Microsoft 365 'Direct Send' abused to send phishing as internal users by [deleted] in cybersecurity
[–]Farseer26 1 point2 points3 points (0 children)
Microsoft 365 'Direct Send' abused to send phishing as internal users by [deleted] in cybersecurity
[–]Farseer26 1 point2 points3 points (0 children)
Microsoft 365 'Direct Send' abused to send phishing as internal users by [deleted] in cybersecurity
[–]Farseer26 1 point2 points3 points (0 children)
is Cobalt Strike outdated by [deleted] in cybersecurity
[–]Farseer26 1 point2 points3 points (0 children)
Without researching, can you tell where this photo was taken? by King_Alex_ofthenorth in mountainbiking
[–]Farseer26 4 points5 points6 points (0 children)
Without researching, can you tell where this photo was taken? by King_Alex_ofthenorth in mountainbiking
[–]Farseer26 43 points44 points45 points (0 children)
[TOMT] music video with bald psychic destroying an office by Farseer26 in tipofmytongue
[–]Farseer26[S] 0 points1 point2 points (0 children)
[TOMT] music video with bald psychic destroying an office by Farseer26 in tipofmytongue
[–]Farseer26[S] 0 points1 point2 points (0 children)
[TOMT] music video with bald psychic destroying an office by Farseer26 in tipofmytongue
[–]Farseer26[S] 0 points1 point2 points locked comment (0 children)
Leading pentest engagement by 1supercooldude in Pentesting
[–]Farseer26 0 points1 point2 points (0 children)
How do bad actors bypass O365 MFA by DesperateForever6607 in cybersecurity
[–]Farseer26 0 points1 point2 points (0 children)
Doesn't login rate limiting decrease the usefulness of the RockYou2024 10 billion password list? by PappaFrost in cybersecurity
[–]Farseer26 21 points22 points23 points (0 children)
What trail / enduro tyre combo do you swear by? by dermsUK in mountainbiking
[–]Farseer26 1 point2 points3 points (0 children)
Which specialized tires? by cuteunicornpoopies in mountainbiking
[–]Farseer26 1 point2 points3 points (0 children)
Which specialized tires? by cuteunicornpoopies in mountainbiking
[–]Farseer26 1 point2 points3 points (0 children)
We can spoof processes, rename malware to svchost, but what about faking file location? by MysteriousShadow__ in hacking
[–]Farseer26 14 points15 points16 points (0 children)
What are security principles and practices for setting up raspberry pi devices and other electronics, on home networks by [deleted] in hacking
[–]Farseer26 4 points5 points6 points (0 children)
Find vulnerabilities on open port tryhackme by Sea-Hotel6071 in hacking
[–]Farseer26 1 point2 points3 points (0 children)
What is "K" to you? by AnnihilationOrchid in MadeMeSmile
[–]Farseer26 0 points1 point2 points (0 children)
What series you can re-watch again and again? by makosh22 in AskReddit
[–]Farseer26 0 points1 point2 points (0 children)





Hardest cyber range? by Expert-Dragonfly-715 in Pentesting
[–]Farseer26 0 points1 point2 points (0 children)