Technology ❯ Cloud Computing ❯ Cloud Security ❯ Data Exfiltration
Microsoft details how identity sync abuse granted Global Admin control.