Glitch effect

Live Hacking into Microsoft 365 with former NSA operative and Huntress CEO, Kyle Hanslovan

Watch how hackers steal credentials, bypass Microsoft 365 MFA, and completely wreck enterprise systems in under 10 minutes.


The game has changed. In 2020, cybercriminals used macro-ridden Word documents to record your keystrokes and lurk through your webcam. In 2025, AI and credential marketplaces have made it even easier for hackers to break in and wreck your business operations. 

Join Huntress CEO Kyle Hanslovan for a live hacking demonstration, where he’ll walk through the most commonly exploited tactics that your team should be ready to face in 2026, like:

  • Target employees with social engineering tactics

  • Quickly steal credentials from Chrome/Edge browsers

  • Bypass Microsoft 365’s MFA functionality

  • Wreak havoc while rapidly compromising interconnected systems

Come get shady with us, learn a thing or two about defenses that shut down these demonstrated tactics, and walk away better prepared to challenge modern tradecraft.

Supported by:

Material Security

Glitch effectGlitch effect
Watch the Webinar
By submitting this form, you accept our Terms of Service & Privacy Policy
Oops! Something went wrong while submitting the form.
Kyle Hanslovan
CEO & Cofounder
LinkedIn icon

[PH] Learn More About Phishing

[PH] Huntress delivers everything you want from a security tool, all designed with the unique needs of outsourced IT and security teams in mind.
[PH] Phishing attempts can show up as messages from your bank, your boss, your utility providers, or even the government. One click from one user can compromise an entire network and inadvertently let hackers deploy ransomware, steal information, or worse.
[PH] The median time it takes for a user to click a link and enter information is less than 60 seconds. With a turnaround time that quick, it's no wonder phishing is one of the preferred methods used by hackers. (2024 Verizon Data Breach Report)
Glitch effectGlitch effectBlurry glitch effect