Analysis of exploits in the wild. Or: do Cybersecurity Standards Make Sense?