To be clear: the phone is from 2015, not the exploit chain.
Related: https://cloud.google.com/blog/topics/threat-intelligence/cor...
[flagged]
[flagged]