Red Teaming: Unveiling Weaknesses to Strengthen Security