This is a dedicated watch page for a single video.
A malicious actor created a free trial account for a cloud service using a fake identity. Once the free trial cloud environment was up and running, he used it as a launch pad for several cloud-based attacks. Because he used a fake identity to set up the free trial, it would be difficult (if not impossible) for the attacks to be traced back to him. What type of cloud-based threat is being described here?