{"id":252829,"date":"2025-05-26T21:19:13","date_gmt":"2025-05-26T19:19:13","guid":{"rendered":"https:\/\/cyberforces.com\/red-team-what-is-it-and-how-does-red-teaming-work"},"modified":"2025-05-26T21:23:26","modified_gmt":"2025-05-26T19:23:26","slug":"red-team-what-is-it-and-how-does-red-teaming-work","status":"publish","type":"post","link":"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work","title":{"rendered":"Red Team \u2013 what is it and how does Red teaming work?"},"content":{"rendered":"<h2>Red Team \u2013 what is it and how does Red teaming work?<\/h2>\n<p>Cybersecurity is a rapidly evolving field. With new technologies, constantly changing network architectures, and increasingly complex operating systems, cybercriminals are continuously adapting their tactics. This constant change calls for ongoing testing and analysis of vulnerabilities in applications, systems, and entire network infrastructures.<\/p>\n<h3>Table of contents<\/h3>\n<ul>\n<li>What is a Red Team?<\/li>\n<li>What does Red Teaming involve?<\/li>\n<li>What can be the target of a Red Team exercise?<\/li>\n<li>Benefits of Red Teaming<\/li>\n<li>When should you engage a Red Team?<\/li>\n<li>How often should Red Team testing be conducted?<\/li>\n<li>Summary<\/li>\n<\/ul>\n<h2>What is a Red Team?<\/h2>\n<p>According to the U.S. National Institute of Standards and Technology (NIST), a Red Team is a group of individuals authorized and organized to emulate potential threat actors. In simple terms, they simulate real-world cyberattacks on your systems\u2014targeting your networks, servers, and software as if they were actual attackers.<\/p>\n<p>The primary goal of Red Teaming is to improve an organization\u2019s overall cybersecurity posture by identifying and exploiting weaknesses in complex IT infrastructures before real attackers can.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-252823\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/red_teaming_info-1.png\" alt=\"\" width=\"602\" height=\"640\" \/><\/p>\n<p><em>Source: <\/em><a href=\"https:\/\/plextrac.com\/blog\/what-is-red-teaming\/\"><em>https:\/\/plextrac.com\/blog\/what-is-red-teaming\/<\/em><\/a><\/p>\n<h2>Red Teaming \u2013 what is it all about?<\/h2>\n<p>The definition of Red Teaming is simple. It\u2019s a form of ethical hacking performed by qualified specialists targeting systems, applications, or computer networks.<\/p>\n<p>Security experts who are part of a Red Team mimic the tactics, techniques, and procedures (TTPs) commonly used by cybercriminals to steal data from servers or gain unauthorized access to software.<\/p>\n<p>In practice, Red Teaming involves:<\/p>\n<ul>\n<li>Simulating common types of cyberattacks, such as phishing, social engineering, or attempts to extract access credentials;<\/li>\n<li>Testing human vulnerability through social engineering\u2014for example, by checking if employees reveal confidential information to third parties;<\/li>\n<li>Monitoring network traffic to uncover sensitive information about IT systems, such as user data;<\/li>\n<li>Bypassing authentication mechanisms\u2014specialists attempt to crack even strong passwords and two-factor authentication to identify possible flaws in the code.<\/li>\n<\/ul>\n<p>Another key activity is direct attacks on software APIs. These allow for testing how well developer interfaces are protected against unauthorized access.<\/p>\n<p>In Europe, the most important regulation in cybersecurity is the NIS2 Directive. It provides a unified legal framework for enforcing cybersecurity standards across 18 critical sectors.<\/p>\n<p>In practice, NIS2 mandates regular audits and continuous monitoring of cybersecurity practices in organizations. This means that testing must be conducted cyclically, not just once.<\/p>\n<h2>What can be targeted during Red Teaming exercises?<\/h2>\n<p>Red Teams may target the following during simulated attacks:<\/p>\n<ul>\n<li>AI-powered systems;<\/li>\n<li>Physical workstations, mobile devices, or even server hardware;<\/li>\n<li>Cryptographic systems;<\/li>\n<li>Firewalls;<\/li>\n<li>Web applications;<\/li>\n<li>SOAR systems (Security Orchestration, Automation, and Response).<\/li>\n<\/ul>\n<p>Red Teaming helps strengthen cybersecurity foundations in both public and private organizations. CART (Continuous Automated Red Teaming) enables ongoing assessments of current cybersecurity practices and defenses.<\/p>\n<p>Automating testing processes helps reduce operational costs of managing cybersecurity within organizations.