Articles about HP

HPE launches new virtual private cloud solution

Hewlett Packard Enterprise (HPE) is launching an expansion of its HPE Aruba Networking Central AI-powered network management solution, including a virtual private cloud environment.

This is aimed at customers who want the agility of cloud but with specific data security, data control or regulatory requirements, and an on-premises option that can operate while being disconnected from the cloud.

Continue reading

Gotcha CAPTCHAs being used to spread malware

We've all become used to completing tests to prove we're not robots, but a new report from HP Wolf Security highlights the rising use of fake CAPTCHA verification tests which allow threat actors to trick users into infecting themselves.

The technique shows attackers are capitalizing on people's increasing familiarity with completing multiple authentication steps online -- a trend HP describes as 'click tolerance'.

Continue reading

Perilous as a picture -- attackers sneak malware into website images

A new report from HP Wolf Security reveals that attackers are hiding malicious code in images on file hosting websites like archive.org, as well as using the same loader to install the final payload.

These techniques help attackers avoid detection, as image files appear benign when downloaded from well-known websites, bypassing network security like web proxies that rely on reputation.

Continue reading

HP offers enhanced protection for enterprise endpoints

The rise of remote and hybrid work has increased the risk of PCs being compromised by attackers with brief physical access, underscoring the need for protection and visibility into the integrity of devices throughout their lifetimes.

To combat this, HP is launching a new HP Enterprise Security Edition, a unique suite of capabilities designed to enhance the physical security of PC endpoints.

Continue reading

Attackers use GenAI to write malicious code

The latest threat insights report from HP Wolf Security has identified a new campaign using malware believed to have been written with the help of GenAI.

Analysis of the campaign, targeting French-speakers using VBScript and JavaScript, finds the structure of the scripts, comments explaining each line of code, and the choice of native language function names and variables are strong indications that the threat actor used GenAI to create the malware.

Continue reading

Cyber 'ad-versaries' adopt professional marketing techniques

A new report from HP Wolf Security shows cybercrime groups are using professional advertising tools to optimize their malware campaigns and convince users to take the bait.

The report identifies the DarkGate campaign which uses ad tools to sharpen attacks. Malicious PDF attachments, posing as OneDrive error messages, direct users to sponsored content hosted on a popular ad network. This leads to DarkGate malware which hands backdoor access to cybercriminals into networks, exposing victims to risks like data theft and ransomware..

Continue reading

HP CEO explains why the company is bricking third-party ink printers

Printer owners have several options when it comes to supplying their printers with ink. The two main choices are to buy first-party or third-party printer ink. The former is official, the latter less expensive. Both options work well, provided that manufacturers do not manipulate printers to block support for third-party ink cartridges.

Printer manufacturers like HP have a vested interest that customers purchase first-party printer ink or, even better, subscribe to printing plans. HP CEO Enrique Lores confirmed to CNBC Television that HP loses money with each printer sold and that the company makes money with printer ink sales and subscriptions.

Continue reading

Malware 'meal kits' give attackers the ingredients to bypass detection

A new report from HP Wolf Security reveals cybercriminal marketplaces offering low-level attackers the tools needed to bypass detection and infect users in the form of so-called 'meal kits'.

These are pre-packaged malware kits which give low-level attackers all the ingredients to evade detection tools, making it easier for them to breach organizations and steal sensitive data.

Continue reading

Three-quarters of organizations struggle with remote work challenges

The shift to remote and hybrid working models has magnified IT operational challenges for 75 percent of organizations.

A new study by Forrester Consulting for HP surveyed over 300 IT and security decision makers and finds the main challenges companies face when managing remote endpoints are ensuring data security (60 percent), keeping software on remote devices up to date (55 percent), and maximizing the accuracy of asset databases (55 percent).

Continue reading

Illuminate your Windows 11 experience with Dynamic Lighting

As technology continues to evolve, so do the ways in which we interact with our devices. The integration of "Red, Green, Blue" (RGB) lights within various gadgets has opened up a realm of personalization, allowing users to create unique environments that extend beyond the screen. Microsoft has recognized this trend and with its latest feature update, unleashes the power of Dynamic Lighting on Windows 11.

The Dynamic Lighting feature in Windows 11 embodies a step towards a more unified and interactive user experience. It finally grants users the liberty to control their RGB devices right from the Windows Settings -- something many of us have been waiting for. This means you can now extend your Windows accent color to the devices around you, synchronize RGB effects across devices from different brands, and have finer control over how apps manage your device’s lights.

Continue reading

Biggest tech acquisitions of 2022

The economic downturn of 2022 hasn’t stopped the tech industry from engaging in merger and acquisition activity. Though deals have decreased by 40 percent in the first half of 2022, several firms and solution providers have negotiated pacts of up to billions of dollars.

Most of the acquisition activity is because of the overall decline in the stock market. When prices plunge and company valuations reduce, firms step in to bargain.

Continue reading

HP Support Assistant DLL hijacking vulnerability could grant attackers privilege escalation

HP laptop

HP has issued a warning about a security issue with its HP Support Assistant software. Pre-installed on numerous HP systems, and included with the installation of various products from the company, HP Support Assistant has been found to have a privilege escalation vulnerability.

Tracked as CVE-2022-38395 and assigned a score of 8.2, the vulnerability is of high severity. The good news is that a fix is available.

Continue reading

Cybercriminals take shortcuts to attack business PCs

Shortcut

Office macros have long been a favorite attack method for cybercriminals but now that Microsoft has started blocking them by default the bad guys have started to turn to other methods.

A new report from HP Wolf Security shows a shift to shortcut (LNK) files being used to deliver malware. Attackers often place shortcut files in ZIP email attachments, to help them evade email scanners.

Continue reading

Honor among cyber thieves, the professional side of the dark web

Much like the legitimate eCommerce world, trust and reputation have become essential parts of the cybercriminal trade. New research by HP Wolf Security finds 77 percent of cybercriminal marketplaces analyzed require a vendor bond -- a license to sell -- which can cost up to $3,000.

In other evidence of a professional approach, 85 percent of these sites use escrow payments, and 92 percent have a third-party dispute resolution service. Every marketplace provides vendor feedback scores too. Cybercriminals also try to stay a step ahead of law enforcement by transferring reputations between websites -- as the average lifespan of a dark net website is only 55 days.

Continue reading

Threat of firmware attacks is a growing concern for business

New research from HP Wolf Security finds that 80 percent of IT leaders are concerned about their capacity to respond to firmware attacks.

The study shows that 67 percent of IT leaders say protecting against, detecting, and recovering from firmware attacks has become more difficult and time-consuming due to the increase in home working, with 64 percent saying the same of analyzing the security of firmware configuration.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.