Cybercriminals chaining different attack combinations together to evade detection: HP report

Devdiscourse News Desk| California

Updated: 24-08-2023 17:51 IST | Created: 24-08-2023 17:51 IST

Image Credit: Pexels

Cybercriminals are chaining different combinations of attacks together to sneak past detection tools, according to HP Inc.'s quarterly HP Wolf Security Threat Insights Report.

The report, based on data gathered from millions of endpoints running HP Wolf Security, reveals several key findings:

Further, the HP Wolf Security Threat Insights Report details the diversification of attack methods by cybercriminal groups to evade detection and bypass security policies. Notable findings include:

"Today's attackers are becoming better organized and more knowledgeable. They research and analyze operating system internals, making it much easier for them to exploit the gaps. By knowing which doors to push, they can navigate internal systems with ease, using relatively simple techniques in very effective ways – without sounding the alarm," said Patrick Schläpfer, Senior Malware Analyst at the HP Wolf Security threat research team.

READ MORE ON

AggahmalwareHP Wolf SecurityHP Wolf Security Threat Insights Report

READ MORE

OPINION / BLOG

LATEST NEWS

VIDEOS

View All