When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
“The target will connect directly to Google.”
Then, it will update the event description with new command output.
Hackers are increasingly using legitimate cloud services to deliver malware.
Some threat actors were observed creating files with malicious links and distributing them to peoples email inboxes this way.
As the emails came from Google, they bypassed email protection services.
ViaTheHackerNews