Republic Services Inc
Change company Symbol lookup
Select an option...
RSG Republic Services Inc
EBON Ebang International Holdings Inc
MMV MultiMetaVerse Holdings Limited
TMUS T-Mobile US Inc
ADBE Adobe Inc
YJ Yunji Inc
CGEN Compugen Ltd
BBIO BridgeBio Pharma Inc
WRN Western Copper and Gold Corp
DD Dupont De Nemours Inc
Go

Industrials : Commercial Services & Supplies | Large Cap Blend
Company profile

Republic Services, Inc. is a provider of environmental services in the United States. Through its subsidiaries, the Company provides a range of products and services, including recycling, solid waste, special waste, hazardous waste, container rental and field services. The Company operates through three segments: Group 1, Group 2 and Group 3. Group 1 is its recycling and solid waste business operating primarily in geographic areas located in the western United States. Group 2 is its recycling and solid waste business operating primarily in geographic areas located in the southeastern and mid-western United States and the eastern seaboard of the United States. Group 3 is its environmental solutions business operating primarily in geographic areas located across the United States and Canada. The Company is engaged in operating approximately 73 landfill gas-to- energy and other renewable energy projects and has post-closure responsibility for 128 closed landfills.

Closing Price
$144.50
Day's Change
1.77 (1.24%)
Bid
--
Ask
--
B/A Size
--
Day's High
144.67
Day's Low
142.76
Volume
(Light)
Volume:
849,004

10-day average volume:
1,307,355
849,004

Daily QR "Scan Scams" Phishing Users on their Mobile Devices

9:00 am ET March 16, 2023 (Globe Newswire) Print
Daily QR "Scan Scams" Phishing Users on their Mobile DevicesNew HP Wolf Security report shows move to block macros by default is forcing threat actors to think outside the 'box'GlobeNewswireMarch 16, 2023

PALO ALTO, Calif., March 16, 2023 (GLOBE NEWSWIRE) -- HP Inc. (NYSE: HPQ) today issued its latest quarterly HP Wolf Security Threat Insights Report, showing hackers are diversifying attack methods, including a surge in QR code phishing campaigns. By isolating threats on PCs that have evaded detection tools, HP Wolf Security has insights into the latest techniques being used by cybercriminals in the fast-changing cybercrime landscape. To date, HP Wolf Security customers have clicked on over 25 billion email attachments, web pages, and downloaded files with no reported breaches. Further HP Wolf Security insights will be featured at the upcoming Amplify Partner Conference, March 28-30, McCormick Place Chicago.

From February 2022, Microsoft began blocking macros in Office files by default, making it harder for attackers to run malicious code. Data collected by the HP Threat Research team shows that from Q2 2022, attackers have been diversifying their techniques to find new ways to breach devices and steal data. Based on data from millions of endpoints running HP Wolf Security1, the research found:

  • The rise of QR scan scams: Since October 2022, HP has seen almost daily QR code "scan scam" campaigns. These scams trick users into scanning QR codes from their PCs using their mobile devices - potentially to take advantage of weaker phishing protection and detection on such devices. QR codes direct users to malicious websites asking for credit and debit card details. Examples in Q4 included phishing campaigns masquerading as parcel delivery companies seeking payment.
  • HP noted a 38% rise2 in malicious PDF attachments: Recent attacks use embedded images that link to encrypted malicious ZIP files, bypassing web gateway scanners. The PDF instructions contain a password that the user is tricked into entering to unpack a ZIP file, deploying QakBot or IcedID malware to gain unauthorized access to systems, which are used as beachheads to deploy ransomware.
  • 42% of malware was delivered inside archive fileslike ZIP, RAR, and IMG: The popularity of archives has risen 20% since Q1 2022, as threat actors switch to scripts to run their payloads. This is compared to 38% of malware delivered through Office files such as Microsoft Word, Excel, and PowerPoint.

"We have seen malware distributors like Emotet try to work around Office's stricter macro policy with complex social engineering tactics, which we believe are proving less effective. But when one door closes another opens - as shown by the rise in scan scams, malvertising, archives, and PDF malware," explains Alex Holland, Senior Malware Analyst, HP Wolf Security threat research team, HP Inc.

"Users should look out for emails and websites that ask to scan QR codes and give up sensitive data, and PDF files linking to password-protected archives."

In Q4, HP also found 24 popular software projects imitated in malvertising campaigns used to infect PCs with eight malware families - compared to just two similar campaigns in the previous year. The attacks rely on users clicking on search engine advertisements, which lead to malicious websites that look almost identical to the real websites.

"While techniques evolve, threat actors still rely on social engineering to target users at the endpoint," comments Dr. Ian Pratt, Global Head of Security for Personal Systems, HP Inc.

"Organizations should deploy strong isolation to contain the most common attack vectors like email, web browsing and downloads. Combine this with credential protection solutions that warn or prevent users from entering sensitive details onto suspicious sites to greatly reduce the attack surface and improve an organization's security posture."

HP Wolf Security runs risky tasks like opening email attachments, downloading files and clicking links in isolated, micro-virtual machines (micro-VMs) to protect users, capturing detailed traces of attempted infections. HP's application isolation technology mitigates threats and provides unique insights into novel intrusion techniques and threat actor behavior.

The full report can be found here: https://threatresearch.ext.hp.com/hp-wolf-security-threat-insights-report-q4-2022/

About the data

This data was anonymously gathered within HP Wolf Security customer virtual machines from October-December 2022.

About HP

HP Inc. (NYSE: HPQ) is a global technology leader and creator of solutions that enable people to bring their ideas to life and connect to the things that matter most. Operating in more than 170 countries, HP delivers a wide range of innovative and sustainable devices, services and subscriptions for personal computing, printing, 3D printing, hybrid work, gaming, and more. For more information, please visit: http://www.hp.com.

About HP Wolf Security

HP Wolf Security is a new breed of endpoint security. HP's portfolio of hardware-enforced security and endpoint-focused security services are designed to help organizations safeguard PCs, printers, and people from circling cyber predators. HP Wolf Security provides comprehensive endpoint protection and resiliency that starts at the hardware level and extends across software and services. Visit https://www.hp.com/uk-en/security/endpoint-security-solutions.html.


1 HP Security is now HP Wolf Security. Security features vary by platform, please see product data sheet for details.

2 As detailed in page 2 of the HP Wolf Security Q4 Threat Insights Report

Media Contacts

Vanessa Godsal

HP Media Relations

vgodsal@hp.com



Primary Logo

comtex tracking

COMTEX_426765028/2010/2023-03-16T09:00:08

Earnings Calendar and Events Data provided by |Terms of Use| © 2023 Wall Street Horizon, Inc.

Market data accompanied by is delayed by at least 15 minutes for NASDAQ, NYSE MKT, NYSE, and options. Duration of the delay for other exchanges varies.
Market data and information provided by Morningstar.

Options are not suitable for all investors as the special risks inherent to options trading may expose investors to potentially rapid and substantial losses.
Please read Characteristics and Risks of Standard Options before investing in options.

Information and news provided by ,, , Computrade Systems, Inc., ,, and

Copyright © 2023. All rights reserved.