Attackers are able to amortize the cost of exploit, malware, and infrastructure development across many targets.— Alex Stamos
Attackers are able to amortize the cost of exploit, malware, and infrastructure development across many targets.