## Techniques which attackers use is to perform phishing attacks include using normally legal sites.
Using services that offer Cloud Storage services such as Google and Microsoft
Attackers aim to get users to click on Google or Microsoft disk addresses by downloading malicious files to the drive.
**Using services that allow creating free subdoma...
checkdisplay.hashnode.dev1 min read