Generative Data Intelligence

Tag: Attack

Ransomware Evolved | New Maze Ransomware Attack 2020

Reading Time: 6 minutesMaze creators threaten to publish the confidential data of victims unless the ransom is paid. Comodo Cyber Security team...

Dharma 2.0 Ransomware | How to Remove Dharma Ransomware?

Reading Time: 6 minutesComodo Cyber Security team reveals the inner-workings of the latest strain of this persistent threatThe Comodo Cyber Security team...

WONSYS Anatomy Of A Ransomware Attack | WONSYS Ransomware

Reading Time: 4 minutesMost people are aware of ransomware by now, certainly those who regularly read the Comodo blog section and similar...

What is Auto-Containment?

Reading Time: 3 minutesWe’ve all been there: You’re doing research online and download a new program onto your computer. Suddenly a pop-up...

Happy Holidays from Comodo Cybersecurity

Reading Time: 3 minutesWith another year nearly behind us, this holiday season is the perfect time to start considering next year’s resolutions....

How Diligent Can a CISO be at Protecting the Organization?

Reading Time: 3 minutesWith cybersecurity playing such an essential role in modern-day business culture, many companies are sourcing highly specialized personnel to...

7 Phishes You Don’t Want This Holiday – Comodo News and Internet Security Information

Reading Time: 4 minutesEvery year as we approach the holiday season, millions prepare to celebrate a popular Italian annual tradition: the Feast...

7 Phishes You Don’t Want This Holiday – Comodo News and Internet Security Information

Reading Time: 4 minutesEvery year as we approach the holiday season, millions prepare to celebrate a popular Italian annual tradition: the Feast...

Festive Shopping: How to Avoid Becoming a Victim on Black Friday and Cyber Monday

Reading Time: 3 minutes‘Tis the season for holiday shopping. Economic forecasters anticipate holiday retail sales will reach a new all-time high in 2019,...

How Do Penetration Testing Stop Hackers? | Block Spam

Reading Time: 3 minutesIt can be hard to imagine a world in which an attempted hack attack occurs roughly every 39 seconds....

Cybercriminals Attack at a Powerful Chinese Financial Company

Reading Time: 2 minutesIncidents of user data theft skyrockets day by day. This time a massive data leak hit the customers of...

Top 5 Common Pitfalls in your Security Stack |How to Overcome Them?

Reading Time: 3 minutesThe 5 Most Common Pitfalls in Your Security Stack That Put You at Risk for a BreachIt can take...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?