Click any tag below to further narrow down your results
Links
Microsoft is disabling the NT LAN Manager (NTLM) protocol by default in Windows 11 and Windows Server to enhance security. Despite its long history, NTLM is outdated and vulnerable to attacks, prompting the shift towards more secure protocols like Kerberos. Many organizations still use NTLM, but the risks now outweigh the benefits.
Microsoft’s November 2025 Patch Tuesday updates resolved 63 vulnerabilities, including a critical zero-day in the Windows kernel actively under attack. The updates also addressed an Office vulnerability allowing unauthorized code execution. This month saw a significant decrease in reported flaws compared to October.
Two new zero-day vulnerabilities in Windows have been discovered and are currently being exploited by cybercriminals. The flaws could allow attackers to execute arbitrary code and gain elevated privileges on affected systems, prompting urgent calls for users to update their software and security measures.
Microsoft's August 2025 Patch Tuesday addressed 107 vulnerabilities, including a critical zero-day in Windows Kerberos that could allow domain administrator privilege escalation. The update also fixed thirteen critical vulnerabilities, predominantly related to remote code execution and information disclosure, highlighting ongoing security challenges for Windows users.
The article discusses a recent research study that reveals vulnerabilities in Windows' Endpoint Privilege Management (EPM) system, which can be exploited by attackers to gain unauthorized access and escalate privileges. Researchers detail the methodologies used to uncover these security flaws and emphasize the need for improved protective measures within the Windows operating system.
The article discusses methods for exploiting vulnerabilities in Windows drivers, aimed at beginners interested in cybersecurity and hacking. It provides insights into the process of weaponizing these drivers to gain unauthorized access or control over systems. This serves as a foundational guide for those looking to understand the intricacies of driver manipulation in the context of malicious activities.