<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Holger Rünkaru</title><description>Personal website of Holger Rünkaru - cybersecurity professional, speaker, and blogger.</description><link>https://runkaru.ee/</link><item><title>Device Code Flow — An Attack Vector That Bypasses MFA</title><link>https://runkaru.ee/en/blog/device-code-flow-attack-vector-that-bypasses-mfa/</link><guid isPermaLink="true">https://runkaru.ee/en/blog/device-code-flow-attack-vector-that-bypasses-mfa/</guid><description>How attackers exploit Microsoft&apos;s own legitimate authentication protocol to bypass MFA and gain long-term access to organizational data — and how to protect yourself.</description><pubDate>Sun, 01 Mar 2026 00:00:00 GMT</pubDate></item></channel></rss>