https://www.maketecheasier.com/windows-file-explorer-previews-vulnerable-ntlm-hash-leakage/
Oct 29, 2025 - Windows File Explorer previews can expose NTLM password hashes, putting your security at risk. Here’s what you should know to stay protected.
file explorerwindowspreviewsvulnerablentlm
https://www.synacktiv.com/publications/gpoddity-exploiting-active-directory-gpos-through-ntlm-relaying-and-more
GPOddity: exploiting Active Directory GPOs through NTLM relaying, and
active directoryexploitingntlm
https://netcologne-its.de/ntlm-relay-angriffe-verteidigen/
Dec 18, 2024 - NTLM-Angriffe nutzen eine Schwachstelle bei der Nutzerauthentifizierung in Windows-Netzwerken aus. Wir erklären, wie Sie sich dagegen effektiv verteidigen.
ntlmrelayangriffe
https://academy.hackthebox.com/course/preview/ntlm-relay-attacks
The NTLM authentication protocol is commonly used within Windows-based networks to facilitate authentication between clients and servers. However, NTLM's...
ntlmrelayattackscoursehtb
https://securelist.ru/ntlm-abuse-in-2025/114067/
Nov 27, 2025 - В этой статье рассматриваются NTLM Relay, пересылка учетных данных и другие способы...
ntlm
https://securelist.com/ntlm-abuse-in-2025/118132/
Nov 26, 2025 - This article covers NTLM relay, credential forwarding, and other NTLM-related vulnerabilities and cyberattacks discovered in 2025.
ntlmabusedcyberattackssecurelist
https://github.com/curl/curl/pull/19206
Make autotools and cmake detect DES support in OpenSSL and mbedTLS. Forward feature macros to C and omit NTLM from the feature preview list. Use the feature...
ntlmdisabledessupportmissing
https://www.lrqa.com/en/cyber-labs/hash-relaying-the-path-to-domain-admin/
Oct 28, 2025 - Learn how NTLM relay attacks exploit AD misconfigurations for full domain compromise, from SMB and LDAP relays to RBCD and WebClient coercion.
hashntlmattacksdomainadmin
https://calcomsoftware.com/ntlm-v1-and-v2-vs-kerberos/
Aug 19, 2025 - Compare Kerberos and NTLM authentication protocols. Learn which is most secure and how to reduce risk with proper configuration and hardening.
ntlmvskerberosauthenticationcompared
https://securelist.lat/ntlm-abuse-in-2025/100602/
Dec 2, 2025 - Este artículo aborda NTLM relay, el reenvío de credenciales y otras vulnerabilidades y ciberataques relacionados con NTLM que fueron descubiertos en 2025.
sentlmenlosciberataques
https://calcomsoftware.com/ntlm-security-weaknesses/
May 21, 2025 - NTLM has many security weaknesses. Since it is almost impossible to completely neglect NTLM, it is highly important to manage it correctly
ntlmvulnerabilitiesreview