
Revealing Weaknesses: How Attackers Exploit Google Looker Studio for Email Security Evasion
Cyberthreat Actors Exploiting Google Looker Studio for Phishing Attacks The Campaign Researchers at Check Point have discovered a significant business email compromise (BEC) campaign that exploits Google’s Looker Studio data-visualization tool. Over the past few weeks, attackers have been using the tool to create cryptocurrency-themed pages as part of a socially engineered attack. The campaign…