Threat landscape in November 2022

0
tested
solutions
0
unique
SAMPLES
0
malware hosted over HTTP
0
malware hosted over HTTPS
0
average malicious changes [1]
0 %
PRE-LAUNCH level prevention
0 %
POST-LAUNCH level protection
0 %
average blocked malware [2]

[1] The number of harmful changes made to Windows during dynamic analysis of the malware sample.
[2] Average blocking of malware by all tested solutions, regardless of level of prevention or protection.
Remember! HTTPS protocol can be used to host malware!
SSL certificate and the so-called padlock at the web address does not certify safety of the website.

TOP 3

HIJACKED SERVERS LOCATION

0
0
0

TOP 3

TLD COMPROMISED DOMAINS

0

.com

0

.cloud

0

.net

0

DOMAINS WITH MALICIOUS FILES

0

IP ADDRESSES WITH MALICIOUS FILES

Malware Comparison Table in November 2022

The following summary shows a comparison of tested solutions to protect workstations against malware. We encourage you to become familiar with a detailed description and read our testing methodology in order to understand the results.

PRE-LAUNCH: The classification concerns detecting malware samples before they are launched in the system.
POST-LAUNCH: The analysis level, i.e. a virus has been run and blocked by a tested product.
FAIL: The failure, i.e. a virus hasn’t been blocked and it has infected a system.
Sandbox Column: Number of indicators, i.e. malicious changes made to the system without the anti-virus installed.

Tests