Co-authored by Ghanashyam Satpathy and Jenko Hwong
Summary
Attackers have long used phishing emails with malicious Microsoft Office documents, often hosted in popular cloud apps like Box and Amazon S3 to increase the chances of a successful lure. The techniques being used with O