Imagine this -- you’re looking to harvest a bunch of cloud-storage user credentials through a phishing campaign. Your email is perfect, domains registered and now all you have left to do is make a copy of your target’s web page, modify the POST script and hit send. Within minutes, you are collected credentials and your campaign is a success.
This process may sound complicated, but it’s not. Attackers can easily copy your