In most organizations, it is common to find anti-virus installed in order to prevent virus and malicious software from running and IDS\IPS\Firewall installed in order to identify attacks and exploits while Kerberos and encapsulated sub protocols within are being neglected. The reason sub-protocols receive no attention is because the data is inaccessible. In this paper we will unveil the potential risk hiding in hidden parts of Kerberos using decryption to bridge the gap between attackers and the defenders, providing a real view into active attacks that leverage Kerberos as a means to conceal malicious activity and lateral movement.
Recommended for You

Learn how to protect employees’ passwords to applications containing sensitive resources.

This whitepaper explains the importance of CyberArk EPM use cases including removing local admin rights and reducing least privilege.

Learn about the importance of cloud Identity Security and how a pragmatic, holistic approach can help secure your cloud environments.

Learn about four ways you can secure employees’ passwords with enterprise-grade controls.

Learn how to assess and reduce password-related risks with a three-step strategic guide for IT and security leaders.

Learn how to protect employees’ passwords to applications containing sensitive resources.

Learn about best practices for storing, sharing, creating and managing employees’ passwords with security-first controls.

Endpoint threat detection and response tools aren’t the panaceas for protecting organizations from ransomware and other cybersecurity risks. And the back actors know this. They routinely exploit privi

How CyberArk Endpoint Privilege Manager for Linux helps IT administrators discover command usage in their environment.

Security practitioners must remove local admin rights for security, balanced by a frictionless user experience.

Learn how CyberArk Secrets Hub works with AWS Secrets Manager to enhance secrets management without interrupting developer workflows.

Read our best practices for providing secure, frictionless access for partners, vendors, clients and more, as they use your applications.

Conceived in response to several widely publicised and damaging cyberattacks, the NIS2 Directive strengthens security requirements, streamlines reporting obligations and introduces more stringent

This article highlights some of the trends driving the need to secure all identities with intelligent privilege controls and explains what they are. Read more.

Read about four security layers to help you defend against threats, as the nature of privilege evolves.

Governments around the world are enacting stronger cybersecurity mandates in which Zero Trust features as a central theme. Eighty-eight percent of security leaders agree that

Learn about Identity Management best practices — from granting, adjusting and revoking authorizations to complying with audits – to help you secure all types of identities.

EDR isn’t designed with privileged attackers in mind and leaves security gaps against cyberthreats. CyberArk Endpoint Privilege Manager helps defend against attacks by removing local admin rights.

Explore cloud privilege security best practices and learn how to accelerate your journey into the cloud with Identity Security success.

Learn how to extend least privilege and privilege access management to the public cloud with the help of CyberArk.