. . . "Exploit kits used in such attacks exploits security vulnerabilities found in operating systems, Internet browsers, or other software." . .