One of the most common attack vectors today is malicious code hidden in ordinary files uploaded to your cloud or on-prem storage drives. The attack is becoming successful when the malicious code arrives to the storage server and begins lateral movement, file extractions, or encrypting the targeted File Server/File repository.