Devdiscourse News Desk| California
Cybercriminals are chaining different combinations of attacks together to sneak past detection tools, according to HP Inc.'s quarterly HP Wolf Security Threat Insights Report.
The report, based on data gathered from millions of endpoints running HP Wolf Security, reveals several key findings:
Further, the HP Wolf Security Threat Insights Report details the diversification of attack methods by cybercriminal groups to evade detection and bypass security policies. Notable findings include:
"Today's attackers are becoming better organized and more knowledgeable. They research and analyze operating system internals, making it much easier for them to exploit the gaps. By knowing which doors to push, they can navigate internal systems with ease, using relatively simple techniques in very effective ways – without sounding the alarm," said Patrick Schläpfer, Senior Malware Analyst at the HP Wolf Security threat research team.
{{#Source}}{{Source}}{{/Source}}{{#IsBlog}}
{{Disclaimer}}
{{/Disclaimer}}