Technology ❯ Cybersecurity ❯ Threat Actors ❯ Operational Tactics
Microsoft details how identity sync abuse granted Global Admin control.