Read More 4 minute read Security JavaGhost Uses Amazon IAM Permissions to Phish Organizations Unit 42 uncovers JavaGhost’s evolving AWS attacks. Learn how this threat actor uses phishing, IAM abuse, and advanced… byDeeba AhmedMarch 4, 2025