{"id":518190,"date":"2021-07-27T09:03:14","date_gmt":"2021-07-27T13:03:14","guid":{"rendered":"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/"},"modified":"2021-07-27T09:03:14","modified_gmt":"2021-07-27T13:03:14","slug":"latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities","status":"publish","type":"post","link":"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/","title":{"rendered":"Latest HP Inc. Cybersecurity Threat Report Reveals Hackers Sharing Computer Vision Tools to Supercharge Capabilities"},"content":{"rendered":"<h2>\nHP Wolf Security threat research team finds increasing cybercrime sophistication and a boom in monetization and hacking tools, while end users are still vulnerable to old tricks<br \/>\n<\/h2>\n<div class=\"mw_release\">\n<p align=\"left\">PALO ALTO, Calif., July  27, 2021  (GLOBE NEWSWIRE) &#8212; HP Inc. (NYSE: HPQ) today released its latest global <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=bb-xOh2QVnkZ4fI7L92WC3NXTSZPM1l6NF4hjZNcyyH2F4wjDx-TtCJUQ6APvkzOF5jWw-288hOWUFdBvXgj4XIFnUOzNSsrdRTEA1fUrjvjd7FL1Wl-9ERT06JvgmWDij4A9TfYYben9AzrHT4mVAS1GbSV3aAcYEnpwzmgeSkWjMgGfA0-cbggMgxUBMIe1xb4WAtqMiQMkqDlQe7FCg==\" rel=\"nofollow noopener\" target=\"_blank\">Threat Insights Report,<\/a> providing analysis of real-world cybersecurity attacks and vulnerabilities. The research shows a significant increase in the frequency and sophistication of cybercrime activity, including a 65% rise in the use of hacking tools downloaded from underground forums and filesharing websites from H2 2020 to H1 2021.<\/p>\n<p>The researchers noted hacking tools in wide circulation were surprisingly capable. For example, one tool can solve CAPTCHA challenges using computer vision techniques, namely optical character recognition (OCR), in order to perform credential stuffing attacks against websites. More broadly, the report found that cybercrime is more organized than ever, with underground forums providing a perfect platform for threat actors to collaborate and share attack tactics, techniques and procedures.<\/p>\n<p>\u201cThe proliferation of pirated hacking tools and underground forums are allowing previously low-level actors to pose serious risks to enterprise security,\u201d says Dr. Ian Pratt, Global Head of Security, Personal Systems, HP Inc. \u201cSimultaneously, users continue to fall prey to simple phishing attacks time and time again. Security solutions that arm IT departments to stay ahead of future threats are key to maximizing business protection and resilience.\u201d<\/p>\n<p>Notable threats isolated by HP Wolf Security included:<\/p>\n<ul type=\"disc\">\n<li style=\"margin-top:6pt\">\n          <strong>Cybercriminal collaboration is opening the door to bigger attacks against victims:<\/strong> Dridex affiliates are selling access to breached organizations to other threat actors, so they can distribute ransomware. The drop in Emotet activity in Q1 2021 has led to Dridex becoming the top malware family isolated by HP Wolf Security.<\/li>\n<li style=\"margin-top:6pt\">\n          <strong>Information stealers delivering nastier malware: <\/strong>CryptBot malware \u2013 historically used as an infostealer to siphon off credentials from cryptocurrency wallets and web browsers \u2013 is also being used to deliver DanaBot \u2013 a banking trojan operated by organized crime groups.<\/li>\n<li style=\"margin-top:6pt\">\n          <strong>VBS downloader campaign targeting business executives: <\/strong>A multi-stage Visual Basic Script (VBS) campaign is sharing malicious ZIP attachments named after the executive it\u2019s targeting. It deploys a stealthy VBS downloader before using legitimate SysAdmin tools to \u201clive off the land\u201d, persisting on devices and delivering malware.<\/li>\n<li style=\"margin-top:6pt\">\n          <strong>From application to infiltration: <\/strong>A r\u00e9sum\u00e9-themed malicious spam campaign targeted shipping, maritime, logistics and related companies in seven countries (Chile, Japan, UK, Pakistan, US, Italy and the Philippines), exploiting a Microsoft Office vulnerability to deploy the commercially-available Remcos RAT and gain backdoor access to infected computers.<\/li>\n<\/ul>\n<p>The findings are based on data from HP Wolf Security, which tracks malware within isolated, micro-virtual machines to understand and capture a full infection chain and help to mitigate threats. By better understanding the behavior of malware in the wild, HP Wolf Security researchers and engineers are able to bolster endpoint security protections and overall system resilience.<\/p>\n<p>\u201cThe cybercrime ecosystem continues to develop and transform, with more opportunities for petty cybercriminals to connect with bigger players within organized crime, and download advanced tools that can bypass defenses and breach systems,\u201d observes Alex Holland, Senior Malware Analyst, HP Inc. \u201cWe\u2019re seeing hackers adapt their techniques to drive greater monetization, selling access on to organized criminal groups so they can launch more sophisticated attacks against organizations. Malware strains like CryptBot previously would have been a danger to users who use their PCs to store cryptocurrency wallets, but now they also pose a threat to businesses. We see infostealers distributing malware operated by organized criminal groups \u2013 who tend to favor ransomware to monetize their access.