How Threat Actors Abuse Legitimate Sites to Bypass Security Defenses