InfoSec.Watch — Issue #124
This week’s brief is a reminder that identity-adjacent features and device-management control planes are still prime time for exploitation. When SSO becomes an alternate auth path, and MDM sits in front of your mobile fleet, patching is only step one — validation and hunt is step two.