WELCOME
 

Welcome to this month's edition of the Atomic Newsletter, a monthly email with updates and news about Atomic Red Team™ and its related projects such as MITRE ATT&CK®Invoke-AtomicRedTeamAtomicTestHarnesses, and more. Check out the archive for previous editions, visit our website, and chat with us on Slack

 
 
THE LATEST FROM ATOMIC RED TEAM
 
 

Test, detect, respond. Repeat

Just getting started with Atomic Red Team or need a refresher? In this recent episode of Office Hours, Red Canary's CSO Keith McCammon and CISO Dave Farrow do a deep dive on the project, how you should use it, as well as tips on how you can better operationalize your testing.

ATOMIC IN THE WILD
 
 
A better way to visualize your ART tests
 

John Grageda explains how VECTR, a tool that facilitates tracking of your red and blue team testing activities, can be used to build campaigns around MITRE ATT&CK techniques and Atomic Red Team tests for purple team engagements.

Running tests on a target machine using ART
 

Cybersecurity student Jivan Karthec shares how he used Atomic Red Team to run adversary emulation (Invoke-AtomicTest T1136.001) on a secure enterprise environment—complete with log monitoring, endpoint detection, domain management, and security testing—he built for a school project.

Top contributors
 
First-time contributors 
 
UPCOMING WEBINAR
 
 
The Detection Series: Initial Access
 

Testing your defenses against initial access tradecraft is critical. Join this upcoming Red Canary webinar as we explore all things related to the MITRE ATT&CK® tactic Initial Access, including the latest adversary techniques and capabilities.



Atomic Red Team Logo.png
 
 
 
  Twitter   LinkedIn   GitHub   YouTube   Slack