<strong>\u00a0<\/strong><\/p>\n<h2>Benefits of Red Teaming<\/h2>\n<p>Simulated attacks executed as part of Red Teaming can significantly improve cybersecurity posture across banks, public institutions, and enterprises using advanced IT systems.<\/p>\n<p>Key benefits include:<\/p>\n<ul>\n<li>Comprehensive assessment of cybersecurity defenses \u2013 Realistic testing simplifies the implementation of security improvements and helps develop more effective defense strategies.<\/li>\n<li>Faster identification of vulnerabilities \u2013 Red Team tests can reveal technical issues, such as flaws in code structure.<\/li>\n<li>Improved incident response readiness \u2013 Red Team scenarios challenge Blue Teams responsible for defending against attacks.<\/li>\n<li>Development of realistic threat scenarios \u2013 Simulated threats help organizations create actionable response strategies that can effectively block future cyberattacks.<\/li>\n<\/ul>\n<p>Red Teaming can also be used to assess cybersecurity risks in SCADA systems (supervisory control and data acquisition) and PLC devices (programmable logic controllers).<\/p>\n<h3>Did you know?<\/h3>\n<p>According to the <em>Cybersecurity in Polish Companies 2024<\/em> report, up to 95% of respondents fear a cyberattack. Meanwhile, 91% admit to using corporate devices for personal tasks\u2014an alarming practice that weakens enterprise security.<\/p>\n<h2>When should you consider Red Teaming support?<\/h2>\n<p>Red Teaming is particularly useful when:<\/p>\n<ul>\n<li>Deploying new IT infrastructure or applications;<\/li>\n<li>Training staff on cybersecurity using real-life scenarios;<\/li>\n<li>Assessing your organization&#8217;s readiness to handle cyberattacks;<\/li>\n<li>Responding to a data breach and aiming to prevent recurrence.<\/li>\n<\/ul>\n<p>Testing is also recommended when threat landscapes in your industry evolve\u2014cybercriminals constantly adapt to emerging technologies.<\/p>\n<h2>How often should Red Teaming be performed?<\/h2>\n<p>Red Teaming is an effective way to evaluate your organization\u2019s preparedness for cyber threats. It involves simulating attacks to uncover security gaps and assess how well your team reacts to real-world scenarios.<\/p>\n<p>It not only helps detect vulnerabilities but also boosts employee awareness\u2014especially in organizations where staff use company hardware for personal needs.<\/p>\n<p>Ideally, Red Teaming should be conducted regularly\u2014once per quarter or at least twice a year.<br \/>\nThis ensures your organization remains one step ahead of attackers who are constantly refining their techniques.<\/p>\n<p>One last thing:<br \/>\nSecurity mechanisms that were effective six months ago may already be outdated today.<br \/>\nOne test is not enough. Cyber threats evolve fast, so your defensive strategies must evolve, too.<\/p>\n<h4><\/h4>\n<h4><strong><em>\u00a0<\/em>Sources:<\/strong><\/h4>\n<ol>\n<li><a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/red_team\">https:\/\/csrc.nist.gov\/glossary\/term\/red_team<\/a><\/li>\n<li><a href=\"https:\/\/www.cnss.gov\/CNSS\/issuances\/Instructions.cfm\">https:\/\/www.cnss.gov\/CNSS\/issuances\/Instructions.cfm<\/a><\/li>\n<li><a href=\"https:\/\/www.ibm.com\/think\/topics\/red-teaming\">https:\/\/www.ibm.com\/think\/topics\/red-teaming<\/a><\/li>\n<li><a href=\"https:\/\/assets.kpmg.com\/content\/dam\/kpmg\/pl\/pdf\/2024\/02\/pl-Raport-KPMG-w-Polsce-Barometr-cyberbezpiecze%C5%84stwa-2024.pdf\">https:\/\/assets.kpmg.com\/content\/dam\/kpmg\/pl\/pdf\/2024\/02\/pl-Raport-KPMG-w-Polsce-Barometr-cyberbezpiecze%C5%84stwa-2024.pdf<\/a><\/li>\n<li><a href=\"https:\/\/digital-strategy.ec.europa.eu\/pl\/policies\/nis2-directive\">https:\/\/digital-strategy.ec.europa.eu\/pl\/policies\/nis2-directive<\/a><\/li>\n<li><a href=\"https:\/\/vecto.pl\/raport-2024\">https:\/\/vecto.pl\/raport-2024<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Red Team \u2013 what is it and how does Red teaming work? Cybersecurity is a rapidly evolving field. With new technologies, constantly changing network architectures, and increasingly complex operating systems, cybercriminals are continuously adapting their tactics. This constant change calls for ongoing testing and analysis of vulnerabilities in applications, systems, and entire network infrastructures. Table [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":252830,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[29,37],"tags":[],"class_list":["post-252829","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-guide"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Red Team \u2013 what is it and how does Red teaming work? - CyberForces<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Red Team \u2013 what is it and how does Red teaming work? - CyberForces\" \/>\n<meta property=\"og:description\" content=\"Red Team \u2013 what is it and how does Red teaming work? Cybersecurity is a rapidly evolving field. With new technologies, constantly changing network architectures, and increasingly complex operating systems, cybercriminals are continuously adapting their tactics. This constant change calls for ongoing testing and analysis of vulnerabilities in applications, systems, and entire network infrastructures. Table [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work\" \/>\n<meta property=\"og:site_name\" content=\"CyberForces\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-26T19:19:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-26T19:23:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Red-Teaming-1200x675-en.webp?wsr\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Katarzyna W\u00f3jcik\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katarzyna W\u00f3jcik\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work\"},\"author\":{\"name\":\"Katarzyna W\u00f3jcik\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/04f12a97c23dfea254199f0a675e17a3\"},\"headline\":\"Red Team \u2013 what is it and how does Red teaming work?\",\"datePublished\":\"2025-05-26T19:19:13+00:00\",\"dateModified\":\"2025-05-26T19:23:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work\"},\"wordCount\":876,\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Red-Teaming-1200x675-en.webp?wsr\",\"articleSection\":[\"Security\",\"Guide\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work\",\"url\":\"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work\",\"name\":\"Red Team \u2013 what is it and how does Red teaming work? - CyberForces\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Red-Teaming-1200x675-en.webp?wsr\",\"datePublished\":\"2025-05-26T19:19:13+00:00\",\"dateModified\":\"2025-05-26T19:23:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work#primaryimage\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Red-Teaming-1200x675-en.webp?wsr\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Red-Teaming-1200x675-en.webp?wsr\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/cyberforces.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Red Team \u2013 what is it and how does Red teaming work?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberforces.com\/#website\",\"url\":\"https:\/\/cyberforces.com\/\",\"name\":\"CyberForces\",\"description\":\"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!\",\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberforces.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberforces.com\/#organization\",\"name\":\"TestArmy Group S. A.\",\"url\":\"https:\/\/cyberforces.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"width\":1210,\"height\":173,\"caption\":\"TestArmy Group S. A.\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\",\"https:\/\/www.linkedin.com\/company\/cyberforcescom\/\",\"https:\/\/www.instagram.com\/cyberforces__\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/04f12a97c23dfea254199f0a675e17a3\",\"name\":\"Katarzyna W\u00f3jcik\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d64e6c5549972df10f008ac8c21465bdf3a8a2f997790cf864f90bc468379f58?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d64e6c5549972df10f008ac8c21465bdf3a8a2f997790cf864f90bc468379f58?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d64e6c5549972df10f008ac8c21465bdf3a8a2f997790cf864f90bc468379f58?s=96&d=mm&r=g\",\"caption\":\"Katarzyna W\u00f3jcik\"},\"url\":\"https:\/\/cyberforces.com\/en\/author\/katarzyna-wojcik\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Red Team \u2013 what is it and how does Red teaming work? - CyberForces","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work","og_locale":"en_US","og_type":"article","og_title":"Red Team \u2013 what is it and how does Red teaming work? - CyberForces","og_description":"Red Team \u2013 what is it and how does Red teaming work? Cybersecurity is a rapidly evolving field. With new technologies, constantly changing network architectures, and increasingly complex operating systems, cybercriminals