HP Wolf Security (@hpsecurity) 's Twitter Profile
HP Wolf Security

@hpsecurity

Insights, research, and analysis from the HP threat analyst team.

ID: 19126373

linkhttps://hp.com/wolf calendar_today17-01-2009 22:28:19

7,7K Tweet

22,22K Takipçi

789 Takip Edilen

HP Wolf Security (@hpsecurity) 's Twitter Profile Photo

Print security is climbing the agenda, driven by concerns around the dangers of ‘shadow printing’. HP continues to innovate the hardware portfolio, and has established a zero-trust print architecture (ZTPA) framework across its print offerings. Read more: quocirca.com/quocirca-print…

Print security is climbing the agenda, driven by concerns around the dangers of ‘shadow printing’. HP continues to innovate the hardware portfolio, and has established a zero-trust print architecture (ZTPA) framework across its print offerings.

Read more: quocirca.com/quocirca-print…
HP Wolf Security (@hpsecurity) 's Twitter Profile Photo

67% of organizations were affected by a #databreach due to unsecure printers last year. With print related data breaches costing over £1m on average, organizations need to to ensure that the printing process is secure from beginning to end. Read more: quocirca.com/quocirca-print…

67% of organizations were affected by a #databreach due to unsecure printers last year. With print related data breaches costing over £1m on average, organizations need to to ensure that the printing process is secure from beginning to end.

Read more: quocirca.com/quocirca-print…
HP Wolf Security (@hpsecurity) 's Twitter Profile Photo

Evidence of threat actors employing #GenAI to develop code for malware campaigns has been uncovered by HP Wolf Security. This is raising concerns of further diminishing barriers to entry for cybercrime which threatens organizational security. More: ow.ly/LenN50Tuqio

Evidence of threat actors employing #GenAI to develop code for malware campaigns has been uncovered by HP Wolf Security. 

This is raising concerns of further diminishing barriers to entry for cybercrime which threatens organizational security. More: ow.ly/LenN50Tuqio
HP Wolf Security (@hpsecurity) 's Twitter Profile Photo

Cybercriminals are abusing SVG scripting, commonly used in graphic design, to run malicious code. Opening the image causes the code to run, ultimately leading to multiple infostealers trying to infect the target PC. Learn more about the technique: ow.ly/2LZp50TurfT

Cybercriminals are abusing SVG scripting, commonly used in graphic design, to run malicious code. 

Opening the image causes the code to run, ultimately leading to multiple infostealers trying to infect the target PC. 

 Learn more about the technique: ow.ly/2LZp50TurfT
HP Wolf Security (@hpsecurity) 's Twitter Profile Photo

ChromeLoader campaigns are getting more polished, even employing code-signing certificates to bypass Windows security policies. Successful attacks take control of a user’s browser, redirecting searches to attack-controlled sites. Read more: ow.ly/wlWr50TuqyX

ChromeLoader campaigns are getting more polished, even employing code-signing certificates to bypass Windows security policies. 

Successful attacks take control of a user’s browser, redirecting searches to attack-controlled sites. Read more: ow.ly/wlWr50TuqyX
HP Wolf Security (@hpsecurity) 's Twitter Profile Photo

ChromeLoader isn’t new, but our latest Threat Insights Report shows that recent campaigns are much more polished. The malware hijacks web browser sessions, redirecting users to attacker-controlled sites. Read more in Forbes: forbes.com/sites/daveywin…

ChromeLoader isn’t new, but our latest Threat Insights Report shows that recent campaigns are much more polished. The malware hijacks web browser sessions, redirecting users to attacker-controlled sites.
 
Read more in <a href="/Forbes/">Forbes</a>: forbes.com/sites/daveywin…
HP Wolf Security (@hpsecurity) 's Twitter Profile Photo

HP’s Global Head of Security for Personal Systems, Ian Pratt, and Principal of Print Security, Steve Inch, spoke about how #AI can enhance endpoint security with Quocirca’s Louella Fernandes. Watch here to learn more: youtube.com/watch?v=3jF5vw…

HP’s Global Head of Security for Personal Systems, Ian Pratt, and Principal of Print Security, Steve Inch, spoke about how #AI can enhance endpoint security with Quocirca’s Louella Fernandes. Watch here to learn more: youtube.com/watch?v=3jF5vw…
HP Wolf Security (@hpsecurity) 's Twitter Profile Photo

Attackers are favoring script-based malware over malicious documents to infect endpoints, according to our Threat Insights Report. Many threat actors have shifted to using interpreted script languages like VBScript and JavaScript. More in Infosecurity Europe: infosecurity-magazine.com/news/threat-ac…

Attackers are favoring script-based malware over malicious documents to infect endpoints, according to our Threat Insights Report.

