Endpoint Advanced Protection Buyer’s Guide: The Attacks