According to a report by Check Point, attackers are increasingly leveraging public cloud services to share malicious documents or phishing pages which collect login details. This includes the use of Google Drive but also Microsoft Azure, Microsoft Dynamics and IBM Cloud, finds Bleeping Computer.