Based on telemetry gathered by Sophos researchers,” the ... could have enabled attackers to bypass this additional layer of authentication protection and gain unauthorized access to users ...
Some results have been hidden because they may be inaccessible to you