Packet Protector

PP096: Taking Note of a Notepad++ Attack; Telnet and NTLM Are Still a Thing?

Feb 10, 2026
A roundup of high-risk supply-chain and software compromises, including a Notepad++ hosting breach and remediation steps. Discussion of a decade-old Telnet exploit targeting internet-facing devices. Coverage of Microsoft’s multi-year plan to retire NTLM and migration suggestions. Reports on voice-phishing toolkits that relay MFA, shadow AI risks from unapproved tools, and exposed API tokens fueling attacks.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ADVICE

Harden OT Edge Devices And Enforce MFA

  • Enforce MFA on VPN concentrators and avoid password reuse to protect OT/critical infrastructure.
  • Disable default accounts and services like FTP on vendor OT gear and apply vendor hardening guidance promptly.
ADVICE

Audit NTLM Now And Migrate To Kerberos

  • Audit your environment for NTLM usage and plan to migrate to Kerberos where possible.
  • Use Microsoft's phased disabling roadmap and policy settings to avoid unexpected breaks during migration.
ADVICE

Defend Against Vishing With Clear Callback Processes

  • Warn users about vishing campaigns and publish a clear help-desk callback process to avoid social-engineering traps.
  • Advise users to hang up on unsolicited support calls and use official channels to request callbacks.
Get the Snipd Podcast app to discover more snips from this episode
Get the app