weak credentials, or <a href=\"https:\/\/enthec.com\/en\/social-engineering-attacks-on-senior-executives\/\" target=\"_blank\" rel=\"noopener\">social engineering<\/a> to gain a foothold within the target network. This involves gaining initial access without being detected. <\/span><\/p>\n<h3><b>4. Persistent access and lateral movement<\/b><\/h3>\n<p>Once inside, the simulated attacker escalates privileges, moves laterally, explores the network, searches for other vulnerable systems, and moves toward the defined target.<\/p>\n<h3><b>5. Goal achievement \/ final scenario<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The red team, if successful, carries out the planned scenario: data extraction, maintaining a hidden presence, etc.<\/span><\/p>\n<h3><b>6. Report and recommendations<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The team delivers a report with findings, attack routes used, points where attacks were stopped or detected, and recommendations for correcting weaknesses.<\/span><\/p>\n<h3><b>7. Correction and validation phase<\/b><\/h3>\n<p>Recommendations are reviewed, issues are corrected or mitigated, and in some cases, a subsequent verification (light re-red teaming) is performed to confirm that the improvements have been practical.<\/p>\n<p><span style=\"font-weight: 400;\">These stages allow us to understand not only where there are vulnerabilities, but also<\/span><b> how an intelligent attacker would exploit them in a real-life environment.<\/b><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Advantages of the red team within a CTEM strategy<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Incorporating red teaming as part of a CTEM strategy brings benefits that go beyond simple fault finding:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Dynamic visibility:<\/b> <span style=\"font-weight: 400;\">With red teaming, you discover how holes interact with each other and how they might combine to form critical attack paths.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\"><strong>Realistic prioritization:<\/strong> It is not enough to fix all the bugs; you have to know which ones can actually be exploited.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Continuous evaluation of defenses:<\/b> H<span style=\"font-weight: 400;\">elps test detection, alerts, and response capabilities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\"><strong>Culture of constant improvement:<\/strong> Encourages security and operations teams to advance and evolve.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">When integrated with a platform like<\/span> <b>Kartos,<\/b> red teaming becomes part of the CTEM cycle, as it is not a one-off exercise but rather an ongoing process of monitoring exposure to threats.<\/p>\n<p><span style=\"font-weight: 400;\">Furthermore, by being part of a CTEM framework, the red team&#8217;s results are automatically fed back: new findings are integrated into the platform, prioritized based on their impact and risk, and periodic measurements are taken to verify that exposure is being reduced. This is the core of the<\/span> <strong>Continuous Threat Exposure Management approach.<\/strong><\/p>\n<h2><b>Limits and risks of the red team<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Although the red team is very valuable, it&#8217;s not a perfect or magic solution. It&#8217;s essential to understand its limitations: <\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Cost and time:<\/strong> these exercises often require specialized human resources and extended deadlines. Not all organizations have the budget for frequent red teaming. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Partial coverage:<\/b> <span style=\"font-weight: 400;\">An exercise cannot attack all possible systems, environments, or vectors, so there are \u201cblind spots\u201d in areas.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\"><strong>Risk of interruptions:<\/strong> If not well planned, the simulated attack could cause failures or overloads in production systems.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Limited in time: <\/strong>The threat landscape is changing; what works today may not work tomorrow. That&#8217;s why red teaming, as a stand-alone exercise, is no substitute for ongoing vigilance. <\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">For all these reasons, a good approach is to use red teaming in combination with other forms of assessment (continuous analysis, automated scans, more frequent simulations) within a CTEM framework.<\/span><\/p>\n<h2><b>How Kartos fits into this equation<br \/><\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Here is Enthec with its Kartos tool, a CTEM platform that allows:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Integrate the red team&#8217;s results into the ongoing exposure vision.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prioritize detected risks based on impact, probability, and complete attack paths.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Monitor whether the proposed fixes have actually been applied or whether errors reappear.<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Automate alerts, reports, and follow-up tasks to maintain a secure posture over time.<\/li>\n<\/ul>\n<h2><b>Good practices for successfully using Red Team<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">For a red team exercise to truly deliver value, it&#8217;s recommended to follow these practices:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Define clear, realistic, and business-aligned objectives<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Establish strict rules of engagement<\/b> <span style=\"font-weight: 400;\">(what can be touched, what can&#8217;t, what levels of risk do you accept).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Maintain secrecy or controlled visibility<\/b> <span style=\"font-weight: 400;\">(depending on the purpose).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Involve the internal response team,<\/b> <span style=\"font-weight: 400;\">at least in the reporting and correction phase.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\"><strong>Incorporate lessons learned into the CTEM cycle<\/strong> so that they are not isolated.