<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Kerberos &#8211; Cyber Pulse Academy</title>
	<atom:link href="https://www.cyberpulseacademy.com/tag/kerberos/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.cyberpulseacademy.com</link>
	<description></description>
	<lastBuildDate>Mon, 16 Feb 2026 04:30:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://files.servewebsite.com/2023/07/ea224bb3-generated-image-1763134673008-enlarge.png</url>
	<title>Kerberos &#8211; Cyber Pulse Academy</title>
	<link>https://www.cyberpulseacademy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>NTLM Phase-Out: Microsoft&#8217;s 3-Stage Plan to Move Windows to Kerberos</title>
		<link>https://www.cyberpulseacademy.com/ntlm-phase-out-microsoft-plan/</link>
					<comments>https://www.cyberpulseacademy.com/ntlm-phase-out-microsoft-plan/#respond</comments>
		
		<dc:creator><![CDATA[Cyber Pulse Academy]]></dc:creator>
		<pubDate>Mon, 02 Feb 2026 01:31:03 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[News - February 2026]]></category>
		<category><![CDATA[Kerberos]]></category>
		<guid isPermaLink="false">https://www.cyberpulseacademy.com/?p=13279</guid>

					<description><![CDATA[Microsoft has initiated a three-stage plan to phase out NTLM authentication in Windows, moving to Kerberos. This post explains the risks of NTLM, the phases of the transition, and actionable steps for organizations to prepare for a more secure authentication future.]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="13279" class="elementor elementor-13279" data-elementor-post-type="post">
				<header class="elementor-element elementor-element-9f172a0 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="9f172a0" data-element_type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-9eb22c5 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="9eb22c5" data-element_type="container">
				<div class="elementor-element elementor-element-f957d67 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="f957d67" data-element_type="widget" data-widget_type="divider.default">
				<div class="elementor-widget-container">
							<div class="elementor-divider">
			<span class="elementor-divider-separator">
						</span>
		</div>
						</div>
				</div>
				<div class="elementor-element elementor-element-2a98d2b elementor-widget elementor-widget-wpr-breadcrumbs-pro" data-id="2a98d2b" data-element_type="widget" data-widget_type="wpr-breadcrumbs-pro.default">
				<div class="elementor-widget-container">
					<div class="wpr-post-breadcrumbs"><ul class="wpr-breadcrumbs"><li><a href="https://www.cyberpulseacademy.com">Home</a></li><li>/</li><li>Kerberos</li></ul></div>				</div>
				</div>
				</div>
					</div>
				</header>
		<div class="elementor-element elementor-element-ef4156c e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="ef4156c" data-element_type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-98420b4 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="98420b4" data-element_type="container">
				<div class="elementor-element elementor-element-074ef07 elementor-widget elementor-widget-template" data-id="074ef07" data-element_type="widget" data-widget_type="template.default">
				<div class="elementor-widget-container">
							<div class="elementor-template">
					<div data-elementor-type="page" data-elementor-id="13147" class="elementor elementor-13147" data-elementor-post-type="elementor_library">
				<div class="elementor-element elementor-element-f4aa8ac e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="f4aa8ac" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-4a9728c elementor-widget elementor-widget-html" data-id="4a9728c" data-element_type="widget" data-widget_type="html.default">
				<div class="elementor-widget-container">
					    <!-- Main Title H1 -->
    <h1 class="global-title">NTLM Phase-Out: Microsoft's 3-Stage Plan to Move Windows to Kerberos</h1>

    <!-- Introductory HR -->
    <hr class="gradient-hr">

    <!-- Executive Summary / Introduction -->
    <h2 id="intro" class="sub-title">🔐 Executive Summary: The End of an Era for NTLM</h2>
    <p>After years of warnings, Microsoft has officially ignited the <span class="threat-word">deprecation</span> of NTLM (New Technology LAN Manager) with a concrete three-stage plan. This <strong>NTLM phase-out</strong> aims to replace the legacy protocol with <span class="protect-word">Kerberos</span> as the default authentication method in Windows. The move responds to decades of <span class="threat-word">vulnerabilities</span>, including <span class="threat-word">pass-the-hash</span>, <span class="threat-word">relay attacks</span>, and weak cryptography, that have made NTLM a favorite target for attackers. For cybersecurity professionals and IT teams, this transition is both a challenge and an opportunity to harden their identity infrastructure. This guide breaks down the plan, the risks, and exactly how to prepare.</p>
    <br>
    <p>Whether you're a student, a system administrator, or a CISO, understanding the <strong>NTLM phase-out</strong> is essential. Microsoft's roadmap includes enhanced auditing now, new features like <span class="protect-word">IAKerb</span> and local KDC in late 2026, and finally disabling NTLM by default in future Windows releases. Let's dive deep into what this means for your environment.</p>

    <!-- Table of Contents -->
    <div class="toc-box">
        <h3 style="color: #00D9FF;margin-top: 0;font-size: 1.5rem">📖 Table of Contents</h3>
        <ol>
            <li><a href="#intro">Executive Summary</a></li>
            <li><a href="#ntlm-risks">1. NTLM &amp; Associated MITRE ATT&amp;CK Risks</a></li>
            <li><a href="#why-phase-out">2. Why Microsoft is Phasing Out NTLM</a></li>
            <li><a href="#three-stage">3. Microsoft's Three-Stage Plan (Detailed)</a></li>
            <li><a href="#step-by-step">4. Step-by-Step Guide for Organizations</a></li>
            <li><a href="#mistakes-best">5. Common Mistakes &amp; Best Practices</a></li>
            <li><a href="#red-blue">6. Red Team vs Blue Team View</a></li>
            <li><a href="#framework">7. Implementation Framework: NTLM vs Kerberos</a></li>
            <li><a href="#faq">8. FAQ</a></li>
            <li><a href="#takeaways">9. Key Takeaways</a></li>
            <li><a href="#cta">10. Call to Action</a></li>
        </ul>
    </div>

