<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>cybercrime.club</title><link>https://cybercrime.club/tags/kerberos/</link><description>Infrastructure security news for people who build infrastructure.</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Sun, 17 May 2026 10:00:00 -0400</lastBuildDate><atom:link href="https://cybercrime.club/tags/kerberos/" rel="self" type="application/rss+xml"/><item><title>NTLM Coercion's Quiet Resurgence: Why 2026's Zero-Click Attacks Look Like 2021</title><link>https://cybercrime.club/deep-dives/ntlm-coercion-resurgence-2026/</link><pubDate>Sun, 17 May 2026 10:00:00 -0400</pubDate><guid>https://cybercrime.club/deep-dives/ntlm-coercion-resurgence-2026/</guid><description>Two unrelated bugs in the last month — an incomplete APT28 patch and an unpatched RPC defect — both hand attackers a 1990s-era credential primitive. The fact that NTLM coercion still works in 2026 is not a series of accidents. It is the model.</description></item></channel></rss>