Read Time:4 Second

Assuming the identity of a domain, threat actors could then execute arbitrary commands

Read More