Red Teaming in Cybersecurity: A Comprehensive Overview