    <hr class="gradient-hr">

    <!-- Section 1: NTLM and MITRE ATT&amp;CK -->
    <h2 id="ntlm-risks" class="sub-title">🛡️ Understanding NTLM and Its MITRE ATT&amp;CK Techniques</h2>
    <p>NTLM is a challenge-response authentication protocol introduced by Microsoft in the early 1990s. It has long been considered <span class="threat-word">insecure</span> due to its use of weak cryptography (like <strong>LM/NTLM hashes</strong>) and vulnerability to multiple attack techniques documented in the <strong>MITRE ATT&amp;CK framework</strong>.</p>
    <br>
    <p>Key techniques adversaries use against NTLM include:</p>
    <ul class="all-list">
        <li><strong><span class="threat-word">Pass-the-Hash (T1550.002):</span></strong> Attackers capture NTLM hashes (from memory or LSASS) and use them to authenticate without needing the plaintext password.</li>
        <li><strong><span class="threat-word">NTLM Relay (T1557.001):</span></strong> Adversaries position themselves between a client and server to relay NTLM authentication, gaining unauthorized access to resources like SMB shares or Exchange.</li>
        <li><strong><span class="threat-word">Credential Dumping (T1003.002):</span></strong> Tools like Mimikatz extract NTLM hashes from LSASS memory, enabling lateral movement.</li>
        <li><strong><span class="threat-word">Man-in-the-Middle (T1557):</span></strong> Combined with ARP spoofing or rogue APs, attackers can downgrade authentication to NTLMv1 or capture exchanges.</li>
    </ul>

    <br><img decoding="async" class="aligncenter size-full wp-image-3716" src="https://files.servewebsite.com/2026/02/317b79e6-2026-02_005_1.jpg" alt="NTLM phase-out attack flow: NTLM relay and pass-the-hash diagram" title="NTLM Phase-Out: Microsoft&#039;s 3-Stage Plan to Move Windows to Kerberos 1">

    <hr class="gradient-hr">

    <!-- Section 2: Why Microsoft is Phasing Out NTLM -->
    <h2 id="why-phase-out" class="sub-title">⚙️ Why Microsoft is Forcing the NTLM Phase-Out</h2>
    <p>As Mariam Gewida from Microsoft stated, <em>"NTLM is susceptible to various attacks, including replay and man-in-the-middle attacks, due to its use of weak cryptography."</em> Despite being formally deprecated in <span class="threat-word">June 2024</span>, NTLM remains widely used in enterprises due to legacy applications, network constraints, or simple inertia. This exposes organizations to <strong>credential theft</strong> and <span class="threat-word">lateral movement</span>.</p>
    <br>
    <p>The shift to <span class="protect-word">Kerberos</span> brings modern security features: mutual authentication, ticket-based access, support for <span class="protect-word">MFA</span>, and resistance to replay attacks. Microsoft's three-stage plan ensures a <strong>secure-by-default</strong> future while providing tools to ease migration.</p>

    <hr class="gradient-hr">

    <!-- Section 3: Three-Stage Plan -->
    <h2 id="three-stage" class="sub-title">📅 Microsoft's Three-Stage NTLM Phase-Out Plan</h2>

    <h3 style="color: #FF6B9D;font-size: 1.5rem;margin: 20px 0 10px">Stage 1: Visibility &amp; Control (Available Now)</h3>
    <p>Enhanced NTLM auditing allows administrators to log and analyze exactly where NTLM is still used. This includes which applications, servers, or clients are requesting NTLM authentication. Without this visibility, migration is impossible.</p>

    <h3 style="color: #FF6B9D;font-size: 1.5rem;margin: 20px 0 10px">Stage 2: Addressing Roadblocks (Expected H2 2026)</h3>
    <p>Microsoft will introduce two key technologies to eliminate common blockers:</p>
    <ul class="all-list">
        <li><strong>IAKerb</strong> – allows Kerberos to work across trust boundaries and non-domain joined scenarios.</li>
        <li><strong>Local KDC</strong> – a lightweight Key Distribution Center for local accounts and scenarios where a domain controller isn't reachable.</li>
        <li>Core Windows components will be updated to <span class="protect-word">prefer Kerberos</span> automatically.</li>
    </ul>

    <h3 style="color: #FF6B9D;font-size: 1.5rem;margin: 20px 0 10px">Stage 3: Disabling NTLM by Default (Future Windows Release)</h3>
    <p>The next version of Windows Server and its associated Windows client will ship with NTLM network authentication <strong>disabled</strong>. Organizations can re-enable it via Group Policy if absolutely necessary, but the default state is secure.</p>

    <br><img decoding="async" class="aligncenter size-full wp-image-3716" src="https://files.servewebsite.com/2026/02/343162cc-2026-02_005_2.jpg" alt="NTLM phase-out timeline three stages" title="NTLM Phase-Out: Microsoft&#039;s 3-Stage Plan to Move Windows to Kerberos 2">

