Based on telemetry gathered by Sophos researchers,” the ... could have enabled attackers to bypass this additional layer of authentication protection and gain unauthorized access to users ...