\u201d<\/p>\n<p>Other key findings in the report include:<\/p>\n<ul type=\"disc\">\n<li>75% of malware detected was delivered via email, while web downloads were responsible for the remaining 25%. Threats downloaded using web browsers rose by 24%, partially driven by users downloading hacking tools and cryptocurrency mining software.<\/li>\n<li style=\"margin-top:5pt;margin-bottom:5pt\">The most common email phishing lures were invoices and business transactions (49%), while 15% were replies to intercepted email threads. Phishing lures mentioning COVID-19 made up less than 1%, dropping by <em>77% from H2 2020 to H1 2021.<\/em><\/li>\n<li>The most common type of malicious attachments were archive files (29%), spreadsheets (23%), documents (19%), and executable files (19%). Unusual archive file types \u2013 such as JAR (Java Archive files) \u2013 are being used to avoid detection and scanning tools, and install malware that\u2019s easily obtained in underground marketplaces.<\/li>\n<li>The report found 34% of malware captured was previously unknown<sup>1<\/sup>, a 4% drop from H2 2020.<\/li>\n<li>A 24% increase in malware that exploits CVE-2017-11882, a memory corruption vulnerability commonly used to exploit Microsoft Office or Microsoft WordPad and carry out fileless attacks.<\/li>\n<\/ul>\n<p>\u201cCybercriminals are bypassing detection tools with ease by simply tweaking their techniques. We saw a surge in malware distributed via uncommon file types like JAR files \u2013 likely used to reduce the chances of being detected by anti-malware scanners,\u201d comments Holland. \u201cThe same old phishing tricks are reeling in victims, with transaction-themed lures convincing users to click on malicious attachments, links and web pages.\u201d<\/p>\n<p>\u201cAs cybercrime becomes more organized, and smaller players can easily obtain effective tools and monetize attacks by selling on access, there\u2019s no such thing as a minor breach,\u201d concludes Pratt. \u201cThe endpoint continues to be a huge focus for cybercriminals. Their techniques are getting more sophisticated, so it\u2019s more important than ever to have comprehensive and resilient endpoint infrastructure and cyber defense. This means utilizing features like threat containment to defend against modern attackers, minimizing the attack surface by eliminating threats from the most common attack vectors \u2013 email, browsers, and downloads.\u201d<\/p>\n<p align=\"left\">\n        <strong>About the data<\/strong><br \/>\n        <br \/>This data was gathered within HP Wolf Security customer virtual-machines from January &#8211; June 2021.<\/p>\n<p align=\"left\">\n        <strong>About HP <\/strong><br \/>\n        <br \/>HP Inc. creates technology that makes life better for everyone, everywhere. Through our product and service portfolio of personal systems, printers and 3D printing solutions, we engineer experiences that amaze. More information about HP Inc. is available at <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=vGpOCQnbbYnsyNjW7Dvht_-dXcTOduKgkeHt2Q9kEkJaqbokbeXfBy2L85vP985Mn72z5rfsBqH1BDLH2nbRCQ==\" rel=\"nofollow noopener\" target=\"_blank\">http:\/\/www.hp.com<\/a>. <\/p>\n<p><strong>About HP Wolf Security<\/strong><br \/>From the maker of the world\u2019s most secure PCs<sup>2<\/sup> and Printers<sup>3<\/sup>, HP Wolf Security is a new breed of endpoint security. HP\u2019s portfolio of hardware-enforced security and endpoint-focused security services are designed to help organizations safeguard PCs, printers and people from circling cyber predators. HP Wolf Security provides comprehensive endpoint protection and resiliency that starts at the hardware level and extends across software and services.<sup>4<\/sup><\/p>\n<p align=\"left\">\n        <strong>HP Inc. Media Relations<br \/><\/strong>MediaRelations@hp.com<\/p>\n<p align=\"left\">\u00a9Copyright 2021 HP Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.<\/p>\n<ol style=\"list-style-type:decimal\">\n<li>Based on first-seen in the wild data from multiple antivirus engines.<\/li>\n<li>Based on HP\u2019s unique and comprehensive security capabilities at no additional cost among vendors on HP Elite PCs with Windows and 8th Gen and higher Intel<sup>\u00ae<\/sup> processors or AMD Ryzen\u2122 4000 processors and higher; HP ProDesk 600 G6 with Intel<sup>\u00ae<\/sup> 10th Gen and higher processors; and HP ProBook 600 with AMD Ryzen\u2122 4000 or Intel<sup>\u00ae<\/sup> 11th Gen processors and higher.