Menu

HP Wolf Security Threat Intelligence: AI Ramps Efficiency for Cyber Attackers

HP Wolf Security Threat Intelligence: AI Ramps Efficiency for Cyber Attackers

Analyst(s): Krista Case
Publication Date: January 17, 2025

HP Inc.’s most recent Wolf Threat Intelligence Report unveils evolving AI-fueled threat vectors. Additionally, Futurum’s conversations with HP’s threat intelligence research uncover the resulting implications for endpoint security.

What is Covered in this Article:

  • HP Inc. releases its Wolf Threat Intelligence Report for 3Q24, which analyzes the evolving tactics of cybercriminals.
  • Recent insights into how cyberattackers are using AI to commoditize and open source malicious software, in effect further driving their efficiency and scale.
  • The resulting impact on endpoint security, including the need for real-time below-the-operating system threat intelligence and security capabilities.

The News: HP Inc. releases its Wolf Threat Intelligence Report for 3Q24, which analyzes the evolving tactics of cybercriminals.

HP Wolf Security Threat Intelligence: AI Ramps Efficiency for Cyber Attackers

Analyst Take: HP Inc. has been running its Wolf Security Threat Intelligence Report for five years. There are a few takeaways from the report’s observations from Q324 data that will carry through into this new year.

The Headline: AI Has Only Begun to Revolutionize the Game for Malicious Actors

We are not just seeing the tip of the iceberg in terms of how AI will be used for attack effectiveness, but also for attack efficiency. For example, there are adversarial use cases ranging from reducing time-to-malicious code to optimizing attack scale in terms of targets as well as the variety of attack tactics.

This analyst’s eyes were opened in this conversation around not only how AI is being used, and will increasingly be used moving forward, to not only reduce the skills required and proverbial “barrier to entry” for cybercriminals but also how it can elevate malicious actors to focus on areas of strategic impact to their organization, such as defense evasion – just as we think about automation and AI doing for security teams.

Ransomware-as-a-service has been utilized for some time now, and the new nuance to this is the commoditization and open-sourcing of malicious code via AI. Where today adversaries have focused AI on delivering the malicious payload, it is likely we will see it expand earlier and later in the attack chain (for example, into vulnerability discovery).

What Exactly Does This Mean for the Enterprise?

Futurum spoke with HP Inc. threat researchers Alex Holland and Patrick Schlapfer about ensuring the right balance between detection, prevention, and protection, as attackers gain speed and innovation, thanks to AI. Endpoints have been growing “goldmines” for attacks, due to the trove of sensitive data that users typically store on them. We are also seeing the rise in AI applications and processes on these devices, alongside the growing value of cryptocurrency incentivizing attackers to target Bitcoin wallets.

Holland and Schlapfer underscored these trends, as well as the need to invest in below-the-OS security, as AI helps attackers to become more advanced and to invest in persistent below-the-OS attacks.

What to Watch:

  • Evolving AI-driven cyberattack methods, specifically their emphasis on endpoint devices as well as their growing influence across the cybersecurity attack chain.
  • HP’s melding of above-the-operating system threat prevention, such as its Sure Click application isolation, which reduces the attack surface of endpoints. Its ability to obtain visibility into below-the-operating system threats and make this threat intelligence actionable for Security Operations teams through various platform security features such as SureStart, which is enabled through the Endpoint Security Controller and which logs and provides visibility into security-relevant events.
  • New endpoint vulnerabilities introduced by the usage of generative AI applications on PCs.

See HP’s complete press release for more information.

Disclosure: The Futurum Group is a research and advisory firm that engages or has engaged in research, analysis, and advisory services with many technology companies, including those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Analysis and opinions expressed herein are specific to the analyst individually and data and other information that might have been provided for validation, not those of The Futurum Group as a whole.

Other insights from The Futurum Group:

HP: Elevating Security with a Multi-Layered Approach for the Modern Era

Secure Your Devices: HP Wolf Security Suite

HP’s Q4 FY24 Earnings: A Resilient Finish to a Challenging Year

Author Information

Krista Case

Krista Case brings over 15 years of experience providing research and advisory services and creating thought leadership content. Her vantage point spans technology and vendor portfolio developments; customer buying behavior trends; and vendor ecosystems, go-to-market positioning, and business models. Her work has appeared in major publications including eWeek, TechTarget and The Register.

Related Insights
CoreWeave's Anthropic and Meta Partnerships
April 13, 2026

CoreWeave’s Anthropic and Meta Wins Validate Benchmark Outperformance

Brendan Burke, Research Director at Futurum, examines how CoreWeave's $21B Meta deal and Anthropic partnership validate the neocloud model for frontier AI infrastructure built on MLPerf-leading performance....
compute partnership
April 13, 2026

Anthropic’s Google-Broadcom Deal: Model Company or Infrastructure Play?

Anthropic's Google and Broadcom partnership signals a strategic pivot toward supply chain control, raising questions about whether vertical integration will strengthen or dilute its model-first identity....
Technology Friction
April 13, 2026

Will Technology Friction Derail the ROI Promise of Enterprise AI Investments?

Despite record AI spending, enterprises lose 51 workdays per employee yearly to technology friction due to inadequate training, undermining ROI and requiring robust user enablement for platform-first strategies to succeed....
ServiceNow Embeds AI Across Platform. How Far Can This Model Scale?
April 13, 2026

ServiceNow Embeds AI Across Platform. How Far Can This Model Scale?

Keith Kirkpatrick, Research Director at Futurum, examines ServiceNow AI platform strategy, including Context Engine and developer tools, and highlights trade-offs around control, cost visibility, and enterprise dependence....
CLEAR and Snappt Target Property Management’s Identity Crisis—Will It Move the Needle?
April 13, 2026

CLEAR and Snappt Target Property Management’s Identity Crisis—Will It Move the Needle?

CLEAR and Snappt integrate biometric identity verification into the Applicant Trust Platform, addressing fraud and bad debt in multifamily property management while advancing enterprise-grade security standards....
Is Autonomous IT the Endgame for AI in Operations or Just the Start of a Bigger Shift?
April 12, 2026

Is Autonomous IT the Endgame for AI in Operations or Just the Start of a Bigger Shift?

As Autonomous IT evolves, CIOs must weigh efficiency gains against vendor lock-in and skills gaps, raising the question: is this AI's operational endgame or just the beginning?...

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.