Skip Navigation
Get a Demo
 
 
 
 
 
 
 
 
 
Resources Videos
Security operations

Red Canary SecOps Weekly: Episode 61 – Supercharging Atomic Red Team with AI

SecOps Weekly | 04.21.26

Supercharging Atomic Red Team with AI

Atomic Red Team maintainer Hare Sudan describes how security operations (SecOps) teams can use the project to connect open-source defense tests to AI models for advanced detection and response exploration.

SHOW NOTES

In this episode of SecOps Weekly, Hare Sudan, Atomic Red Team community contributor, joins Red Canary’s Phil Hagen to demonstrate how AI can streamline cybersecurity testing workflows using Atomic Red Team and Model Context Protocol (MCP) servers.

Phil and Hare show how the new Atomic Red Team MCP server eliminates manual processes that previously took 40+ minutes, allowing users to automatically generate playbook YAML files from threat intelligence reports using natural language queries.

Hare explains how MCP servers work as flexible API interfaces that connect AI tools like Claude to various backend systems, enabling users to query over 1,600 atomic tests, execute them remotely, and validate results without manual context switching.

The demo showcases creating atomic tests from threat intelligence reports and highlights the tool’s ability to find existing tests or generate new ones based on MITRE ATT&CK TTPs. Both Phil and Hare emphasize the importance of proper authorization before executing tests in lab environments and demonstrates how this AI-powered approach transforms manual adversary emulation campaigns into streamlined, automated workflows.

Security gaps? We got you.

Sign up for our monthly email newsletter for expert insights on MDR, threat intel, and security ops—straight to your inbox.


 
 
Back to Top