Microsoft will audit and then begin enforcing a block on NTLMv1–derived credentials in Windows 11, version 24H2 and Windows Server 2025: the change is gated by a new registry key (BlockNtlmv1SSO), exposes two new NTLM event IDs for Audit vs Enforce behavior, and will be rolled out in phases...
Microsoft’s Security Update Guide lists CVE-2025-53778 as an improper authentication vulnerability in the Windows NTLM implementation that can allow an authorized attacker to elevate privileges over a network, and administrators should treat it as a high-priority authentication risk until every...
In the ever-evolving landscape of cybersecurity, attackers continually adapt their methods to bypass advanced defenses. A recent development in this cat-and-mouse game is the emergence of "RemoteMonologue," a technique that exploits the Distributed Component Object Model (DCOM) in Windows...
Hold on to your keyboards, Windows enthusiasts—because this one is a biggie. Microsoft has disclosed a new vulnerability under the identifier CVE-2025-21311, which specifically targets the security mechanism within NTLMv1 (NT LAN Manager version 1), leading to something we tech nerds call...
In a move that secures systems while turning a significant page in authentication history, Microsoft has made decisive strides in phasing out the old and increasingly vulnerable NTLM (Net-NTLM or Windows NT LAN Manager) protocol. While many users likely missed this change amidst the flood of...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.