This part discusses how cyber actors are expanding their targeting to include a broader range of cloud services and accounts, including service and dormant accounts.