When Your Endpoints Get Compromised