Threat actors seen abusing AWS misconfigurations to gain access to the instances They would use the instances to create new SES and WorkMail services The emails would bypass email security, while ...