Double-Edged Sword: How Attackers Use the Same Cloud Infrastructure We Rely On Malicious actors are increasingly favoring partial use of cloud services rather than fully migrating their infrastructure.