    <hr class="gradient-hr">

    <!-- Section 4: Step-by-Step Guide -->
    <h2 id="step-by-step" class="sub-title">👣 Step-by-Step Guide to Prepare for the NTLM Phase-Out</h2>

    <div class="step-box">
        <h3 class="step-title">Step 1: Enable Enhanced NTLM Auditing</h3>
        <p>Use Group Policy: <strong>Computer Configuration → Policies → Windows Settings → Security Settings → Local Policies → Security Options → Network security: Restrict NTLM: Audit NTLM authentication in this domain</strong>. Collect logs from Domain Controllers and members.</p>
    </div>

    <div class="step-box">
        <h3 class="step-title">Step 2: Map Dependencies</h3>
        <p>Analyze the logs to identify all applications, services, or devices that still use NTLM. Pay special attention to <span class="threat-word">legacy servers</span>, printers, scanners, and in-house apps.</p>
    </div>

    <div class="step-box">
        <h3 class="step-title">Step 3: Test Kerberos in a Staging Environment</h3>
        <p>Create a test OU with GPOs that <strong>block NTLM</strong> (e.g., "Network security: Restrict NTLM: NTLM authentication in this domain" set to "Deny all"). Validate that critical apps still work via Kerberos.</p>
    </div>

    <div class="step-box">
        <h3 class="step-title">Step 4: Upgrade or Remediate Incompatible Systems</h3>
        <p>For apps that break, work with vendors to enable Kerberos, or consider wrapping legacy apps with Kerberos-aware proxies. Microsoft's upcoming IAKerb and Local KDC (Phase 2) may help, but plan to remove NTLM entirely.</p>
    </div>

    <div class="step-box">
        <h3 class="step-title">Step 5: Gradually Enforce Kerberos</h3>
        <p>Use <span class="protect-word">"Deny all"</span> audit modes first, then move to blocking. Leverage Group Policy to disable NTLM in pilot rings before full rollout.</p>
    </div>

    <hr class="gradient-hr">

    <!-- Section 5: Common Mistakes &amp; Best Practices -->
    <h2 id="mistakes-best" class="sub-title">✅❌ Common Mistakes &amp; Best Practices During NTLM Phase-Out</h2>

    <div style="flex-wrap: wrap;gap: 40px;margin: 30px 0">
        <div style="flex: 1;min-width: 250px">
            <h3 style="color: #FF6B9D">🔴 Common Mistakes</h3>
            <ul class="mistake-list">
                <li>Assuming Kerberos works for all apps without testing.</li>
                <li>Ignoring NTLM usage in non-Windows devices (printers, IoT).</li>
                <li>Relying only on default auditing (not enabling detailed logging).</li>
                <li>Disabling NTLM before verifying IAKerb/local KDC readiness.</li>
                <li>Forgetting that service accounts might store NTLM hashes.</li>
            </ul>
        </div>
        <div style="flex: 1;min-width: 250px">
            <h3 style="color: #FF6B9D">🟢 Best Practices</h3>
            <ul class="best-list">
                <li>Start auditing today – even if migration is far away.</li>
                <li>Inventory all service accounts and convert to Group Managed Service Accounts (gMSA).</li>
                <li>Enable <span class="protect-word">Kerberos armoring</span> (FAST) where possible.</li>
                <li>Use <span class="protect-word">Windows Defender Firewall</span> to block unnecessary SMB traffic that could relay NTLM.</li>
                <li>Plan for <span class="protect-word">phased disablement</span> using Group Policy rings.</li>
            </ul>
        </div>
    </div>

    <hr class="gradient-hr">

    <!-- Section 6: Red Team vs Blue Team -->
    <h2 id="red-blue" class="sub-title">🎭 Red Team vs Blue Team: NTLM Phase-Out Impact</h2>
    <div class="red-blue-box">
        <div class="red-team">
            <h3>🔴 Red Team (Attackers)</h3>
            <p>With NTLM still present, red teams leverage:</p>
            <ul class="all-list">
                <li><strong>Pass-the-Hash (T1550.002)</strong> – using tools like Mimikatz or Impacket.</li>
                <li><strong>NTLM Relay (T1557.001)</strong> – via tools like <strong>ntlmrelayx</strong> to compromise servers.</li>
                <li><strong>Coercion attacks</strong> (e.g., PrinterBug) to force a DC to authenticate back to an attacker.</li>
            </ul>
            <p>Once NTLM is disabled, these attack paths become <span class="threat-word">significantly harder</span>, forcing attackers to target Kerberos (which requires more complex techniques like Kerberoasting or Golden Tickets).</p>
        </div>
        <div class="blue-team">
            <h3>🔵 Blue Team (Defenders)</h3>
            <p>Defenders can use the phase-out to:</p>
            <ul class="all-list">
                <li>Enforce <span class="protect-word">phishing-resistant MFA</span> (Kerberos supports modern auth).</li>
                <li>Monitor for NTLM usage anomalies via <strong>Event ID 8001-8004</strong> (NTLM auditing).</li>
                <li>Implement <strong>EPA (Extended Protection for Authentication)</strong> to harden existing apps.</li>
                <li>Use the three-stage plan as a <span class="protect-word">justification</span> to get budget for legacy app remediation.</li>
            </ul>
        </div>
    </div>

