How did attackers use Microsoft Intune? #tech

Important cybersecurity news update

What investigators say happened Security researchers and reporting indicate the intrusion leveraged a device management channel to amplify the impact inside a global corporate network. According to public reporting, the attackers issued a remote wipe command …