Exploits Explained: Comprehensive Exploit Prevention and Vendor Offerings

This PDF explains different exploits and mitigation techniques.

Exploits take advantage of weaknesses in legitimate software
products like Adobe Flash and Microsoft Office to infect computers
for criminal purposes. They’re commonly leveraged by cybercriminals
in order to penetrate organizations’ defenses. The objectives of
these criminals are diverse: stealing data or holding it for ransom,
performing reconnaissance, or simply as a means to deploy more
traditional malware.  
It’s common to find exploits used as part of cyber attacks: upwards
of 90% of reported data breaches find that an exploit is used at one or
more points in the attack chain. Including exploit prevention as part
of a comprehensive lineup of security defenses is clearly valuable.

 Where it mentions Sophos Intercept X, I believe it shares the same code as HitmanPro.Alert.

https://www.sophos.com/medialibrary/Gated%20Assets/white%20papers/Sophos-Comprehensive-Exploit-Prevention-wpna.aspx