Generative Data Intelligence

Tag: Archive

The rise and fall of the English language

If you’re reading this in the original English it was written (rather than our translations in Chinese, German, French, Portuguese, Spanish or Italian), perhaps it’s not...

New Variant of Sigma Ransomware | Subpoena Scare Users in Russia

Reading Time: 5 minutesWould you be scared or at least anxious if you’d found a subpoena to the US district court in...

Password Stealer Hides In The Payment File And Hunts For Credentials

Reading Time: 3 minutesCybercriminals’ big hunt for users’ credentials is gaining momentum rapidly. Their strategy usually stays the same: get attention of the...

Making sense of AI tools for marketing

Not a week goes by without some new artificial-intelligence-powered product being marketed to marketers. For marketers wanting to gain an edge on the...

How to Protect Yourself from Printer/Scanner Malware

Reading Time: 3 minutes In a rather new trend, cybercriminals have begun to spread malware by spoofing printers and scanners. These types of attacks started...

Supply Chain and Blockchain: The Future of Pharmacy

The interest in Blockchain and distributed ledger technology (DLT)has exploded in recent years with a large focus on the financial industry. Meanwhile, medical...

Locky Ransomware Trojan Spotted this August 2018

Reading Time: 4 minutes New Ransomware, Botnet Threat: IKARUSdilapidated Attack is August ’17 Locky Rebirth A Special Update from the Comodo Threat Intelligence Lab A new...

Comodo One. Understanding Windows Profiles in ITSM

Reading Time: 36 minutesComodo One. Understanding Windows Profiles in ITSM How to hide/show security client and communication client tray icons in devices? Step 1: Go...

Introducing MultiChain Streams

For shared immutable key-value and time series databasesToday we’re proud to release the latest version of MultiChain, which implements a crucial new set...

Four genuine blockchain use cases

Where shared ledgers add real value in enterprise IT Almost a year after first releasing MultiChain, we’ve learnt a huge amount about how blockchains, in...

FROM THE COMODO LABS: What’s old is new again, as that e-fax could contain CryptoLocker

Reading Time: 5 minutesSince 2013, the CryptoLocker malware has been making its way across the Internet in various forms, in various iterations. CryptoLocker...

$46million Stolen in Cyberheist – don’t let this be your company

Reading Time: 2 minutesIt has been reported that networking firm Ubiquiti Networks was the victim of cyber theft, where more than $46million was...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?