Answer:
Attackers use compromised accounts for further credential harvesting by accessing stored passwords on those accounts.
Attackers use compromised accounts for further credential harvesting by accessing stored passwords on those accounts.
You may be interested in:
Web Security MCQs - PART 2