Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Here we go again…it should come as no surprise to anyone who follows cybersecurity that another massive cyberattack has occurred, on a global scale. This time, the ransomware attack requested payments of $300 in Bitcoin currency – per computer – in order to preserve files that would otherwise be allegedly destroyed. Among those affected were multiple hospitals and health care facilities in the U.K., as well as industries and organizations in approximately 99 countries globally.
We all know that ransomware has been on the rise for years, with a major increase since approximately 2013; the latest, the “WannaCry,”or “WannaCrypto,” is just the latest variant, and it is not likely to be the last. Aside from the possible copycat threats, you can be sure the black hats are hard at work on the next cyber threat.
The Rise of Copycats
“WannaCry is done, now it’s the turn of the copycat attacks,” said Melih Abdulhayoglu, CEO of Comodo. “The less sophisticated Internet criminals don’t bother to write attacks themselves, they just reverse engineer the work of others. Why bother to write your own malware when you can just remove the kill switch from WannaCry and replace the Bitcoin wallet address with your own? When faced with such a disaster, it is tempting to look for people to blame but that’s the wrong mindset because the cybercriminals, who will keep attacking until caught and locked up, are most at fault” – Melih added.
How WannaCry Ransomware Could Have Been Avoided
Microsoft launched new XP and Vista versions after Windows 95 to aid PC Security and networks should have kept pace with the changes to protect their networks. Upgrading systems, however, takes manpower and resources that many of the enterprises who have been hit hard refused to provide. Instead of pointing fingers, we should be asking what steps could have been taken to avoid this and what can we do now to prevent future attacks.
What is apparent in all of this is also that while the experts are saying the trouble allegedly started with a basic phishing attack that found vulnerabilities in unpatched Microsoft Windows software, it could likely have been prevented, had certain safeguards been in place.
How You Can Safeguard Now
Comodo Containment technology is designed to combat situations just like this. As an example, a Comodo user video illustrates that there is no infection of WannaCry when Comodo products are installed on that computer.
Watch the Video Below:
Where Did It All Began?
According to industry experts, many of the WannaCry infections were probably triggered as an endpoint user – perhaps a hospital employee in the UK, a student at a university, etc. – clicked on a toxic email. As simple as that, the blackhats are in, files are held for ransom.
Endpoint protection, as we learn almost daily is increasingly vital for enterprises large and small. We have seen in the past how infections can debilitate the functions of major organizations in particular are vulnerable because of the type of the data they need to access on a daily basis and to protect.
Get a Comprehensive Solution to Combat this Attack
No matter the nature of the enterprise, vulnerabilities are increasing – simply due to the persistence and prevalence of hackers. Larger organizations, because of the number of endpoints available, as well as the possibility for larger gain for cybercriminals, may potentially be even more vulnerable. There are solutions!. With Comodo’s Threat Analysis Report, you can determine where your defence against cyber threats need shoring up and there are solutions that can be tailor-made to suit every enterprise situation.
Tags: Ransomware attacks,ransomware,wannacry,wannacry ransomware
Reading Time: 2 minutes Ransomware is a dilemma that we have been facing for quite some time now. However, in 2020, we have seen a significant rise in the total number and variety of ransomware attacks. This latest ransomware boom is most probably the outcome of organized cyber-criminal networks recognizing the revenue-generating potential of this ‘business model’—amounting to over…
Reading Time: 3 minutes Overview One of thefirst times the public witnessedfirsthandand realized the power of ransomware was when WannaCry broke out in 2017. The government, education, hospitals, energy, communications, manufacturing and many other key information infrastructure sectors suffered unprecedented losses.Looking back, thatwas just the beginning, as there have since been many versions, such asSimpleLocker, SamSam and WannaDecryptor for…
Reading Time: 3 minutes Celebrate National Cybersecurity Awareness Month By Learning to Protect Against Ransomware Attacks It’s the season for pumpkin picking, leaves changing color, getting ready for Halloween parties and trick-or-treating. But ghosts and ghouls aren’t the only scary things you’ll be seeing this month: October is also National Cybersecurity Awareness Month, a time when business leaders and…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
See how your organization scores against cybersecurity threats