    <hr class="gradient-hr">

    <!-- Section 7: Implementation Framework (Table) -->
    <h2 id="framework" class="sub-title">⚖️ Comparison: NTLM vs Kerberos</h2>
    <table>
        <thead>
            <tr><th>Feature</th><th>NTLM</th><th>Kerberos</th></tr>
        </thead>
        <tbody>
            <tr><td><strong>Authentication type</strong></td><td>Challenge-response (symmetric)</td><td>Ticket-based (asymmetric + symmetric)</td></tr>
            <tr><td><strong>Mutual authentication</strong></td><td><span class="threat-word">No</span> (server not authenticated to client)</td><td><span class="protect-word">Yes</span> (both parties verify)</td></tr>
            <tr><td><strong>Resistance to replay</strong></td><td><span class="threat-word">Weak</span> (timestamps optional)</td><td><span class="protect-word">Strong</span> (timestamps + session keys)</td></tr>
            <tr><td><strong>Pass-the-hash risk</strong></td><td><span class="threat-word">High</span> – hashes are sufficient</td><td><span class="protect-word">Low</span> – requires ticket + session key</td></tr>
            <tr><td><strong>MFA support</strong></td><td>Limited (NTLMv2 can leverage, but rarely used)</td><td><span class="protect-word">Native</span> (with PKINIT, smart cards, Windows Hello)</td></tr>
            <tr><td><strong>Default in Windows</strong></td><td>Legacy fallback</td><td>Domain-joined default</td></tr>
        </tbody>
    </table>

    <hr class="gradient-hr">

    <!-- Section 8: FAQ -->
    <h2 id="faq" class="sub-title">❓ Frequently Asked Questions About the NTLM Phase-Out</h2>

    <div class="faq-item">
        <div class="faq-question">Q: Will my old application stop working after Phase 3?</div>
        <p>A: Only if it hard-codes NTLM and cannot use Kerberos. Microsoft is providing IAKerb and local KDC to cover many legacy scenarios. You should test and plan to upgrade.</p>
    </div>
    <div class="faq-item">
        <div class="faq-question">Q: Does this affect NTLM authentication for local accounts?</div>
        <p>A: Phase 3 focuses on <strong>network NTLM</strong>. Local logons may still use NTLM until further notice, but the goal is to eventually move everything to Kerberos (including via Local KDC).</p>
    </div>
    <div class="faq-item">
        <div class="faq-question">Q: How can I audit NTLM usage today?</div>
        <p>A: Enable the Group Policy setting "Network security: Restrict NTLM: Audit NTLM authentication in this domain" and review the logs on Domain Controllers. Microsoft also provides <a href="https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain" target="_blank" rel="noopener noreferrer">detailed guidance</a>.</p>
    </div>
    <div class="faq-item">
        <div class="faq-question">Q: Does this impact NTLMv2?</div>
        <p>A: Yes, all versions of NTLM (including v2) are being phased out. NTLMv2 is more secure than v1 but still vulnerable to relay and pass-the-hash.</p>
    </div>

    <hr class="gradient-hr">

    <!-- Section 9: Key Takeaways -->
    <h2 id="takeaways" class="sub-title">📌 Key Takeaways</h2>
    <ul class="all-list">
        <li>Microsoft's <strong>NTLM phase-out</strong> is real and accelerating: Phase 1 auditing is available now, Phase 2 mid-2026, Phase 3 (default disable) in a future Windows release.</li>
        <li>NTLM is associated with <span class="threat-word">critical MITRE techniques</span> like pass-the-hash (T1550.002) and relay (T1557.001), making its removal a major security win.</li>
        <li>Organizations must start <span class="protect-word">auditing immediately</span> to discover hidden NTLM dependencies.</li>
        <li>New technologies like <span class="protect-word">IAKerb and local KDC</span> will help bridge gaps for legacy apps.</li>
        <li>Red teams will lose a reliable attack vector; blue teams gain a more robust authentication foundation.</li>
    </ul>

    <hr class="gradient-hr">

    <!-- Section 10: Call to Action -->
    <h2 id="cta" class="sub-title">🚀 Start Your NTLM Phase-Out Journey Today</h2>
    <div class="callout">
        <p>Don't wait until 2026. Begin with these three actions:</p>
        <ol style="margin-left: 30px">
            <li>🔍 <strong>Enable NTLM auditing</strong> on your Domain Controllers.</li>
            <li>📋 <strong>Create a dependency map</strong> of all NTLM-using devices and apps.</li>
            <li>🧪 <strong>Test Kerberos-only policies</strong> in a lab.</li>
        </ol>
        <p>For deeper dives, explore these resources:</p>
        <ul class="all-list">
            <li><a href="https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain" target="_blank" rel="noopener noreferrer">Microsoft: Restrict NTLM settings</a></li>
            <li><a href="https://attack.mitre.org/techniques/T1550/002/" target="_blank" rel="noopener noreferrer">MITRE ATT&amp;CK: Pass-the-Hash (T1550.002)</a></li>
            <li><a href="https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/security/kerberos/kerberos-authentication-overview" target="_blank" rel="noopener noreferrer">Microsoft Kerberos Overview</a></li>
            <li><a href="/blog/kerberos-authentication" rel="noopener">Internal: Kerberos Deep Dive (internal link)</a></li>
            <li><a href="/blog/pass-the-hash-attacks" rel="noopener">Internal: Understanding Pass-the-Hash (internal link)</a></li>
        </ul>
    </div>

