2Data Breaches, Phishing, or Malware? Understanding Risks of Stolen Credentials [pdf] (opens in new tab)static.googleusercontent.com25706906c06c8y ago0