Instead of the usual phishing email or fake download page, attackers are using Google Forms to kick off the infection chain.
Some results have been hidden because they may be inaccessible to you
Show inaccessible resultsSome results have been hidden because they may be inaccessible to you
Show inaccessible results