Bypassing Microsoft Intune Compliant Device Conditional Access Requirements Using TokenSmith
How adversaries exploit Intune’s Company Portal to obtain access tokens and bypass Microsoft’s compliant device conditional access controls.

This article is coming 20/10/2025. Keep an eye out, and subscribe to the blog to be announced.




