Catching Red ≠ Defensible Security
“We found the red team” can feel good—but it’s not the mission. If detection logic only trips on your red team’s constraints, you didn’t harden the org; you optimized for the test.
Anti-patterns: blocking all traffic to a budget cloud provider because red’s C2 is there; alerting on a specific commercial C2 brand string because that’s what red can afford. These don’t translate to real-world adversaries and they waste everyone’s time.