How Attackers Bypass Synced Passkeys

The following is in relation to synced passkeys
Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to deploy synced passkeys
How Attackers Bypass Synced Passkeys
Synced passkeys expose enterprises to cloud takeover, browser hijacks, and downgrade attacks.

So dont use them
#enoughsaid