<\/li>\n<li>HP\u2019s most advanced embedded security features are available on HP Enterprise and HP Managed devices with HP FutureSmart firmware 4.5 or above. Claim based on HP review of 2021 published features of competitive in-class printers. Only HP offers a combination of security features to automatically detect, stop, and recover from attacks with a self-healing reboot, in alignment with NIST SP 800-193 guidelines for device cyber resiliency. For a list of compatible products, visit: <a href=\"http:\/\/www.hp.com\/go\/PrintersThatProtect\" rel=\"nofollow noopener\" target=\"_blank\">hp.com\/go\/PrintersThatProtect<\/a>. For more information, visit: <a href=\"http:\/\/www.hp.com\/go\/printersecurityclaims\" rel=\"nofollow noopener\" target=\"_blank\">hp.com\/go\/PrinterSecurityClaims<\/a>.<\/li>\n<li>HP Security is now HP Wolf Security.\u00a0Security features vary by platform, please see product data sheet for details.<\/li>\n<\/ol>\n<p>      <img loading=\"lazy\" decoding=\"async\" class=\"__GNW8366DE3E__IMG\" src=\"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODI4NzEzNCM0MzE1OTc0IzIwMDQzNDc=\" width=\"1\" height=\"1\" \/><br \/>\n      <br \/>\n      <img loading=\"lazy\" decoding=\"async\" class=\"__GNW8366DE3E__IMG\" src=\"https:\/\/ml.globenewswire.com\/release\/track\/87fbce9b-8287-4ad4-a7eb-48dfe79944ac\" width=\"1\" height=\"1\" \/>\n    <\/div>\n<div class=\"mw_contactinfo\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>HP Wolf Security threat research team finds increasing cybercrime sophistication and a boom in monetization and hacking tools, while end users are still vulnerable to old tricks PALO ALTO, Calif., July 27, 2021 (GLOBE NEWSWIRE) &#8212; HP Inc. (NYSE: HPQ) today released its latest global Threat Insights Report, providing analysis of real-world cybersecurity attacks and vulnerabilities. The research shows a significant increase in the frequency and sophistication of cybercrime activity, including a 65% rise in the use of hacking tools downloaded from underground forums and filesharing websites from H2 2020 to H1 2021. The researchers noted hacking tools in wide circulation were surprisingly capable. For example, one tool can solve CAPTCHA challenges using computer vision techniques, namely optical character recognition &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Latest HP Inc. Cybersecurity Threat Report Reveals Hackers Sharing Computer Vision Tools to Supercharge Capabilities&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-518190","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Latest HP Inc. Cybersecurity Threat Report Reveals Hackers Sharing Computer Vision Tools to Supercharge Capabilities - Market Newsdesk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Latest HP Inc. Cybersecurity Threat Report Reveals Hackers Sharing Computer Vision Tools to Supercharge Capabilities - Market Newsdesk\" \/>\n<meta property=\"og:description\" content=\"HP Wolf Security threat research team finds increasing cybercrime sophistication and a boom in monetization and hacking tools, while end users are still vulnerable to old tricks PALO ALTO, Calif., July 27, 2021 (GLOBE NEWSWIRE) &#8212; HP Inc. (NYSE: HPQ) today released its latest global Threat Insights Report, providing analysis of real-world cybersecurity attacks and vulnerabilities. The research shows a significant increase in the frequency and sophistication of cybercrime activity, including a 65% rise in the use of hacking tools downloaded from underground forums and filesharing websites from H2 2020 to H1 2021. The researchers noted hacking tools in wide circulation were surprisingly capable. For example, one tool can solve CAPTCHA challenges using computer vision techniques, namely optical character recognition &hellip; Continue reading &quot;Latest HP Inc. Cybersecurity Threat Report Reveals Hackers Sharing Computer Vision Tools to Supercharge Capabilities&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Market Newsdesk\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-27T13:03:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODI4NzEzNCM0MzE1OTc0IzIwMDQzNDc=\" \/>\n<meta name=\"author\" content=\"Newsdesk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Newsdesk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\\\/\"},\"author\":{\"name\":\"Newsdesk\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"headline\":\"Latest HP Inc. Cybersecurity Threat Report Reveals Hackers Sharing Computer Vision Tools to Supercharge Capabilities\",\"datePublished\":\"2021-07-27T13:03:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\\\/\"},\"wordCount\":1282,\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODI4NzEzNCM0MzE1OTc0IzIwMDQzNDc=\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\\\/\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\\\/\",\"name\":\"Latest HP Inc. Cybersecurity Threat Report Reveals Hackers Sharing Computer Vision Tools to Supercharge Capabilities - Market Newsdesk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODI4NzEzNCM0MzE1OTc0IzIwMDQzNDc=\",\"datePublished\":\"2021-07-27T13:03:14+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODI4NzEzNCM0MzE1OTc0IzIwMDQzNDc=\",\"contentUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODI4NzEzNCM0MzE1OTc0IzIwMDQzNDc=\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Latest