THREAT RePort Executive Summary 3 About The Report 5 Web Threats 6 Legitimate Sites Serving Malware 9 Malware Hosting 10 Web Threat Victims 11 Security Blog Highlights 11…