Tactic continues recent trend by attackers to use trusted cloud services to send and host malicious content.

By admin