Site icon The IT Nerd

Cyber Ad-versaries Using Analytics to Measure “Victims per Click” Says HP

Advertisements

HP Inc. today issued its quarterly HP Wolf Security Threat Insights Report, showing attackers are continuing to find innovative ways to influence users and infect endpoints. The HP Wolf Security threat research team uncovered several notable campaigns including:

By isolating threats that have evaded detection tools on PCs – but still allowing malware to detonate safely – HP Wolf Security has specific insight into the latest techniques used by cybercriminals in the fast-changing cybercrime landscape. To date, HP Wolf Security customers have clicked on over 40 billion email attachments, web pages, and downloaded files with no reported breaches. 

The report details how cybercriminals continue to diversify attack methods to bypass security policies and detection tools. Other findings include:

HP Wolf Security runs risky tasks in isolated, hardware-enforced virtual machines running on the endpoint to protect users, without impacting their productivity. It also captures detailed traces of attempted infections. HP’s application isolation technology mitigates threats that can slip past other security tools and provides unique insights into intrusion techniques and threat actor behavior. 

About the data

This data was gathered from consenting HP Wolf Security customers from October-December 2023

Exit mobile version