Cyber Defense Advisors

Fake Browser Updates Used in Malware Distribution

Proofpoint have identified at least four distinct threat clusters