Smooth criminals talking their way into cloud environments, Google says
Voice phishing surged last year to become the second most common method used by cybercriminals to gain initial access to their victims' IT estate - and the No. 1 tactic used when breaking into cloud environments....