Red Team

Microsoft 365 Under Siege: Why Your MFA Isn’t Stopping Session Token Theft

AiTM attacks completely bypass MFA by stealing authenticated session tokens. We demonstrate real-world M365 account takeover in 12 minutes and provide validated remediation strategies.

Beyond the Password: How Session Token Theft Bypasses MFA and What You Can Do About It

Session token theft via AiTM frameworks like Evilginx completely bypasses traditional MFA. We demonstrate real-world Okta account takeover and provide a comprehensive, validated remediation strategy.

2026 Threat Predictions: What CISOs Need to Know

The threat landscape is evolving faster than most organizations can adapt. Based on comprehensive research from leading cybersecurity firms and our own penetration testing...

The Most Dangerous Cloud Misconfigurations in 2025

After conducting penetration tests across hundreds of cloud environments in 2025, we've identified patterns. The same misconfigurations appear repeatedly, and they're often trivial to...

Bypassing Modern EDR Solutions: What Defenders Need to Know

Our red team recently demonstrated how sophisticated threat actors can evade endpoint detection. Here's what we learned and how to strengthen your defenses.

MITRE ATT&CK for Practitioners: How to Map Real Findings to a Common Threat Language

ATT&CK mapping transforms isolated pentest findings, vulnerability scan results, and incident timelines into a structured, measurable view of adversary behavior. This practical guide walks through a repeatable five-step methodology for mapping real findings to ATT&CK techniques.

Latest articles