Home SecurityHacking Cloud squatting: How attackers can use deleted cloud assets against you