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Repeat with partial frequency<\/b> <span style=\"font-weight: 400;\">(for example, with minor exercises) to prevent the organization from settling.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Measure its effectiveness<\/b> <span style=\"font-weight: 400;\">with detection times, percentage of compromises detected, improvements after corrections, etc.<\/span><\/li>\n<\/ol>\n<p>With these practices, red teaming ceases to be an isolated event and becomes a powerful lever for ongoing improvement and strengthening.<\/p>\n<p><span style=\"font-weight: 400;\">Red teaming is an advanced and powerful technique for simulating real attacks, assessing an organization&#8217;s defenses, and discovering attack paths that other methods would miss. Red teaming within a CTEM framework, for example, by integrating it with the solution Kartos by  <\/span><a href=\"https:\/\/enthec.com\/en\/\"><br \/>\n  <span style=\"font-weight: 400;\">Enthec, <\/span><br \/>\n<\/a><span style=\"font-weight: 400;\">multiplies its value: it is not a one-off exercise, but<\/span> <b>part of a continuous mechanism for evaluating and improving the security posture.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If your company is already using monitoring or scanning tools, adding red teaming (in a well-balanced way) can significantly increase the level of security. Ideally, these results shouldn&#8217;t be isolated but rather<\/span> <strong>integrated into a CTEM strategy to ensure improvements are maintained over time.<\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The term red team is sparking interest in the world of computer security: what exactly does it mean, how does [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":4156,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[78,24,32,38],"class_list":["post-4158","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-prevention","tag-cybersecurity","tag-kartos-en","tag-organizations"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u25b7 Red team in cybersecurity | Enthec<\/title>\n<meta name=\"description\" content=\"A red team shows you how a real attacker sees you \u27a1\ufe0f Enthec helps you turn those findings into a permanent improvement in your security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u25b7 Red team in cybersecurity | Enthec\" \/>\n<meta property=\"og:description\" content=\"A red team shows you how a real attacker sees you \u27a1\ufe0f Enthec helps you turn those findings into a permanent improvement in your security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-15T07:22:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/10\/red-team-como-funciona-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1631\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"Red team in cybersecurity: how it works\",\"datePublished\":\"2025-10-15T07:22:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/\"},\"wordCount\":1314,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/10\/red-team-como-funciona-scaled.jpg\",\"keywords\":[\"Prevention\",\"Cybersecurity\",\"Kartos\",\"Organizations\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/\",\"url\":\"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/\",\"name\":\"\u25b7 Red team in cybersecurity | Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/10\/red-team-como-funciona-scaled.jpg\",\"datePublished\":\"2025-10-15T07:22:23+00:00\",\"description\":\"A red team shows you how a real attacker sees you \u27a1\ufe0f Enthec helps you turn those findings into a permanent improvement in your security\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/10\/red-team-como-funciona-scaled.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/10\/red-team-como-funciona-scaled.jpg\",\"width\":2560,\"height\":1631,\"caption\":\"red team c\u00f3mo funciona\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Red team in cybersecurity: how it works\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u25b7 Red team in cybersecurity | Enthec","description":"A red team shows you how a real attacker sees you \u27a1\ufe0f Enthec helps you turn those findings into a permanent improvement in your security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/","og_locale":"en_US","og_type":"article","og_title":"\u25b7 Red team in cybersecurity | Enthec","og_description":"A red team shows you how a real attacker sees you \u27a1\ufe0f Enthec helps you turn those findings into a permanent improvement in your security","og_url":"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2025-10-15T07:22:23+00:00","og_image":[{"width":2560,"height":1631,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/10\/red-team-como-funciona-scaled.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"Red team in cybersecurity: how it works","datePublished":"2025-10-15T07:22:23+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/"},"wordCount":1314,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/10\/red-team-como-funciona-scaled.jpg","keywords":["Prevention","Cybersecurity","Kartos","Organizations"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/","url":"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/","name":"\u25b7 Red team in cybersecurity | Enthec","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/10\/red-team-como-funciona-scaled.jpg","datePublished":"2025-10-15T07:22:23+00:00","description":"A red team shows you how a real attacker sees you \u27a1\ufe0f Enthec helps you turn those findings into a permanent improvement in your security","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/10\/red-team-como-funciona-scaled.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/10\/red-team-como-funciona-scaled.jpg","width":2560,"height":1631,"caption":"red team c\u00f3mo funciona"},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/red-team-in-cybersecurity-how-it-works\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Red team in cybersecurity: how it works"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/4158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=4158"}],"version-history":[{"count":0,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/4158\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/4156"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=4158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=4158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=4158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}