You just read:

CyActive Analysis Reveals Staggering 35 Reused Components in Top Five Malware Attacks of 2014

News provided by

CyActive

Dec 16, 2014, 06:00 ET