March 1, 2026 Device Code Flow — An Attack Vector That Bypasses MFA How attackers exploit Microsoft's own legitimate authentication protocol to bypass MFA and gain long-term access to organizational data — and how to protect yourself.