Uncategorized Legacy protocols used to bypass Microsoft 365 MFA Author Adrian Bole Date September 22, 2020 Vulnerabilities in a legacy protocol and Identity Provider Solutions can be exploited by attackers...