Microsoft's March 2025 Patch Tuesday brought an extensive lineup of bug fixes, but among these was a vulnerability that would quickly escalate into a significant security incident: CVE-2025-24054, an NTLM hash-leaking flaw. While Microsoft initially considered this vulnerability "less likely" to...
Microsoft's Patch Tuesday on March 11, 2025, delivered a substantial set of bug fixes, but among these, a particular vulnerability, CVE-2025-24054, quickly attracted critical attention due to its rapid exploitation by attackers. This flaw, an NTLM (NT LAN Manager) hash leaking vulnerability, was...
Windows security practitioners and enterprise administrators are confronting a rapidly evolving threat landscape, with a new vulnerability—CVE-2025-24054—exposing critical cracks in the armor of legacy NTLM authentication. As disclosures mount and unofficial fixes surface ahead of the official...
Lex Thomas welcomes Mark Simos, an Architect for the Cyber, Security and Identity team here at Microsoft, to discuss tools, techniques and services that are available to help mitigate “Pass-the-Hash” and other forms of cyber credential theft. Tune in as they give us an in-depth overview of the...
active directory
cloud solutions
credential theft
cyber security
identity management
it architecture
microsoft
network security
pass-the-hash
podcast
privileged access
security features
security overview
security tools
system center
teched
threat mitigation
virtualization
windows 10
windows server
Happy holidays! I hope everyone is enjoying the festive season. I like to get my holiday shopping done early, and this year was no exception. In the middle of my holiday shopping last week, as I passed my cash from one store to the next, I was reminded of “Pass-the-Hash.” (My mind...
adobe flash
bulletin release
critical updates
cybersecurity
december 2012
deployment guidance
exploitability index
holiday season
internet explorer
microsoft
microsoft word
pass-the-hash
patch management
remote code execution
rtf file
security update
technical advisory
trustworthy computing
vulnerabilities
webcast