Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Microsoft Deprecates Outdated NTLM

June 3, 2024
Reading Time: 3 mins read
in News
Microsoft Deprecates Outdated NTLM

Microsoft has deprecated NTLM authentication on Windows and Windows servers, urging developers to transition to Kerberos or Negotiation authentication for enhanced security. NTLM, introduced in 1993, is no longer under active development and will be phased out due to increased vulnerabilities and risks. Despite new measures introduced by Microsoft, such as SMB security signing, attacks on NTLM authentication persist, prompting the need for a transition to more secure alternatives.

This move isn’t surprising, as Microsoft first announced its intention to kill off the aging authentication protocol in October 2023, urging admins to move to Kerberos and other contemporary authentication systems, like Negotiate. NTLM has been extensively abused in cyberattacks known as ‘NTLM Relay’ attacks, where Windows domain controllers are taken over by forcing them to authenticate against malicious servers.

Apart from the weaker encryption used in NTLM, compared to more modern protocols like Kerberos, the protocol’s performance is subpar, requiring more network round trips, and does not support single sign-on (SSO) technologies. NTLM will still work in the next release of Windows Server and the next annual release of Windows. Still, users and application developers should transition to ‘Negotiate,’ which attempts to authenticate with Kerberos first and falls back to NTLM only when necessary.

Microsoft recommends that system administrators utilize auditing tools to understand how NTLM is being used within their environment and identify all instances that need to be considered in formulating a transition plan. For most applications, replacing NTLM with Negotiate can be achieved by a one-line change in the ‘AcquireCredentialsHandle’ request to the Security Support Provider Interface (SSPI). However, there are exceptions where more extensive changes might be required. Negotiate has a built-in fallback to NTLM to mitigate compatibility issues during the transition period. Administrators stuck with authentication problems can check out Microsoft’s Kerberos troubleshooting guide.

Reference:
  • Microsoft Deprecates NTLM for Enhanced Security Measures
Tags: Cyber NewsCyber News 2024Cyber threatsCybersecurityJune 2024KerberosMicrosoftNTLMWindows
ADVERTISEMENT

Related Posts

Russia Arrests Young Cybersecurity Leader

Russia Arrests Young Cybersecurity Leader

November 28, 2025
FBI Reports 262 Million In Fraud

Poland Detains Russian Hacking Suspect

November 28, 2025
Russia Arrests Young Cybersecurity Leader

UK Privacy Enforcement Activity Drops

November 28, 2025
FBI Reports 262 Million In Fraud

AI Security Firm Vijil Raises 17 Million

November 27, 2025
Openai User Data Exposed In Mixpanel Hack

Amazon Uses AI Agents For Bug Hunting

November 27, 2025
Openai User Data Exposed In Mixpanel Hack

Openai User Data Exposed In Mixpanel Hack

November 27, 2025

Latest Alerts

Bloody Wolf Widens Java RAT Campaign

Forge Library Patch Stops Signature Bypass

ShadowV2 Botnet Tests During AWS Outage

Toddycat Tools Steal Outlook And M365 Data

Hackers Use Blender Assets To Spread StealC

ASUS Flags Critical AiCloud Router Flaw

Subscribe to our newsletter

    Latest Incidents

    Mazda Reports No Impact From Oracle Hack

    Asahi Breach Hits Two Million Users

    Qilin Ransomware Hits Korean MSP

    Multiple London Councils Hit By Cyber Attacks

    Russian Hackers Target US Engineering Firm

    Situsamc Confirms Customer Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial