picus-logo-org
ASSUME BREACH SERIES

Episode 2: The Hidden Threat Kerberoasting

Adventures of Picus and Max continues. In this episode, Picus Woodpecker adeptly illustrates to Max the significant impact of Kerberoasting attacks, even within organizations demonstrating high levels of cybersecurity maturity. Additionally, the discussion provides insights into the root causes of this vulnerability and outlines effective mitigation strategies.

mid-strip-gray-mobile mid-strip-gray

See Kerberoasting In Action

All Episodes

ep1-3

 

ep2-Dec-06-2024-05-34-13-8034-PM

 

pls-pass-the -ticket-apv-coming-soon

 

pls-apv-ldap-coming-soon

 

TALK TO A RED TEAM EXPERT

Validate Paths to Critical Assets

Choose a time that works for you to explore how our platform identifies Kerberoastable users and helps protect against advanced threats.