Threat actors have to host their malicious login stealing pages somewhere – why not in Amazon’s cloud:
Hiding a phishing attack behind the AWS cloud
Please Note:
I am on leave so the news this week is “in brief”. You can still contact me via the contact page and Octagon Technology.