Malicious actors are utilizing overdue invoice lures, open redirects and LotL tactics in order to bypass cybersecurity defenses.