InfoSec.Watch - Issue #126
This week’s brief is a reminder that identity-adjacent features and device-management control planes are still prime time for exploitation. When SSO becomes an alternate auth path, and MDM sits in front of your mobile fleet, patching is only step one — validation and hunt is step two,