You just read:

CyActive Analysis Reveals Staggering 35 Reused Components in Top Five Malware Attacks of 2014

News provided by

CyActive

16 Dec, 2014, 11:00 GMT