Zephyrnet Logo

Tag: ransomware

Five Essential Criteria for Effective Patch Management

Reading Time: 3 minutesThe WannaCry ransomware attack, which was one of the largest cyber attacks faced recently, was based on exploit of a...

2nd Wave of IKARUS Ransomware Attacks Uses Your Scanner/Printer, Post Office Billing Inquiry

Reading Time: 4 minutesShould you fear your office scanner/printer? How about your post office? A second wave of new but related IKARUSdilapidated Locky ransomware...

Locky Ransomware Trojan Spotted this August 2018

Reading Time: 4 minutes New Ransomware, Botnet Threat: IKARUSdilapidated Attack is August ’17 Locky Rebirth A Special Update from the Comodo Threat Intelligence Lab A new...

5 Points to Consider When Evaluating Next-Generation Endpoint Security Products

Reading Time: 3 minutesEndpoints are extremely vulnerable to security breaches. Hackers find endpoints to channel out infectious attacks through advanced persistent threats and...

Meet with Comodo Experts Face-to-Face at the Black Hat Lobby Lounge, July 24-27

Reading Time: 1 minute Got questions on cyber security, digital certificates, or Comodo solutions? Ask our experts face-to-face in the Comodo Lobby Lounge...

Join Comodo Webinar to Protect Yourself from Next-Gen Ransomware

Reading Time: 2 minutesPetya, WannaCry, and More: How to Protect Yourself from the New Generation of Ransomware Register here: https://www.comodo.com/landing/comodo-conducts-webinar-on-protection-against-ransomware Ransomware has been in...

Comodo Q1 2017 Threat Report: Russia is World’s No. 1 Malware Target

Reading Time: 2 minutes Comodo Threat Research Labs (CTRL) detected more than 25 million malware incidents in 223 top-level country code domains (ccTLD), in...

Cyber-threat Alert: Summer 2017 Phishing Trip to Avoid

Reading Time: 3 minutesA Special Update from the Comodo Threat Intelligence Lab Phishing attacks using emails have become very common but the techniques are...

Tackling Cyber Security Threats in 2017

Reading Time: 3 minutesBusinesses are on a helter-skelter as the current waves of cyber attacks make them double their efforts in protecting their...

Petya Ransomware | How It Spreads and How to Stay Ahead

After an examination of the encryption routine of the malware utilized as a part of the Petya/ExPetr assaults, experts understand that the malware...

Ransomware Defense: How to avoid falling victim to the next “WannaCry” [Webinar]

Reading Time: 2 minutesJoin NATO Cyber Centre Ambassador Kenneth Geers and Comodo cybersecurity expert Gregory Lewis on June 7 for a free webinar...

Wannacry Copycats Expected to Increase BUT There Are Solutions

Reading Time: 3 minutesHere we go again…it should come as no surprise to anyone who follows cybersecurity that another massive cyberattack has occurred,...

Latest Intelligence

spot_img
spot_img