Varonis finds one vulnerability and three attack methods that can be used to obtain NTLM hashes via Outlook and two Windows programs.
The post New NTLM Hash Leak Attacks Target Outlook, Windows Programs appeared first on SecurityWeek.
Varonis finds one vulnerability and three attack methods that can be used to obtain NTLM hashes via Outlook and two Windows programs.
The post New NTLM Hash Leak Attacks Target Outlook, Windows Programs appeared first on SecurityWeek.
Microsoft is adding new features to the Kerberos protocol, to eliminate the use of NTLM for Windows authentication.
The post Microsoft Improving Windows Authentication, Disabling NTLM appeared first on SecurityWeek.