• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
windows 11 to deprecate ntlm, add ai powered app controls and

Windows 11 to Deprecate NTLM, Add AI-Powered App Controls and Security Defenses

You are here: Home / General Cyber Security News / Windows 11 to Deprecate NTLM, Add AI-Powered App Controls and Security Defenses
May 21, 2024

Microsoft on Monday verified its plans to deprecate NT LAN Supervisor (NTLM) in Windows 11 in the next 50 percent of the year, as it introduced a slew of new security measures to harden the greatly-employed desktop working system.

“Deprecating NTLM has been a enormous ask from our security neighborhood as it will strengthen consumer authentication, and deprecation is planned in the 2nd 50 % of 2024,” the tech huge claimed.

The Windows maker initially announced its choice to drop NTLM in favor of Kerberos for authentication in Oct 2023.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


NTLM’s deficiency of guidance for cryptographic methods such as AES or SHA-256 notwithstanding, the protocol has also been rendered inclined to relay attacks, a technique that has been extensively exploited by the Russia-connected APT28 actor by means of zero-working day flaws in Microsoft Outlook.

Other changes coming to Windows 11 include things like enabling Regional Security Authority (LSA) protection by default for new purchaser units and the use of virtualization-centered security (VBS) to protected Windows Hi there technology.

Sensible App Management, which shields customers from jogging untrusted or unsigned applications, has also been upgraded with an synthetic intelligence (AI) model to decide the basic safety of applications and block individuals that are unfamiliar or comprise malware.

Cybersecurity

Complementing Intelligent Application Manage is a new conclude-to-end resolution called Trusted Signing that lets developers to signal their apps and simplifies the whole certificate signing method.

Some of the other noteworthy security improvements are as follows –

  • Acquire32 application isolation, which is designed to have harm in the occasion of an software compromise by generating a security boundary concerning the software and the functioning program
  • Limit abuse of admin privileges by requesting for user’s specific approval
  • VBS enclaves for 3rd-party builders to develop reliable execution environments

Microsoft further more claimed it can be producing Windows Guarded Print Method (WPP), which it unveiled in December 2023 a way to counter the challenges posed by the privileged Spooler process and safe the printing stack, the default print mode in the potential.

In executing so, the strategy is to operate the Print Spooler as a restricted company and dramatically limit its appeal as a pathway for risk actors to acquire elevated permissions on a compromised Windows procedure.

Redmond also claimed it will no longer rely on TLS (transport layer security) server authentication certificates with RSA keys fewer than 2048 bits because of to “improvements in computing electric power and cryptanalysis.”

Capping off the listing of security capabilities is Zero Belief Area Title Procedure (ZTDNS), which aims to assist professional buyers lock down Windows in their networks by natively limiting Windows gadgets to connect only to accepted network destinations by domain name.

Cybersecurity

These enhancements also stick to criticism of Microsoft’s security methods that authorized country-state actors from China and Russia to breach its Trade Online environment, with a latest report from the U.S. Cyber Basic safety Overview Board (CSRB) noting that the company’s security culture necessitates an overhaul.

In reaction, Microsoft has outlined sweeping alterations to prioritize security previously mentioned all else as aspect of its Secure Future Initiative (SFI) and maintain senior leadership right accountable for assembly cybersecurity targets.

Google, for its part, explained the CSRB report “underscores a long overdue, urgent require to adopt a new solution to security,” contacting on governments to procure systems and solutions that are secure-by-design, implement security recertifications for solutions struggling key security incidents, and be knowledgeable of hazards posed by monoculture.

“Making use of the very same vendor for running methods, email, place of work software, and security tooling […] raises the risk of a single breach undermining an complete ecosystem,” the organization reported.

“Governments should really adopt a multi-vendor tactic and acquire and promote open specifications to be certain interoperability, creating it less complicated for businesses to replace insecure products with all those that are more resilient to attack.”

Identified this posting exciting? Stick to us on Twitter  and LinkedIn to examine far more unique written content we publish.


Some sections of this report are sourced from:
thehackernews.com

Previous Post: «nextgen healthcare mirth connect under attack cisa issues urgent NextGen Healthcare Mirth Connect Under Attack – CISA Issues Urgent Warning
Next Post: Researchers Uncover Flaws in Python Package for AI Models and PDF.js Used by Firefox researchers uncover flaws in python package for ai models and»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.