are continuously adapting their tactics. This constant change calls for ongoing testing and analysis of vulnerabilities in applications, systems, and entire network infrastructures. Table [&hellip;]","og_url":"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work","og_site_name":"CyberForces","article_publisher":"https:\/\/www.facebook.com\/TestArmyCyberForces\/","article_published_time":"2025-05-26T19:19:13+00:00","article_modified_time":"2025-05-26T19:23:26+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Red-Teaming-1200x675-en.webp?wsr","type":"image\/webp"}],"author":"Katarzyna W\u00f3jcik","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Katarzyna W\u00f3jcik","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work#article","isPartOf":{"@id":"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work"},"author":{"name":"Katarzyna W\u00f3jcik","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/04f12a97c23dfea254199f0a675e17a3"},"headline":"Red Team \u2013 what is it and how does Red teaming work?","datePublished":"2025-05-26T19:19:13+00:00","dateModified":"2025-05-26T19:23:26+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work"},"wordCount":876,"publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"image":{"@id":"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Red-Teaming-1200x675-en.webp?wsr","articleSection":["Security","Guide"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work","url":"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work","name":"Red Team \u2013 what is it and how does Red teaming work? - CyberForces","isPartOf":{"@id":"https:\/\/cyberforces.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work#primaryimage"},"image":{"@id":"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Red-Teaming-1200x675-en.webp?wsr","datePublished":"2025-05-26T19:19:13+00:00","dateModified":"2025-05-26T19:23:26+00:00","breadcrumb":{"@id":"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work#primaryimage","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Red-Teaming-1200x675-en.webp?wsr","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-Red-Teaming-1200x675-en.webp?wsr","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforces.com\/en\/red-team-what-is-it-and-how-does-red-teaming-work#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/cyberforces.com\/"},{"@type":"ListItem","position":2,"name":"Red Team \u2013 what is it and how does Red teaming work?"}]},{"@type":"WebSite","@id":"https:\/\/cyberforces.com\/#website","url":"https:\/\/cyberforces.com\/","name":"CyberForces","description":"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!","publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforces.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberforces.com\/#organization","name":"TestArmy Group S. A.","url":"https:\/\/cyberforces.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","width":1210,"height":173,"caption":"TestArmy Group S. A."},"image":{"@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TestArmyCyberForces\/","https:\/\/www.linkedin.com\/company\/cyberforcescom\/","https:\/\/www.instagram.com\/cyberforces__"]},{"@type":"Person","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/04f12a97c23dfea254199f0a675e17a3","name":"Katarzyna W\u00f3jcik","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d64e6c5549972df10f008ac8c21465bdf3a8a2f997790cf864f90bc468379f58?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d64e6c5549972df10f008ac8c21465bdf3a8a2f997790cf864f90bc468379f58?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d64e6c5549972df10f008ac8c21465bdf3a8a2f997790cf864f90bc468379f58?s=96&d=mm&r=g","caption":"Katarzyna W\u00f3jcik"},"url":"https:\/\/cyberforces.com\/en\/author\/katarzyna-wojcik"}]}},"_links":{"self":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/252829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/comments?post=252829"}],"version-history":[{"count":2,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/252829\/revisions"}],"predecessor-version":[{"id":252835,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/252829\/revisions\/252835"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media\/252830"}],"wp:attachment":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media?parent=252829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/categories?post=252829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/tags?post=252829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}