Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
Globally, on Monday, November 27th… Cyber-Monday… the Lab saw a massive spike in detections. The reason? Cyber Monday deals lead to more people searching and shopping on the web than usual. More active endpoints mean more malware activity.
Over 17 million malware files were detected the week of December 6. This is more than a 33% increase from the previous week’s 13 million detections.
Last week, we reported that Taiwan was one of the countries under attack from the Ramnit virus. Now, we are seeing disproportionate levels of malware in Kazakhstan, Namibia, Mexico and Taiwan again. The Lab recommends a security review of patch management and endpoint protection for all enterprises with offices or other operations in these countries.
Trojans were the most detected key malware type, followed by viruses and worms. Trojans and worms hit Russia the hardest, followed by Brazil, Turkey, the United States and South Africa.
The most prevalent worms were Autorun and Dropper; among viruses it was Sality; and among Trojans, we saw Autoit, Scar, Agent, Fynloski and the infamous WannaCry ransomware virus.
The Comodo Threat Intelligence Lab recommends defense in depth with a robust endpoint URL filter as the best mitigation against Trojans. And to stay protected against worms, we recommend personal firewalls, which may not be as trendy as artificial intelligence and machine learning, but are still highly effective at keeping worms from spreading in your environment.
The limitations of machine-based analysis have also emerged. While machines can detect known malware executables and simple unknown ones, they cannot analyze complex unknown malware files, which numbered almost 75,000 last week. Complex unknown files require expert human analysis.
The Lab recommends implementing a default deny security approach for new unknowns to prevent infections in your endpoints from newly created or modified malware.
Despite this massive spike in malware activity, no active Comodo Advanced Endpoint Protection users were infected. This demonstrates the benefits of the Default-Deny security posture with Auto-Containment of unknown files while they’re being analyzed.
The Comodo Threat Intelligence Lab will continue to monitor cybersecurity events and malware attacks. As always, we’ll provide you with vital updates in weekly and special videos and reports.
If you would like to learn more about security threat report offered by Comodo Threat Intelligence Lab or subscribe and access the archives, please visit comodo.com/lab. Stay cyber safe! … and thank you.
Tags: Comodo Threat Intelligence Lab
Reading Time: 3 minutes The second quarter 2018 Comodo Cybersecurity Global Threat Report has just been released! I couldn’t wait to read it, and I’m glad I did. It’s my job to keep on top of the rapidly evolving cyber threat landscape, but I was still surprised by what I learned. I’ll tell you which findings were the most…
Reading Time: 2 minutes Should you fear your office scanner/printer? How about your post office? A second wave of new but related IKARUSdilapidated Locky ransomware attacks has occurred, building on the attacks discovered by the Comodo Threat Intelligence lab earlier in the month of August 2017. This late August campaign also uses a botnet of zombie computers to coordinate…
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
agreecheck
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP