Intelligent CISO Issue 80 | Page 34

PREDICTIVE intelligence

being used by attackers is rife , but evidence has been scarce , so this finding is significant . Typically , attackers like to obscure their intentions to avoid revealing their methods , so this behaviour indicates an AI assistant was used to help write their code . Such capabilities further lower the barrier to entry for threat actors , allowing novices without coding skills to write scripts , develop infection chains , and launch more damaging attacks .”
By isolating threats that have evaded detection tools on PCs – but still allowing malware to detonate safely – HP Wolf Security has specific insight into the latest techniques used by cybercriminals . To date , HP Wolf Security customers have clicked on over 40 billion email attachments , web pages and downloaded files with no reported breaches .
The report , which examines data from calendar Q2 2024 , details how cybercriminals continue to diversify attack methods to bypass security policies and detection tools , such as :
• At least 12 % of email threats identified by HP Sure Click bypassed one or more email gateway scanners , the same as the previous quarter .
• The top threat vectors were email attachments ( 61 %), downloads from browsers ( 18 %) and other infection vectors , such as removable storage – like USB thumb drives and file shares ( 21 %).
34 WWW . INTELLIGENTCISO . COM