What investigators say happened Security researchers and reporting indicate the intrusion leveraged a device management channel to amplify the impact inside a global corporate network. According to public reporting, the attackers issued a remote wipe command …
How did attackers use Microsoft Intune? #tech
Important cybersecurity news update