The Good, the Bad and the Ugly: Watermarks, Transferable Attacks and Adversarial Defenses