    <!-- Required footer div -->
    <div style="text-align: center;color: #999999;font-size: 0.9em;margin-top: 50px;padding-top: 20px;border-top: 1px solid #444">
        <p>© Cyber Pulse Academy. This content is provided for educational purposes only.</p>
        <p>Always consult with security professionals for organization-specific guidance.</p>
    </div>				</div>
				</div>
					</div>
				</div>
				</div>
				</div>
						</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-0d44b32 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="0d44b32" data-element_type="container">
				<div class="elementor-element elementor-element-29a5c50 elementor-widget__width-inherit elementor-widget elementor-widget-template" data-id="29a5c50" data-element_type="widget" data-widget_type="template.default">
				<div class="elementor-widget-container">
							<div class="elementor-template">
					<div data-elementor-type="container" data-elementor-id="11836" class="elementor elementor-11836" data-elementor-post-type="elementor_library">
				<div class="elementor-element elementor-element-3f67943 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="3f67943" data-element_type="container">
				<div class="elementor-element elementor-element-f4c05d5 elementor-widget elementor-widget-html" data-id="f4c05d5" data-element_type="widget" data-widget_type="html.default">
				<div class="elementor-widget-container">
					<hr style="border: 0;height: 1px;background: linear-gradient(90deg, transparent, #00D9FF, transparent);margin: 20px 0">
    <h4 style="text-align: center">Latest News</h4>
<hr style="border: 0;height: 1px;background: linear-gradient(90deg, transparent, #00D9FF, transparent);margin: 20px 0">				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-1a9ff89 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="1a9ff89" data-element_type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-0535694 wpr-grid-columns-1 wpr-grid-columns--tablet2 wpr-grid-columns--mobile1 wpr-grid-pagination-center wpr-item-styles-inner elementor-widget elementor-widget-wpr-grid" data-id="0535694" data-element_type="widget" data-widget_type="wpr-grid.default">
				<div class="elementor-widget-container">
					<ul class="wpr-grid-filters elementor-clearfix wpr-grid-filters-sep-right"><li class=" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-fade"><span  data-filter="*" class="wpr-grid-filters-item wpr-active-filter "><i class=" wpr-grid-filters-icon-left"></i>All Posts<sup data-brackets="yes"></sup></span><em class="wpr-grid-filters-sep"></em></li><li class=" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-fade"><span   data-ajax-filter=["category","all-news"]  data-filter=".category-all-news"><i class=" wpr-grid-filters-icon-left"></i>News<sup data-brackets="yes"></sup></span><em class="wpr-grid-filters-sep"></em></li></ul><section class="wpr-grid elementor-clearfix" data-settings="{&quot;layout&quot;:&quot;masonry&quot;,&quot;stick_last_element_to_bottom&quot;:&quot;no&quot;,&quot;columns_desktop&quot;:&quot;1&quot;,&quot;gutter_hr&quot;:15,&quot;gutter_hr_mobile&quot;:15,&quot;gutter_hr_mobile_extra&quot;:15,&quot;gutter_hr_tablet&quot;:15,&quot;gutter_hr_tablet_extra&quot;:15,&quot;gutter_hr_laptop&quot;:15,&quot;gutter_hr_widescreen&quot;:15,&quot;gutter_vr&quot;:15,&quot;gutter_vr_mobile&quot;:15,&quot;gutter_vr_mobile_extra&quot;:15,&quot;gutter_vr_tablet&quot;:15,&quot;gutter_vr_tablet_extra&quot;:15,&quot;gutter_vr_laptop&quot;:15,&quot;gutter_vr_widescreen&quot;:15,&quot;animation&quot;:&quot;default&quot;,&quot;animation_duration&quot;:0.3,&quot;animation_delay&quot;:0.1,&quot;deeplinking&quot;:&quot;no&quot;,&quot;filters_linkable&quot;:&quot;no&quot;,&quot;filters_default_filter&quot;:&quot;&quot;,&quot;filters_count&quot;:&quot;yes&quot;,&quot;filters_hide_empty&quot;:&quot;yes&quot;,&quot;filters_animation&quot;:&quot;fade-slide&quot;,&quot;filters_animation_duration&quot;:0.3,&quot;filters_animation_delay&quot;:0.1,&quot;pagination_type&quot;:&quot;load-more&quot;,&quot;pagination_max_pages&quot;:11,&quot;lightbox&quot;:{&quot;selector&quot;:&quot;.wpr-grid-image-wrap&quot;,&quot;iframeMaxWidth&quot;:&quot;60%&quot;,&quot;hash&quot;:false,&quot;autoplay&quot;:&quot;true&quot;,&quot;pause&quot;:5000,&quot;progressBar&quot;:&quot;true&quot;,&quot;counter&quot;:&quot;true&quot;,&quot;controls&quot;:&quot;true&quot;,&quot;getCaptionFromTitleOrAlt&quot;:&quot;true&quot;,&quot;thumbnail&quot;:&quot;true&quot;,&quot;showThumbByDefault&quot;:&quot;true&quot;,&quot;share&quot;:&quot;true&quot;,&quot;zoom&quot;:&quot;true&quot;,&quot;fullScreen&quot;:&quot;true&quot;,&quot;download&quot;:&quot;true&quot;}}"><article class="wpr-grid-item elementor-clearfix post-13874 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-supply-chain-security"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/d6e6206f-2026-02_015.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/d6e6206f-2026-02_015.jpg" alt="Proactive Defense: Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions" class="wpr-anim-timing-ease-default" title="NTLM Phase-Out: Microsoft&#039;s 3-Stage Plan to Move Windows to Kerberos 3"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/open-vsx-pre-publish-security-checks/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 21, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-238" href="https://www.cyberpulseacademy.com/tag/supply-chain-security/">Supply Chain Security</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/open-vsx-pre-publish-security-checks/">Proactive Defense: Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13852 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-software-security"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/5705c8a4-2026-02_014.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/5705c8a4-2026-02_014.jpg" alt="CISA Flags Critical SolarWinds Web Help Desk RCE Bug Under Active Attack" class="wpr-anim-timing-ease-default" title="NTLM Phase-Out: Microsoft&#039;s 3-Stage Plan to Move Windows to Kerberos 4"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/solarwinds-web-rce-vulnerability/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 4, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-237" href="https://www.cyberpulseacademy.com/tag/software-security/">Software Security</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/solarwinds-web-rce-vulnerability/">CISA Flags Critical SolarWinds Web Help Desk RCE Bug Under Active Attack</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13828 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-artificial-intelligence"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/69824945-2026-02_013.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/69824945-2026-02_013.jpg" alt="DockerDash Vulnerability: Critical AI Flaw in Docker Desktop Enables Code Execution via Image Metadata" class="wpr-anim-timing-ease-default" title="NTLM Phase-Out: Microsoft&#039;s 3-Stage Plan to Move Windows to Kerberos 5"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/dockerdash-vulnerability-guide/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 3, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-143" href="https://www.cyberpulseacademy.com/tag/artificial-intelligence/">Artificial Intelligence</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/dockerdash-vulnerability-guide/">DockerDash Vulnerability: Critical AI Flaw in Docker Desktop Enables Code Execution via Image Metadata</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13274 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-cloud-computing"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/2e895a8b-2026-02_011.