Plato Data Intelligence.
Vertical Search & Ai.

Tag: aes

Poulight Stealer, a new Comprehensive Stealer from Russia

Researchers from Cybaze-Yoroi ZLab monitored the evolution and the diffusion of an infostealer dubbed Poulight that most likely has a Russian origin. Introduction...

Vcrypt ransomware holds your files hostage without encrypting them

by Paul Ducklin Here’s a ransomware story with a bit of a difference. The sample we studied in this article...

Is Europe’s Experience in E-Signatures and Digital IDs Valuable for Australia?

Europe has been running a legislative framework for electronic signatures and digital identities since 1999. In 2014, the European Parliament introduced a significant...

Dharma 2.0 Ransomware | How to Remove Dharma Ransomware?

Reading Time: 6 minutesComodo Cyber Security team reveals the inner-workings of the latest strain of this persistent threatThe Comodo Cyber Security team...

Happy Holidays from Comodo Cybersecurity

Reading Time: 3 minutesWith another year nearly behind us, this holiday season is the perfect time to start considering next year’s resolutions....

Marriott Data Breach Affected 500 Million Guests at Starwood

Reading Time: 5 minutesData breaches are occurring with increasing frequency at name-brand companies, and it’s certainly cause for concern. Millions of customers...

Comodo Threat Research Labs Warns Android Users of “Tordow v2.0” outbreak

Reading Time: 5 minutesIn late November 2016, Comodo Threat Research Labs discovered samples of the Android malware “Tordow v2.0” affecting clients in Russia....

Comodo discovers samples of Tordow v2.0 Android malware in Russia

Reading Time: 5 minutesIn late November 2016, Comodo Threat Research Labs discovered samples of the Android malware “Tordow v2.0” affecting clients in...

Fantom Ransomware Malware poses as Windows Update

Reading Time: 2 minutesFantom, a new ransomware discovered recently, strikes disguised as a legitimate Microsoft Windows update. Thus it tricks users into...

The History of the SSL Certificate

Reading Time: 3 minutesThe Secure Sockets Layer (SSL) Protocol was adopted by Netscape in 1994 as a response to the growing concern over...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?