Reading Time: 5 minutesIn late November 2016, Comodo Threat Research Labs discovered samples of the Android malware “Tordow v2.0” affecting clients in Russia....
Reading Time: 5 minutesIn late November 2016, Comodo Threat Research Labs discovered samples of the Android malware “Tordow v2.0” affecting clients in...
Reading Time: 6 minutesTakeover remote endpoints using ITSM
ITSM’s ‘Takeover’ feature allows administrators to remotely access and control Windows devices to solve issues, install...
Reading Time: 6 minutesTakeover remote endpoints using ITSMITSM’s ‘Takeover’ feature allows administrators to remotely access and control Windows devices to solve issues,...
Reading Time: 3 minutesA cyber criminal collective known as the Cobalt Group is suspected to be behind the ATM malware “touchless jackpotting” attacks...
Reading Time: 3 minutesCyber criminals have resorted to another sophisticated way of infecting user systems with ransomware and other malware. Malvertising or compromised...