VendorsHP Wolf Security

HP Wolf Security

Cybersecurity reports and statistics published by HP Wolf Security

8 categories2 reports

Recent Statistics & Reports

Email remained the top vector for delivering malware, accounting for 61% of threats caught by HP Sure Click in Q2 2025. This was a 1 percentage point drop compared to Q1 2025.

In Q2 2025, 13% of malicious emails (phishing, malware, etc.) were not blocked by the email gateway security system. This is 1 percentage point higher than in Q1 2025.

In Q2 2025, 40% of all detected cyber threats (malware, phishing payloads, etc.) were sent inside archive files (like .zip, .rar, .7z). This share is 2 percentage points higher than in Q1 2025.

Malicious spreadsheets (e.g., XLS, XLSX) totaled 4% of threats in Q2 2025, showing a 2 percentage point drop from Q1 2025.

PDF files were responsible for 8% of threats in Q2 2025, a 2 percentage point fall compared to Q1 2025.

Executables and scripts were the second most popular delivery type, making up 35% of threats in Q2 2025, a 1 percentage point growth from Q1 2025.

Documents, such as Microsoft Word formats (e.g., DOC, DOCX), accounted for 9% of threats in Q2 2025, growing by 1 percentage point over the previous quarter.

Malicious web browser downloads made up 23% of threats in Q2 2025, with no change compared to Q1 2025.

Threats delivered by other vectors, such as removable media, slightly grew by 1 percentage point in Q2 2025 compared to the previous quarter, reaching 16% of threats.

On average, IT and security decision-makers report having approximately 80 printers that are redundant or are in the process of being decommissioned within their organizations.

36% of IT and security decision-makers apply firmware updates promptly during the Ongoing Management stage.

IT teams spend 3.5 hours per printer per month managing hardware and firmware security issues.

More than half (51%) of IT and security decision-makers cannot confirm if a printer has been tampered with in the factory or in transit once it arrives.

Only 32% of IT and security decision-makers can detect security events linked to hardware-level attacks.

86% of IT and security decision-makers say data security is a barrier to printer reuse, resale, or recycling.

1-in-10 (10%) of IT and security decision-makers insist on destroying both the device and its storage drives to ensure data security.

35% of IT and security decision-makers are uncertain whether printers can be fully and safely wiped using current sanitisation solutions.

60% of IT and security decision-makers warn that a lack of collaboration between procurement, IT, and security puts their organization at risk.

1-in-4 (25%) of IT and security decision-makers believe it’s necessary to physically destroy printer storage drives.

54% of IT and security decision-makers fail to request technical documentation to validate security claims.

Showing first 20 results