Agriculture is one of the hardest human activities to decarbonize; people must eat, but the land-use practices associated…
CED assistant professor uses virtual reality to advance research – Technology Org
Navigating a virtual world may seem like a scene from a science fiction movie, but for Jessica Fernandez,…
Scientists find 14 new transient objects in space by peering through a galaxy “magnifying glass” – Technology Org
An international team of scientists, led by University of Missouri’s Haojing Yan, used NASA’s James Webb Space Telescope…
New AI noise-canceling headphone technology lets wearers pick which sounds they hear – Technology Org
Most anyone who’s used noise-canceling headphones knows that hearing the right noise at the right time can be…
Weekly News for Designers № 719
Figma AI Updates to Elevate Your Design Workflow
Figma has shared some prototypes for platform updates that integrate AI. This Tuts+ article covers each of them to explore their possibilities.
State of Brand Report 2023
Discover key insights into the trends, challenges and strategies of branding this year.
Internet Artifacts
Explore artifacts from the early days of the internet right up until the present day.
Naming Variables In CSS
Some collected thoughts from Jonathan Dallas related to naming CSS Custom Properties.
The Negative Impact of Mobile-First Web Design on Desktop
Mobile-first web designs cause significant usability issues when viewed on desktop.
Free T-Shirt Mockup Templates for Photoshop
These free realistic iPhone mockup templates are perfect for showcasing the UI or UX of your mobile app design or responsive website.
Introducing Learn Performance Course
This is new and free course is intended for those that care about web performance, but may be just beginning to get familiar with it.
It’s 2023, Here is Why Your Web Design Sucks
Heather Buchel explores the reasons why we no longer have web designers.
The 2023 Design Tools Survey
This survey gathers usage data from thousands of designers each year and many of the design companies you know use this data to better understand and improve the design tools industry.
CSS & JavaScript Snippets for Creating Notification UIs
A collection of CSS and JavaScript code snippets for creating unique notification and alert systems and UIs.
Image Layer Animations with Clip-Path
Some ideas for speedy page transition animations with layered images using clip-path.
Common Questions About Interpreting Page Speed Reports
Take a closer look at how various performance tools audit and report on performance metrics, such as core web vitals.
Geist Font
A new and free typeface that has been specifically designed for developers and designers.
Photoshop Action Sets for Cinema & Movie Effects
A collection of one-click cinema & movie effect Photoshop action sets that will take your photos to the next level.
Kerberoasting attack technique explained and prevention tips

EXECUTIVE SUMMARY:
A wave of Kerberoasting attacks is stirring up cyber security concerns.
In the last 12 months, cyber security researchers have observed a 583% surge in this attack type — a worrying trend, especially since the attacks can be deployed in tandem with ransomware, leading to devastating consequences for targeted organizations.
Among cyber criminals, the appeal of Kerberoasting attacks lies in their potential to deliver comprehensive access to an organization’s entire IT infrastructure.
What is Kerberoasting?
Kerberoasting is a privilege escalation attack. At its core, Kerberoasting exploits vulnerabilities in the Kerberos authentication protocols utilized by Windows devices to gain access to IT environments; based on service principle names (SPNs).
Developed at MIT in the 1980s, the Kerberos authentication protocol aimed to facilitate secure identity verification without transmitting plaintext passwords over a network. Over time, the protocol became the default authentication mechanism for operating systems.
Kerberoasting origins
This attack vector isn’t new (it’s been extant since 2014). The first known Kerberoasting attacks focused on government agencies and financial institutions. Eventually, this attack type declined in popularity among hackers.
However, recent observations indicate a resurgence, driven by weaknesses inherent in the complexity of modern computing infrastructure. Most recently, state-backed cyber criminals leveraged Kerberoasting in a series of supply chain attacks.
Kerberoasting has also been observed in connection with other attack types, like ransomware and data exfiltration.
The ”Vice Spider” crime group
One cyber crime crew in particular has made extensive use of the technique. Known as “Vice Spider,” these hackers are thought to be accountable for nearly 30% of all observed Kerberoasting-related network intrusions.
How Kerberoasting attacks work
Typically, cyber criminals who deploy Kerberoasting attacks aim to gain control of a network’s service accounts by interacting with a domain controller’s ticket-granting server service. They use an authenticated account and then request service tickets associated with SPNs connected to vulnerable accounts.
