Go back

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

Partners
November 4, 2025
3m read
3m read
3m listen
3m watch
3m watch
Live Hacking: Exposing the Reality of Microsoft 365 BreachesLive Hacking: Exposing the Reality of Microsoft 365 Breaches
speakers
speakers
speakers
authors
Rajan Kapoor, VP, Security
participants
No items found.
share

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

The evolution of the threats we face today continues at breakneck speed–and our defense strategies need to keep pace. Today’s attackers have credential marketplaces, advanced social engineering, and AI-powered velocity behind them, making your Microsoft 365 security feel uncomfortably porous.

The attacks we see in the real world are faster, more coordinated, and rely on abusing built-in features, integrations, and common misconfigurations to get past your defenses. 

See it in action

Material is proud to partner with Huntress to bring a live, technical demonstration that cuts through the noise and shows you exactly what you’re up against. Huntress CEO and former NSA operative Kyle Hanslovan will walk through a complete, modern compromise of a Microsoft 365 environment, demonstrating the TTPs that are actively used in the wild.

This isn’t a theoretical exercise: it’s a pragmatic look at modern attacks.

  • Social Engineering and Credential Theft: How a motivated attacker leverages social tactics to quickly steal credentials from browsers.
  • MFA Bypass: The real-world techniques attackers use to circumvent Microsoft 365’s MFA policies and gain persistent access.
  • Rapid Lateral Movement: What happens next—the speed at which an attacker can leverage a single compromised identity to rapidly compromise interconnected cloud office systems and wreak havoc.

Why this demonstration matters

The native security tools in Microsoft 365 are powerful, but often lack the visibility and automated responses necessary to stop an attacker after they’ve bypassed the initial login. That doesn’t mean all hope is lost–as part of the demo, Kyle will showcase modern defense strategies that can stop attackers before they can wreak havoc. You’ll leave this demo better prepared to tangle with the threats we face today.

But you don’t want to read a marketing blurb about it: come check out a live demonstration of what’s being exploited, and see a defense strategy built to evolve with the threats we all face. 

Register for the webinar to see the full attack, the immediate response–and get free access to Huntress’s Identity Security Assessment for your Microsoft 365 environments.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

Rajan Kapoor, VP, Security
3
m read
Read post
Podcast

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m listen
Listen to episode
Video

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m watch
Watch video
Downloads

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m listen
Watch video
Webinar

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m listen
Listen episode
blog post

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

Nate Abbott
5
m read
Read post
Podcast

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

5
m listen
Listen to episode
Video

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

5
m watch
Watch video
Downloads

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

5
m listen
Watch video
Webinar

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

5
m listen
Listen episode
blog post

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

Abhishek Agrawal
3
m read
Read post
Podcast

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

3
m listen
Listen to episode
Video

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

3
m watch
Watch video
Downloads

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

3
m listen
Watch video
Webinar

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

3
m listen
Listen episode
blog post

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

Nate Abbott
4
m read
Read post
Podcast

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

4
m listen
Listen to episode
Video

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

4
m watch
Watch video
Downloads

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

4
m listen
Watch video
Webinar

Solidifying Security Culture Empowers Your First Line of Defense

A strong security culture is easy to talk about but hard to achieve. Making sure your tech stack and your processes support your people is a critical first step.

4
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.