Mandiant Publishes Precomputed Tables That Slash NTLMv1 Crack Time to ~12 Hours
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you
Microsoft to Ship Windows with NTLM Blocked by Default, Pressing Enterprises to Migrate to Kerberos (US)
Microsoft will ship upcoming Windows Server and Windows 11 releases with NTLM network authentication blocked by default and new telemetry to reveal remaining dependencies. The urgency of the change is heightened by recent releases of precomputed tables that dramatically shorten the time to recover NTLMv1-protected credentials, increasing the risk profile for organizations that continue to accept legacy negotiations.

Server-side attacks undermine password managers’ ‘zero-knowledge’ assurances
Researchers from ETH Zurich and USI Lugano demonstrate that a fully compromised password-manager server can be manipulated to exfiltrate or alter user vaults when recovery, sharing, or legacy-support features are enabled. The paper details 25 practical exploits against Bitwarden, LastPass, and Dashlane that include public‑key substitution, padding‑oracle decryption, and iteration‑count downgrades.
Critical OpenClaw Flaw Enabled Remote Hijack Through Malicious Web Page
A newly disclosed OpenClaw vulnerability (CVE-2026-25253) let a single malicious webpage steal a browser-exposed token and escalate it into full gateway access and host command execution; OpenClaw released a fix in 2026.1.29. Independent scans and research also found large-scale operational exposure—including hundreds of internet-reachable admin interfaces, unmoderated Moltbook skill posts with hidden prompt‑injection fragments, and separate misconfigurations that leaked millions of API tokens and tens of thousands of emails—so operators must patch, revoke keys, inventory reachable instances, and tighten access and content‑distribution controls immediately.

Microsoft pushes urgent Office patch for a newly exploited zero-day used in targeted intrusions
Microsoft released fixes for CVE-2026-21509 after detecting active exploitation that undermines Office protections; mitigations and patches cover major supported Office builds and CISA has flagged the flaw for immediate remediation. The vulnerability appears to be leveraged in focused operations requiring user interaction and complex exploit chains, elevating the priority for high-value targets to deploy updates quickly.

Dell RecoverPoint Zero-Day Exploited by China-Linked Cyberespionage Group
A China-linked espionage cluster abused a hardcoded-credential flaw in Dell RecoverPoint for Virtual Machines to escalate privileges, move laterally, and deploy bespoke malware; Dell released patch 6.0.3.1 HF1 and vendors published IoCs and behavioral indicators. The incident underscores a broader trend of rapid weaponization of management and recovery tooling, forcing organisations to pair urgent patching with compensating network controls and extended telemetry into virtualization stacks.
Machine identities missing from ransomware playbooks
Enterprise ransomware playbooks commonly treat credential resets as a human-only control, leaving service accounts, API keys, tokens and certificates intact — a blind spot that accelerates lateral movement and drives recovery costs. Market shifts toward targeted, disruption-focused extortion and faster weaponization via agentic AI make that omission more dangerous: defenders must pair machine-identity governance with identity-first detection and quicker containment to blunt modern ransomware economics.
CrashFix: Chrome extension that forces browser crashes to deliver ModeloRAT targets corporate networks
A malicious Chrome add-on masquerading as an ad blocker deliberately destabilizes the browser to trick users into running clipboard-pasted commands that install a Python-based remote access trojan. The campaign, attributed to an actor tracked as KongTuke and active since early 2025, focuses on domain-joined machines in corporate environments and uses a timed denial-of-service loop to sustain the social-engineering lure.

Hackers Rapidly Exploit Critical BeyondTrust Remote-Access Flaw After PoC Emerges
A critical unauthenticated remote-code execution bug (CVE-2026-1731) in BeyondTrust Remote Support and Privileged Remote Access was probed and targeted within 24 hours of a public proof-of-concept, exposing thousands of internet-facing instances. Organizations should treat exposed BeyondTrust deployments as emergency patching and containment priorities, applying access restrictions, WAF/ACL rules, and focused threat-hunting while verifying remediation.