Skip to content
HiveSecurity
  • Home
  • Blog
  • Tags
  • Vulnerabilities
  • Tools
  • Contact
  • About
Esc
Type to search...
  • Home
  • Blog
  • Tags
  • Vulnerabilities
  • Tools
  • Contact
  • About
← All tags Tag

Phishing

4 articles

Trust Me, I'm a Shortcut: How LNK Files Lie to Windows Explorer

Windows .lnk shortcut files can show one target while silently executing another. Discover five spoofing techniques including CVE-2025-9491, how attackers exploit them, and how to detect them.

27 March 2026
Red Team Blue Team Windows Security

AitM Phishing: How Attackers Bypass MFA and How to Stop Them

Adversary-in-the-Middle phishing silently proxies real login pages and steals session tokens — making MFA useless. Here's how it works and how to detect it.

26 March 2026
Phishing Red Team Blue Team

Entra ID Attacks in Practice: Device Code Phishing, PRT Theft, and Conditional Access Bypass

MFA is no longer enough to protect Microsoft Entra ID accounts. Attackers steal tokens, register their own devices, and bypass Conditional Access — without ever touching a password. Here's the full attack chain and how to detect it.

17 March 2026
Cloud Security Red Team Blue Team

Phishing Under the Microscope: Analyzing a Real Attack Email Step by Step

We tear apart a realistic phishing email using Security Decoder — headers, URLs, JWT tokens, and obfuscated JavaScript — and show exactly what each red flag means.

15 March 2026
Cybersecurity Phishing Blue Team
HiveSecurity

Offensive thinking. Defensive expertise.

  • Home
  • Blog
  • Tags
  • Vulnerabilities
  • Tools
  • Contact
  • About
  • RSS
  • Privacy

© 2026 Hive Security. All rights reserved.

Built with zero trust & least privilege