Multi-Factor Authentication (MFA) is rightfully considered a strong technical control for protecting against credential theft. Yet this Zero Trust building block is also susceptible to weak points. When implemented incorrectly, it can become compromised and used in the attack chain. In this session, the CyberArk Red Team will demonstrate several attacks performed against MFA during real adversarial simulation engagements last year.