Technology ❯ Cybersecurity ❯ Cyberattacks ❯ Hacking
The guidance follows evidence that attackers misused Microsoft Intune administrative powers by logging in with stolen credentials.