Many threat actors have shifted to using interpreted script languages like VBScript and JavaScript. More in <a href="/Infosecurity/">Infosecurity Europe</a>: infosecurity-magazine.com/news/threat-ac…
HP Wolf Security (@hpsecurity) 's Twitter Profile Photo

"At #BlackHat 2024, industry leaders shared their insights on the latest cybersecurity threats. HP Wolf Security’s Alex Holland detailed the rising threat of hardware and firmware tampering. Read more via @DZone: dzone.com/articles/beyon…"

"At #BlackHat 2024, industry leaders shared their insights on the latest cybersecurity threats.

HP Wolf Security’s Alex Holland detailed the rising threat of hardware and firmware tampering. Read more via @DZone: dzone.com/articles/beyon…"
HP Wolf Security (@hpsecurity) 's Twitter Profile Photo

#ChromeLoader campaigns posing as productivity applications are enabling attackers to hijack browser sessions and redirect users to malicious sites. Learn more in Forbes: forbes.com/sites/daveywin…

#ChromeLoader campaigns posing as productivity applications are enabling attackers to hijack browser sessions and redirect users to malicious sites. 

Learn more in <a href="/Forbes/">Forbes</a>: forbes.com/sites/daveywin…
HP Wolf Security (@hpsecurity) 's Twitter Profile Photo

Organizations are overlooking the importance of managing device #hardware and #firmware security. Learn the four steps companies can take to proactively manage device security via @Dark Reading: darkreading.com/vulnerabilitie…

Organizations are overlooking the importance of managing device #hardware and #firmware security. 

Learn the four steps companies can take to proactively manage device security via @Dark Reading: darkreading.com/vulnerabilitie…
HP Wolf Security (@hpsecurity) 's Twitter Profile Photo

With the lines between home and office blurring, organizations are facing more endpoint security risks that cybercriminals are keen to exploit. HP's Alex Holland explains how organizations can adapt and future-proof against these threats in CIO.com : global.resources.cio.com/resources/the-…

With the lines between home and office blurring, organizations are facing more endpoint security risks that cybercriminals are keen to exploit.

HP's Alex Holland explains how organizations can adapt and future-proof against these threats in <a href="/CIOonline/">CIO.com</a> : global.resources.cio.com/resources/the-…
HP Wolf Security (@hpsecurity) 's Twitter Profile Photo

Weak passwords can be broken fast, so make sure this #CyberAwarenessMonth users have strong passwords. Attackers don’t always have to break a password – they can steal it. Organizations need an extra layer of defense to prevent credential compromise: h20195.www2.hp.com/v2/getpdf.aspx…

Weak passwords can be broken fast, so make sure this #CyberAwarenessMonth users have strong passwords. 

Attackers don’t always have to break a password – they can steal it. Organizations need an extra layer of defense to prevent credential compromise: h20195.www2.hp.com/v2/getpdf.aspx…
HP Wolf Security (@hpsecurity) 's Twitter Profile Photo

Cybercriminals are spreading ChromeLoader malware that infects browsers, tricking users to install fake applications. Signing the malicious software installers with valid certificates makes the malware hard to detect. Read more via @BobbyHellard in ITPro itpro.com/security/cyber…

Cybercriminals are spreading ChromeLoader malware that infects browsers, tricking users to install fake applications. Signing the malicious software installers with valid certificates makes the malware hard to detect.

Read more via @BobbyHellard in <a href="/ITPro/">ITPro</a> itpro.com/security/cyber…
HP Wolf Security (@hpsecurity) 's Twitter Profile Photo

The growth of emerging technologies means that organizations have to defend themselves against threat actors. In this CIO.com webcast, HP’s Alex Holland explains how organizations can protect their workforce and data against cyber threats. Watch here: global.resources.cio.com/resources/the-…

The growth of emerging technologies means that organizations have to defend themselves against threat actors.

In this <a href="/CIOonline/">CIO.com</a> webcast, HP’s Alex Holland explains how organizations can protect their workforce and data against cyber threats.

Watch here: global.resources.cio.com/resources/the-…
HP Wolf Security (@hpsecurity) 's Twitter Profile Photo

Evidence uncovered by HP Wolf Security suggests cybercriminals are using #GenAI to generate malware code. Read more about the findings in @Security Week: securityweek.com/ai-generated-m…

Evidence uncovered by HP Wolf Security suggests cybercriminals are using #GenAI to generate malware code. 

Read more about the findings in @Security Week: securityweek.com/ai-generated-m…
HP Wolf Security (@hpsecurity) 's Twitter Profile Photo

Would you fall for a fake cookie banner that delivers XWorm malware? Learn more about this campaign and notable endpoint threats identified by HP Wolf Security in the June 2025 HP Wolf Security Threat Insights Report: threatresearch.ext.hp.com/hp-wolf-securi…

Would you fall for a fake cookie banner that delivers XWorm malware? Learn more about this campaign and notable endpoint threats identified by HP Wolf Security in the June 2025 HP Wolf Security Threat Insights Report: threatresearch.ext.hp.com/hp-wolf-securi…