The service tickets contain encrypted data. Offline, the attackers subsequently break through the encryption to reveal plain-text passwords, providing them with unfettered access to critical systems.
Why Kerberoasting attacks work
Among cyber criminals, Kerberoasting attacks are lauded for their stealth. These attacks operate without generating any noticeable alerts or conspicuous activities within the network.
Cyber criminals launching Kerberoasting attacks are also starting to incorporate automation within attack techniques. As a result, Kerberoasting attacks can be challenging to detect and tough to mitigate.
Kerberoasting attack prevention tips
To counter the growing risk posed by Kerberoasting attacks, a multi-layered cyber security strategy is a must.
- Strengthening password policies for both service and user accounts is crucial, as weak passwords often facilitate the success of these attacks.
- Cyber security professionals also need to recognize Kerberoasting attack indicators, such as unusual service ticket requests, failed login or unauthorized access attempts and unusual network traffic patterns.
- Further, organizations can enhance their security by adopting encryption for network traffic, helping to thwart attackers who try to intercept and expose sensitive information.
For more insights into safeguarding your digital assets and maintaining cyber resilience, please check out this Cyber Talk sponsored eBook and see CyberTalk.org’s past coverage. Lastly, to receive timely cyber security insights and cutting-edge analyses, please sign up for the cybertalk.org newsletter.
iodyne Pro Data – Fast SSD RAID for Video Editing Explained – Videoguys

Jürgen Moors’ CineD article delves into the cutting-edge iodyne Pro Data, an ultra-fast Thunderbolt SSD RAID storage solution tailored for seamless video editing. The piece not only explores the device’s exceptional features but also sheds light on the recent enhancements introduced through the 1.3 firmware update. Available in three capacities – 12TB, 24TB, and 48TB – the Pro Data system boasts lightning-fast performance at 5GB/s, enabling it to effortlessly handle tasks like playing back up to 10 streams of 8K simultaneously.
[embedded content]
The article emphasizes the Pro Data’s unique position in the market, showcasing unparalleled performance and the capability to facilitate real-time data sharing among multiple users collaborating on the same project. While acknowledging other storage alternatives, such as SSDs or NAS, may be more budget-friendly, the article underscores the Pro Data system’s standout features and its potential for transformative impact in professional video editing workflows.
Crucially, the article notes that the Pro Data currently caters to Apple users but reveals iodyne’s ongoing efforts to develop Windows and Linux-compatible versions. The piece outlines key features, including transactional RAID-6 and RAID-0, data checksums, self-healing mechanisms, and robust encryption, ensuring data security with XTS-AES-256 encryption and a hardware secure enclave. Noteworthy capabilities such as NVMe Thunderbolt multipathing, multi-user connectivity, and dynamic containers with up to 15 containers per device further enhance the Pro Data’s appeal.
Pro Data – Key Features
- Transactional RAID-6 and RAID-0
- Data Checksums and Self-Healing
- XTS-AES-256 Encryption with Hardware Secure Enclave
- NVMe Thunderbolt Multipathing up to 4 x paths
- Multi-User connectivity for up to 4 x computers
- Storage Handoff between connected macOS computers
- Dynamic Containers with up to 15 containers per device
- RAID Levels per-Container with adaptive striping and parity
- Automatic SSD Fault Management and RAID Resilvering
- Designed for Self-Repair of SSD modules
Technical Data
- Capacity: 12TB, 24TB, or 48TB
- Expansion: Up to 6 devices can be daisy-chained per Thunderbolt port pair. Multiple daisy chains can be created on computers that provide more than one Thunderbolt host port.
- Performance: Up to 5 GB/s
- Connectivity: 8× 40Gb Thunderbolt3 ports: 4 upstream to one or more computers, 4 downstream to other devices and accessories
- Cables: 0.7m/2,3ft 40Gb included. 2m/6,6ft or 50m/164ft 40Gb available
- OS Support: macOS 11.0+ (Big Sur, Monterey, Ventura)
- Power: 180W GaN power adapter, 110-220V 50-60Hz
- Dimensions: 39,1×25,4×3,1cm / 15.39x10x1.22in
- Weight: 3,3kg / 7,3lbs
In essence, Jürgen Moors’ article serves as a valuable resource for anyone navigating the landscape of high-performance storage solutions, particularly those aimed at elevating video editing experiences.
Read the full article by Jürgen Moors for CineD HERE
Learn more about iodyne Pro Data HERE