{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreibiz5yifa2vbsdh7xdja2r6ucvu2o66tgmpjppxtagp2rqjucjlqa",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mllh3rdpt4o2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreicu25na7aao4jt67uwb373p67orcah2ml5ys35qz6eikc4vbmzh6m"
    },
    "mimeType": "image/jpeg",
    "size": 362836
  },
  "path": "/2026/05/your-purple-team-isnt-purple-its-just.html",
  "publishedAt": "2026-05-11T11:30:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "Defending a network at 2 am looks a lot like this: an analyst copy-pasting a hash from a PDF into a SIEM query. A red team script is being rewritten by hand so the blue team can use it. A patch waiting on a change-approval window that's longer than the exploitation window itself.\nNobody in that chain is incompetent. Every human is doing their job correctly. The problem is the system, its",
  "title": "Your Purple Team Isn't Purple — It's Just Red and Blue in the Same Room"
}