Hackers leveraging #Collection 1 dump to attack cloud applications

New research has revealed how hackers from various countries, especially China and Nigeria, have been leveraging credential dumps and legacy protocols to launch brute-force attacks on cloud applications such as Microsoft Office 365 and Google G Suite on a massive scale.