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/2e895a8b-2026-02_011.jpg" alt="When the Cloud Fails: Protecting Identity Systems from Widespread Outages" class="wpr-anim-timing-ease-default" title="NTLM Phase-Out: Microsoft&#039;s 3-Stage Plan to Move Windows to Kerberos 6"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/cloud-outage-identity-resilience/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 3, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-236" href="https://www.cyberpulseacademy.com/tag/cloud-computing/">Cloud Computing</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/cloud-outage-identity-resilience/">When the Cloud Fails: Protecting Identity Systems from Widespread Outages</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13272 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-open-source"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/76a46ad9-2026-02_012.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/76a46ad9-2026-02_012.jpg" alt="Metro4Shell Under Fire: How Attackers Exploit CVE-2025-11953 in React Native Tooling" class="wpr-anim-timing-ease-default" title="NTLM Phase-Out: Microsoft&#039;s 3-Stage Plan to Move Windows to Kerberos 7"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/metro4shell-rce-exploitation-guide/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 3, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-174" href="https://www.cyberpulseacademy.com/tag/open-source/">Open Source</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/metro4shell-rce-exploitation-guide/">Metro4Shell Under Fire: How Attackers Exploit CVE-2025-11953 in React Native Tooling</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13273 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-vulnerability"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/a8388a10-2026-02_010.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/a8388a10-2026-02_010.jpg" alt="APT28 Weaponizes Microsoft Office CVE-2026-21509: A Deep Dive into Operation Neusploit" class="wpr-anim-timing-ease-default" title="NTLM Phase-Out: Microsoft&#039;s 3-Stage Plan to Move Windows to Kerberos 8"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/apt28-cve-2026-21509-office-exploit/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 3, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-144" href="https://www.cyberpulseacademy.com/tag/vulnerability/">Vulnerability</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/apt28-cve-2026-21509-office-exploit/">APT28 Weaponizes Microsoft Office CVE-2026-21509: A Deep Dive into Operation Neusploit</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13276 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-artificial-intelligence"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/8d059fc3-2026-02_009.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/8d059fc3-2026-02_009.jpg" alt="Firefox’s One-Click AI Kill Switch: Master Your Generative AI Privacy" class="wpr-anim-timing-ease-default" title="NTLM Phase-Out: Microsoft&#039;s 3-Stage Plan to Move Windows to Kerberos 9"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/firefox-generative-ai-privacy-control/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 3, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-143" href="https://www.cyberpulseacademy.com/tag/artificial-intelligence/">Artificial Intelligence</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/firefox-generative-ai-privacy-control/">Firefox’s One-Click AI Kill Switch: Master Your Generative AI Privacy</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13275 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-malware"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/4939bab1-2026-02_008.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/4939bab1-2026-02_008.jpg" alt="Lotus Blossom&#8217;s Notepad++ Supply Chain Attack: A Deep Dive into the Chrysalis Backdoor" class="wpr-anim-timing-ease-default" title="NTLM Phase-Out: Microsoft&#039;s 3-Stage Plan to Move Windows to Kerberos 10"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/notepad-plus-plus-supply-chain-attack/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 3, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-147" href="https://www.cyberpulseacademy.com/tag/malware/">Malware</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/notepad-plus-plus-supply-chain-attack/">Lotus Blossom&#8217;s Notepad++ Supply Chain Attack: A Deep Dive into the Chrysalis Backdoor</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13277 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-malware"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/27e0de7e-2026-02_007.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/27e0de7e-2026-02_007.jpg" alt="341 Malicious ClawHub Skills Exposed in OpenClaw Supply Chain Attack" class="wpr-anim-timing-ease-default" title="NTLM Phase-Out: Microsoft&#039;s 3-Stage Plan to Move Windows to Kerberos 11"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/clawhub-malicious-skills-attack/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 2, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-147" href="https://www.cyberpulseacademy.com/tag/malware/">Malware</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/clawhub-malicious-skills-attack/">341 Malicious ClawHub Skills Exposed in OpenClaw Supply Chain Attack</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13278 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-vulnerability"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/cbb5b3e3-2026-02_006.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/cbb5b3e3-2026-02_006.jpg" alt="Critical OpenClaw Remote Code Execution: One-Click Exploit Puts AI Assistants at Risk" class="wpr-anim-timing-ease-default" title="NTLM Phase-Out: Microsoft&#039;s 3-Stage Plan to Move Windows to Kerberos 12"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/openclaw-remote-code-execution/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 2, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-144" href="https://www.cyberpulseacademy.com/tag/vulnerability/">Vulnerability</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/openclaw-remote-code-execution/">Critical OpenClaw Remote Code Execution: One-Click Exploit Puts AI Assistants at Risk</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article></section><div class="wpr-grid-pagination elementor-clearfix wpr-grid-pagination-load-more"><a href="https://www.cyberpulseacademy.com/tag/kerberos/feed/page/2/" class="wpr-load-more-btn" data-e-disable-page-transition>Load More</a><div class="wpr-pagination-loading"><div class="wpr-double-bounce"><div class="wpr-child wpr-double-bounce1"></div><div class="wpr-child wpr-double-bounce2"></div></div></div><p class="wpr-pagination-finish">End of Content.</p></div>				</div>
				</div>
					</div>
				</div>
				</div>
				</div>
						</div>
				</div>
		<div class="elementor-element elementor-element-6bb9c4e e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="6bb9c4e" data-element_type="container">
				<div class="elementor-element elementor-element-965c55d elementor-widget__width-inherit elementor-widget elementor-widget-html" data-id="965c55d" data-element_type="widget" data-widget_type="html.default">
				<div class="elementor-widget-container">
					<div class="donation-section">
        <div class="donation-card">
            <!-- header: shield + lock, cyber style -->
            <div class="donation-header">
                <h3>DONATE · SUPPORT</h3>
            </div>