HP Inc. Cybersecurity Threat Report Reveals Hackers Sharing Computer Vision Tools to Supercharge Capabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\",\"name\":\"Market Newsdesk\",\"description\":\"Latest Business News in Real Time\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\",\"name\":\"Newsdesk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"caption\":\"Newsdesk\"},\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/author\\\/newsdesk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Latest HP Inc. Cybersecurity Threat Report Reveals Hackers Sharing Computer Vision Tools to Supercharge Capabilities - Market Newsdesk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/","og_locale":"en_US","og_type":"article","og_title":"Latest HP Inc. Cybersecurity Threat Report Reveals Hackers Sharing Computer Vision Tools to Supercharge Capabilities - Market Newsdesk","og_description":"HP Wolf Security threat research team finds increasing cybercrime sophistication and a boom in monetization and hacking tools, while end users are still vulnerable to old tricks PALO ALTO, Calif., July 27, 2021 (GLOBE NEWSWIRE) &#8212; HP Inc. (NYSE: HPQ) today released its latest global Threat Insights Report, providing analysis of real-world cybersecurity attacks and vulnerabilities. The research shows a significant increase in the frequency and sophistication of cybercrime activity, including a 65% rise in the use of hacking tools downloaded from underground forums and filesharing websites from H2 2020 to H1 2021. The researchers noted hacking tools in wide circulation were surprisingly capable. For example, one tool can solve CAPTCHA challenges using computer vision techniques, namely optical character recognition &hellip; Continue reading \"Latest HP Inc. Cybersecurity Threat Report Reveals Hackers Sharing Computer Vision Tools to Supercharge Capabilities\"","og_url":"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/","og_site_name":"Market Newsdesk","article_published_time":"2021-07-27T13:03:14+00:00","og_image":[{"url":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODI4NzEzNCM0MzE1OTc0IzIwMDQzNDc=","type":"","width":"","height":""}],"author":"Newsdesk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Newsdesk","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/#article","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/"},"author":{"name":"Newsdesk","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"headline":"Latest HP Inc. Cybersecurity Threat Report Reveals Hackers Sharing Computer Vision Tools to Supercharge Capabilities","datePublished":"2021-07-27T13:03:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/"},"wordCount":1282,"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODI4NzEzNCM0MzE1OTc0IzIwMDQzNDc=","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/","url":"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/","name":"Latest HP Inc. Cybersecurity Threat Report Reveals Hackers Sharing Computer Vision Tools to Supercharge Capabilities - Market Newsdesk","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODI4NzEzNCM0MzE1OTc0IzIwMDQzNDc=","datePublished":"2021-07-27T13:03:14+00:00","author":{"@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"breadcrumb":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/#primaryimage","url":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODI4NzEzNCM0MzE1OTc0IzIwMDQzNDc=","contentUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODI4NzEzNCM0MzE1OTc0IzIwMDQzNDc="},{"@type":"BreadcrumbList","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/latest-hp-inc-cybersecurity-threat-report-reveals-hackers-sharing-computer-vision-tools-to-supercharge-capabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.marketnewsdesk.com\/"},{"@type":"ListItem","position":2,"name":"Latest HP Inc. Cybersecurity Threat Report Reveals Hackers Sharing Computer Vision Tools to Supercharge Capabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.marketnewsdesk.com\/#website","url":"https:\/\/www.marketnewsdesk.com\/","name":"Market Newsdesk","description":"Latest Business News in Real Time","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.marketnewsdesk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979","name":"Newsdesk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","caption":"Newsdesk"},"url":"https:\/\/www.marketnewsdesk.com\/index.php\/author\/newsdesk\/"}]}},"_links":{"self":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/518190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/comments?post=518190"}],"version-history":[{"count":0,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/518190\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/media?parent=518190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/categories?post=518190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/tags?post=518190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}