Threat actors use the Google computing platform (GCP) to deliver the malware through malicious PDF files. The attack targeted governments…
Cybercriminals abusing legitimate Google Cloud Storage services to host the malicious payload and delivered to compromise the organization networks through…