Fig 1 Turla backdoor timeline | WeLiveSecurity

Fig 1 Turla backdoor timeline

Figure 1 – Turla Outlook backdoor timeline