An attacker can send spam from compromised email accounts, deface web properties and host malicious content, install malware on compromised systems, exfiltrate sensitive data, and even commit identity theft.
An attacker can send spam from compromised email accounts, deface web properties and host malicious content, install malware on compromised systems, exfiltrate sensitive data, and even commit identity theft.