Media Summary: A brief rundown of the possible rekindling of you know that moment where you step away from your computer for five minutes, come back, and windows has just restarted itself, ... In this video we'll be exploring how to attack, detect and defend against COM

Microsoft Com Hijacking - Detailed Analysis & Overview

A brief rundown of the possible rekindling of you know that moment where you step away from your computer for five minutes, come back, and windows has just restarted itself, ... In this video we'll be exploring how to attack, detect and defend against COM Get phishing into your next red team assessment or penetration test, and make it a breeze with Evilginx! Security researchers highlight a significant vulnerability in Disassemble, decompile and debug with IDA Pro! Use promo code HAMMOND50 for 50% off any IDA Pro ...

Phishing attacks are evolving, and even multi-factor authentication (MFA) is no longer foolproof. In this detailed demo, we ... Black Friday Sale! Get 20% off Altered Security training for Active Directory & Entra ID penetration ... Over 2.3 million users exposed through Google and Edge extensions. If you find this video interesting, ... Contact me on telegram if you need this page Telegram Channel . This video is a quick demonstration of COM In this video I discuss "dependency confusion" which was used to hack multiple private systems owned by Apple, Tesla,

In this video I talk about a recent attack called Reprompt that can be used to steal sensitive user data via More and more users and organisations are vulnerable as fraudsters accelerate their efforts to exploit vulnerabilities within ... Browser Hijackers are a nasty infection that ruins your browsing experience completely. In this video, you will know how to remove ... Google patches 79 Chrome vulnerabilities, new Windows zero-days called YellowKey and GreenPlasma are discovered, and ... Is your "Cloud-Only" Admin truly isolated? In this lab (EID-EXP-018), we demonstrate how a single misconfiguration in

Photo Gallery

Microsoft COM Hijacking
you don't own your windows pc.
COM Hijacking (Persistence)
I Stole a Microsoft 365 Account. Here's How.
Microsoft Store Outlook add-in hijacked
How hackers are breaking into MFA enabled Microsoft 365 accounts
Safeguard Your Microsoft 365 Tokens From Sneaky Thieves!
Hacking Endpoint to Identity (Microsoft 365): "ConsentFix"
Evilginx Attack Demo: How Hackers Bypass Microsoft MFA
How Hackers Persist & Privesc in Microsoft 365
Google Chrome and Microsoft Edge MASSIVE hijack #shorts
Hijacking Legitimate Microsoft Comms
View Detailed Profile
Microsoft COM Hijacking

Microsoft COM Hijacking

A brief rundown of the possible rekindling of

you don't own your windows pc.

you don't own your windows pc.

you know that moment where you step away from your computer for five minutes, come back, and windows has just restarted itself, ...

COM Hijacking (Persistence)

COM Hijacking (Persistence)

In this video we'll be exploring how to attack, detect and defend against COM

I Stole a Microsoft 365 Account. Here's How.

I Stole a Microsoft 365 Account. Here's How.

https://jh.live/evilginx || Get phishing into your next red team assessment or penetration test, and make it a breeze with Evilginx!

Microsoft Store Outlook add-in hijacked

Microsoft Store Outlook add-in hijacked

Security researchers highlight a significant vulnerability in

How hackers are breaking into MFA enabled Microsoft 365 accounts

How hackers are breaking into MFA enabled Microsoft 365 accounts

Visit our website for more information: https://gcit.com.au/how-hackers-are-breaking-into-mfa-enabled-

Safeguard Your Microsoft 365 Tokens From Sneaky Thieves!

Safeguard Your Microsoft 365 Tokens From Sneaky Thieves!

Learn how to protect your

Hacking Endpoint to Identity (Microsoft 365): "ConsentFix"

Hacking Endpoint to Identity (Microsoft 365): "ConsentFix"

https://jh.live/hex-rays || Disassemble, decompile and debug with IDA Pro! Use promo code HAMMOND50 for 50% off any IDA Pro ...

Evilginx Attack Demo: How Hackers Bypass Microsoft MFA

Evilginx Attack Demo: How Hackers Bypass Microsoft MFA

Phishing attacks are evolving, and even multi-factor authentication (MFA) is no longer foolproof. In this detailed demo, we ...

How Hackers Persist & Privesc in Microsoft 365

How Hackers Persist & Privesc in Microsoft 365

https://jh.live/alteredsecurity || Black Friday Sale! Get 20% off Altered Security training for Active Directory & Entra ID penetration ...

Google Chrome and Microsoft Edge MASSIVE hijack #shorts

Google Chrome and Microsoft Edge MASSIVE hijack #shorts

Over 2.3 million users exposed through Google and Edge extensions. #funfacts #fyp #cybernews If you find this video interesting, ...

Hijacking Legitimate Microsoft Comms

Hijacking Legitimate Microsoft Comms

Full details on the blog: https://blog.knowbe4.com/surge-in-phishing-attacks-

Office365 Cookie Hijacking Attack – What You Need to Know

Office365 Cookie Hijacking Attack – What You Need to Know

Contact me on telegram if you need this page Telegram @evilpool Channel @evilf0rum.

Windows Context Menu (Right Click) COM Hijacking for Persistence

Windows Context Menu (Right Click) COM Hijacking for Persistence

This video is a quick demonstration of COM

Apple, Microsoft and Others Software Gets Hacked Through Dependency Hijacking

Apple, Microsoft and Others Software Gets Hacked Through Dependency Hijacking

In this video I discuss "dependency confusion" which was used to hack multiple private systems owned by Apple, Tesla,

Hijacking Microsoft Copilot via Reprompt Attack

Hijacking Microsoft Copilot via Reprompt Attack

In this video I talk about a recent attack called Reprompt that can be used to steal sensitive user data via

Microsoft 365 Advanced Security Audit - protect against Phishing, Ransomware, Conversation Hijacking

Microsoft 365 Advanced Security Audit - protect against Phishing, Ransomware, Conversation Hijacking

More and more users and organisations are vulnerable as fraudsters accelerate their efforts to exploit vulnerabilities within ...

How to Remove Browser Hijacker in 3 Simple Steps?

How to Remove Browser Hijacker in 3 Simple Steps?

Browser Hijackers are a nasty infection that ruins your browsing experience completely. In this video, you will know how to remove ...

Google Chrome 79 Flaws, Windows Zero-Days & Microsoft Teams Hijacking | Hacking News

Google Chrome 79 Flaws, Windows Zero-Days & Microsoft Teams Hijacking | Hacking News

Google patches 79 Chrome vulnerabilities, new Windows zero-days called YellowKey and GreenPlasma are discovered, and ...

I Hijacked a Global Admin: Entra ID "Hard-Match" Exploit

I Hijacked a Global Admin: Entra ID "Hard-Match" Exploit

Is your "Cloud-Only" Admin truly isolated? In this lab (EID-EXP-018), we demonstrate how a single misconfiguration in