Authentication coercion remains a potent attack vector in Windows environments, enabling attackers with even low-privileged domain accounts to force targeted systems, often high-value servers or domain controllers, to authenticate to attacker-controlled hosts. This technique is closely tied to NTLM and Kerberos relay attacks, where the coerced authentication session is intercepted and relayed to other services, […]The post Windows Authentication Coercion Attacks Present Major Risks to Enterprise Networks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.