Security News > 2021 > March > Why traditional malware detection can't stop the latest security threats
Isolating your hardware and your applications is a more effective way to prevent malware from infecting your critical endpoints, says HP. Defending your organization against malware used to a matter of running the right antivirus software to detect and block any security threats.
The HP-Bromium Threat Insights Report looks at malware observed during the fourth quarter of 2020.
To investigate these threats, HP examined the results of customers that used its own Sure Click Enterprise product, which blocks and captures malware and allows it to run in isolated secure containers.
Almost one-third of the malware seen by HP during the quarter was previously unknown, in large part due to the use of packers and obfuscation techniques by attackers trying to evade detection.
Among all the malware samples analyzed, Trojans accounted for 55%, largely driven by spam campaigns designed to deploy the Dridex malware.
"Hardware-enforced isolation removes the opportunity for malware to cause harm to the host PC-even from novel malware-because it does not rely on a detect-to-protect security model," he added.
News URL
Related news
- MUT-1244 targeting security researchers, red teamers, and threat actors (source)
- Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat' (source)
- Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection (source)
- Are threat feeds masking your biggest security blind spot? (source)
- Week in review: MUT-1244 targets both security workers and threat actors, Kali Linux 2024.4 released (source)
- Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them (source)
- Top 5 Malware Threats to Prepare Against in 2025 (source)