            <div class="donation-message">
                <!-- honest, direct text – no fluff -->
                <div class="donation-text">
                    <i class="fas fa-bolt" style="margin-right: 10px;color: #0ff"></i> 
                    <strong>We keep threat intelligence free.</strong> No paywalls, no ads.  
                    Your donation directly funds server infrastructure, research, and tools.  
                    Every contribution - no matter the size - makes this platform sustainable.
                </div>

                <!-- brief, honest closing – human &amp; direct -->
                <div class="honest-note">
                    <i class="fas fa-hand-holding-heart" style="margin-left: 8px"></i>
                    100% of your support goes to the platform. No corporate sponsors, just the community.
                </div>
            </div>

            <!-- subtle terminal status -->
            <div style="position: absolute;bottom: 15px;right: 25px;font-size: 0.7rem;letter-spacing: 3px">
                <i class="fas fa-terminal"></i> ROOT::DONATE
            </div>
        </div>
    </div>				</div>
				</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-b15a33f e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="b15a33f" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-c39d379 elementor-widget elementor-widget-wpr-post-navigation" data-id="c39d379" data-element_type="widget" data-widget_type="wpr-post-navigation.default">
				<div class="elementor-widget-container">
					<div class="wpr-post-navigation-wrap elementor-clearfix wpr-post-nav-static-wrap wpr-post-nav-dividers"><div class="wpr-post-nav-prev wpr-post-navigation wpr-post-nav-static"><a href="https://www.cyberpulseacademy.com/mid-market-threat-lifecycle-protection/" class="elementor-clearfix"><div class="wpr-posts-navigation-svg-wrapper"><svg version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 291.4 512" style="enable-background:new 0 0 291.4 512;" xml:space="preserve"><g><path class="st0" d="M281.1,451.5c13.8,13.8,13.8,36.3,0,50.1c-13.8,13.8-36.3,13.8-50.1,0L10.4,281C3.5,274.1,0,265.1,0,256c0-9.1,3.5-18.1,10.4-25L231,10.4c13.8-13.8,36.3-13.8,50.1,0c6.9,6.9,10.4,16,10.4,25s-3.5,18.1-10.4,25L85.5,256L281.1,451.5z"/></g></svg></div><div class="wpr-post-nav-labels"><span>Previous Post</span></div></a></div><div class="wpr-post-nav-divider"></div><div class="wpr-post-nav-next wpr-post-navigation wpr-post-nav-static"><a href="https://www.cyberpulseacademy.com/openclaw-remote-code-execution/" class="elementor-clearfix"><div class="wpr-post-nav-labels"><span>Next Post</span></div><div class="wpr-posts-navigation-svg-wrapper"><svg style="transform: rotate(180deg); -webkit-transform: rotate(180deg);" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 291.4 512" style="enable-background:new 0 0 291.4 512;" xml:space="preserve"><g><path class="st0" d="M281.1,451.5c13.8,13.8,13.8,36.3,0,50.1c-13.8,13.8-36.3,13.8-50.1,0L10.4,281C3.5,274.1,0,265.1,0,256c0-9.1,3.5-18.1,10.4-25L231,10.4c13.8-13.8,36.3-13.8,50.1,0c6.9,6.9,10.4,16,10.4,25s-3.5,18.1-10.4,25L85.5,256L281.1,451.5z"/></g></svg></div></a></div></div>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-357bf18 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="357bf18" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-d1994e7 wpr-comment-reply-separate wpr-comment-reply-align-right elementor-widget elementor-widget-wpr-post-comments" data-id="d1994e7" data-element_type="widget" data-widget_type="wpr-post-comments.default">
				<div class="elementor-widget-container">
					<div class="wpr-comments-wrap" id="comments">	<div id="respond" class="comment-respond">
		<h3 id="wpr-reply-title" class="wpr-comment-reply-title">Leave a Comment <small><a rel="nofollow" id="cancel-comment-reply-link" href="/tag/kerberos/feed/#respond" style="display:none;">Cancel reply</a></small></h3><form action="https://www.cyberpulseacademy.com/comments/" method="post" id="wpr-comment-form" class="wpr-comment-form wpr-cf-style-6 wpr-cf-no-url" novalidate><p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message">Required fields are marked <span class="required">*</span></span></p><div class="wpr-comment-form-text"><textarea name="comment" placeholder="Message*" cols="45" rows="8" maxlength="65525"></textarea></div><div class="wpr-comment-form-fields"> <div class="wpr-comment-form-author"><input type="text" name="author" placeholder="Name*"/></div>
