MRG Effitas 360 Assessment & Certification – Q4 2019 https://www.mrg-effitas.com/wp-content/uploads/2020/01/MRG_Effitas_2019Q4_360.pdf
Once again major players like Win Def, Avira, F-Secure and CrowdStrike failed to block a lot of the Exploit/Fileless malware samples. Perhaps itman can shed some light on this.
Appears the report Level classifications are screwed up. For example, WD missed Adware/PUA and Fileless/Eploit malware samples and was still certified at Level 1. Eset on the hand didn't miss any and was only certified at Level 2.
Yeah that's very odd. I'm also wondering what the difference between auto block and signature block means on the exploit test. Wouldn't a signature block be an auto block?
Performance test is complitly different to other tests, here windows defender is the best, kaspersky the worst. But they have to change metodology because Defender without fingerprint tecnology use a lot of disk while file transfert or opened and this impact performance and usability more than other actions.
One possibility is Eset detected one sample within the 24 hour re-scan interval. I do know that MRG penalizes for that although they consider it a detection overall. Appears the penalty is a bit heavy. Especially in light of the WD fileless/exploit malware misses.