VendorsHP Wolf Security
HP Wolf Security
Cybersecurity reports and statistics published by HP Wolf Security
8 categories4 reports
Research Reports
Reports and publications from HP Wolf Security
Recent Statistics & Reports
Documents, such as Microsoft Word formats (e.g., DOC, DOCX), accounted for 9% of threats in Q2 2025, growing by 1 percentage point over the previous quarter.
9/12/2025•
Microsoft Word
Executables and scripts were the second most popular delivery type, making up 35% of threats in Q2 2025, a 1 percentage point growth from Q1 2025.
9/12/2025•
ExecutablesScripts
Threats delivered by other vectors, such as removable media, slightly grew by 1 percentage point in Q2 2025 compared to the previous quarter, reaching 16% of threats.
9/12/2025•
Remoable media
Malicious spreadsheets (e.g., XLS, XLSX) totaled 4% of threats in Q2 2025, showing a 2 percentage point drop from Q1 2025.
9/12/2025•
Malicious spreadsheets
In Q2 2025, 40% of all detected cyber threats (malware, phishing payloads, etc.) were sent inside archive files (like .zip, .rar, .7z). This share is 2 percentage points higher than in Q1 2025.
9/12/2025•
Cyber threat
In Q2 2025, 13% of malicious emails (phishing, malware, etc.) were not blocked by the email gateway security system. This is 1 percentage point higher than in Q1 2025.
9/12/2025•
EmailPhishingMalware
Malicious web browser downloads made up 23% of threats in Q2 2025, with no change compared to Q1 2025.
9/12/2025•
Malicious web browser downloads
Email remained the top vector for delivering malware, accounting for 61% of threats caught by HP Sure Click in Q2 2025. This was a 1 percentage point drop compared to Q1 2025.
9/12/2025•
EmailMalware
PDF files were responsible for 8% of threats in Q2 2025, a 2 percentage point fall compared to Q1 2025.
9/12/2025•
PDF
70% of IT and security decision-makers are increasingly worried about offline threats, such as employees printing and mishandling sensitive company information.
7/17/2025•
HardwareFirmwarePrinters
36% of IT and security decision-makers apply firmware updates promptly during the Ongoing Management stage.
7/17/2025•
HardwareFirmwarePrinters
On average, IT and security decision-makers report having approximately 80 printers that are redundant or are in the process of being decommissioned within their organizations.
7/17/2025•
HardwareFirmwarePrinters
86% of IT and security decision-makers say data security is a barrier to printer reuse, resale, or recycling.
7/17/2025•
HardwareFirmwarePrinters
IT teams spend 3.5 hours per printer per month managing hardware and firmware security issues.
7/17/2025•
HardwareFirmwarePrinters
More than half (51%) of IT and security decision-makers cannot confirm if a printer has been tampered with in the factory or in transit once it arrives.
7/17/2025•
HardwareFirmwarePrinters
Only 32% of IT and security decision-makers can detect security events linked to hardware-level attacks.
7/17/2025•
HardwareFirmwarePrinters
1-in-10 (10%) of IT and security decision-makers insist on destroying both the device and its storage drives to ensure data security.
7/17/2025•
HardwareFirmwarePrinters
35% of IT and security decision-makers are uncertain whether printers can be fully and safely wiped using current sanitisation solutions.
7/17/2025•
HardwareFirmwarePrinters
60% of IT and security decision-makers warn that a lack of collaboration between procurement, IT, and security puts their organization at risk.
7/17/2025•
HardwareFirmwarePrinters
1-in-4 (25%) of IT and security decision-makers believe it’s necessary to physically destroy printer storage drives.
7/17/2025•
HardwareFirmwarePrinters
Showing first 20 results