<div class="wpr-comment-form-email"><input type="text" name="email" placeholder="Email*"/></div>
</div>
<p class="form-submit"><input name="submit" type="submit" id="wpr-submit-comment" class="wpr-submit-comment" value="Submit" /> <input type='hidden' name='comment_post_ID' value='13279' id='comment_post_ID' />
<input type='hidden' name='comment_parent' id='comment_parent' value='0' />
</p><p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="377253398d" /></p><br /><div  class='g-recaptcha lz-recaptcha' data-sitekey='6Lc9PoMsAAAAAFp10uygUH8ZjhLtd9yoDUh1U9Rq' data-theme='light' data-size='normal'></div>
<noscript>
	<div style='width: 302px; height: 352px;'>
		<div style='width: 302px; height: 352px; position: relative;'>
			<div style='width: 302px; height: 352px; position: absolute;'>
				<iframe src='https://www.google.com/recaptcha/api/fallback?k=6Lc9PoMsAAAAAFp10uygUH8ZjhLtd9yoDUh1U9Rq' frameborder='0' scrolling='no' style='width: 302px; height:352px; border-style: none;'>
				</iframe>
			</div>
			<div style='width: 250px; height: 80px; position: absolute; border-style: none; bottom: 21px; left: 25px; margin: 0px; padding: 0px; right: 25px;'>
				<textarea name='g-recaptcha-response' class='g-recaptcha-response' style='width: 250px; height: 80px; border: 1px solid #c1c1c1; margin: 0px; padding: 0px; resize: none;' value=''>
				</textarea>
			</div>
		</div>
	</div>
</noscript><br><p style="display: none !important;" class="akismet-fields-container" data-prefix="ak_"><label>&#916;<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="127"/><script>document.getElementById( "ak_js_1" ).setAttribute( "value", ( new Date() ).getTime() );</script></p></form>	</div><!-- #respond -->
	</div>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-ba6c589 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="ba6c589" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-f2700f4 wpr-stt-btn-align-fixed wpr-stt-btn-align-fixed-right elementor-widget elementor-widget-wpr-back-to-top" data-id="f2700f4" data-element_type="widget" data-widget_type="wpr-back-to-top.default">
				<div class="elementor-widget-container">
					<div class="wpr-stt-wrapper"><div class='wpr-stt-btn' data-settings='{&quot;animation&quot;:&quot;fade&quot;,&quot;animationOffset&quot;:&quot;0&quot;,&quot;animationDuration&quot;:&quot;200&quot;,&quot;fixed&quot;:&quot;fixed&quot;,&quot;scrolAnim&quot;:&quot;800&quot;}'><span class="wpr-stt-icon"><i class="fas fa-arrow-circle-up"></i></span></div></div>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-a0b2c66 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="a0b2c66" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-aa3fc14 elementor-align-justify button-donate elementor-widget__width-initial elementor-fixed elementor-widget elementor-widget-paypal-button" data-id="aa3fc14" data-element_type="widget" data-settings="{&quot;_position&quot;:&quot;fixed&quot;,&quot;merchant_account&quot;:&quot;simple&quot;}" data-widget_type="paypal-button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
							<form action="https://www.paypal.com/cgi-bin/webscr" method="post" target="_blank">
			<input type="hidden" name="cmd" value="_donations" />
			<input type="hidden" name="business" value="marzouk.souhaieb@proton.me" />
			<input type="hidden" name="lc" value="US" />
			<input type="hidden" name="item_name" value="Cyber Pulse Academy Platform Donation" />
			<input type="hidden" name="item_number" value="" />
			<input type="hidden" name="currency_code" value="EUR" />
			<input type="hidden" name="amount" value="" />
			<input type="hidden" name="no_note" value="1">

					<button class="elementor-button elementor-size-sm elementor-paypal-legacy elementor-payment-button" role="button" type="submit">
					<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<i aria-hidden="true" class="fas fa-donate"></i>			</span>
									<span class="elementor-button-text">Donate Now</span>
					</span>
				</button>
				</form>
						</div>
								</div>
				</div>
					</div>
				</div>
				</div>
		]]></content:encoded>
					
					<wfw:commentRss>https://www.cyberpulseacademy.com/ntlm-phase-out-microsoft-plan/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
