The attackers used a combination of Android, Chrome, and Windows vulnerabilities, including both zero-days and n-days exploits.
The attackers used a combination of Android, Chrome, and Windows vulnerabilities, including both zero-days and n-days exploits.
Comments are closed.