• Large number of in-the-wild exploits (300)
  • Diverse set of exploit kits (12)
  • Diverse set of exploits (10 different CVEs)
  • Internet Explorer, Firefox and Chrome exploits used
  • Large number of enterprise endpoint protection systems – 10 products in 14 different configuration
  • Use of in-the-wild in memory malware
  • Test with 0-day sample
  • Minimal delay between exploit acquire and test
  • Manual test and result analysis
  • Sponsored by Kaspersky Lab
Read Report