- ProductsDRAGON ENTERPRISEComodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions.PLATFORM PRODUCTS
-
Impenetrable cybersecurity without sacrificing usability
-
Gain detailed visibility into all your endpoints activities
-
Reduce the attack surface to remediate and patch
-
Fortify mobile devices that exit and enter your network
-
Keep endpoints safe from known threat signatures
-
Setup device network and security policies quickly
TECHNOLOGY & PROCESS-
Patented to ensure absolute isolation from threats
-
Insights from deep web and dark web to eliminate risk
-
Our pioneered approach has shifted the industry
-
100% trust an all files at lightning speeds
-
- ServicesWORLDWIDE SERVICESNo one can stop zero-day malware from entering your network, but Comodo can prevent it from causing any damage. Zero Trust. Zero Breaches. Zero damage.THREAT SERVICES
-
Retain experts to investigate an incident to start remediation
-
Our experts closely monitor changes to your environment 24x7x365
-
Cybersecurity experts will continuously hunt suspicious endpoint activity
SUPPORT, DEPLOY, MAINTAIN-
Ensure your installations are properly deployed
-
Trouble with maintaining your products? Get help now
-
Align your success with optimal security performance
-
- Tools
- For HomeFOR HOMEWEB BROWSERBROWSER ADD-ONS & EXTENSIONS
- Partners
- ResourcesRESOURCE DISCOVERYComodo introduced a new approach to add managed cybersecurity and endpoint protection to your customers benefit, right into your existing programs.KNOWLEDGE BASETHREAT LABS
- Company
Comodo Global Malware Report 2017: Malicious Cyber Activity Surges Coincide with Geopolitical Events
CLIFTON, N.J. – March 13, 2018 – Comodo, a global innovator of cybersecurity solutions, today announced the publication of the Comodo Threat Research Labs’ Global Malware Report 2017, which culminates a year of security analysis and research into threat patterns. Among its major findings: 2017 was a year of multiple geopolitical events that corresponded with major malware spikes in enterprise security. From elections to North Korea nuclear threats and missile launches, it seems likely that cyber actors are using geopolitical events to achieve cyber activism and other goals.
In the internet era, all major real-world events have a reflection in cyberspace. Comodo witnessed diverse malware attacks coinciding with geopolitical events, including:
- U.S. elections: A massive spike in Kryptik trojans occurred on Oct. 24, 2017, with more than 94 percent of nearly 300,000 trojans focused on the state of Virginia, where a close and hard-fought gubernatorial election took place.
- East Asia: The country of China experienced malware growth, with a virus surge of nearly 20,000 when China’s President Xi visited the U.S. in April 2017 and North Korea fired test missiles. Similarly, Trojan attacks in China spiked to 30,000 during the Silk Road Summit in early to mid-May 2017, 40,000 in early August 2017 after an earthquake and a U.S.-China naval dispute, and 55,000 on Sept. 3, 2017, after China joined the U.S. and Russia in condemning a North Korea nuclear test.
- North Korea: Comodo is one of the few commercial cybersecurity companies with visibility into North Korea. We witnessed a startling Trojan increase in the country on Sept. 19, 2017, corresponding with a speech at the United Nations where U.S. President Donald Trump threatened to destroy North Korea.
The report also charts changes in malware pattern detections across countries, industries and events. Cybersecurity decision makers can use the report to evaluate their preparedness for global cyberthreats and make critical adjustments to their strategy and technology, services, and talent investments.
This publication is the year-end edition of a quarterly threat report and security analysis series published by Comodo Threat Research Labs, a group of more than 120 security professionals, ethical hackers, and computer scientists and engineers, who work for Comodo full-time analyzing enterprise security and malicious cyber activity trends across the globe. Download the full report here.
About Comodo
Comodo Security Solutions is transforming cybersecurity with protection for endpoints, networks and web servers that is proven to be effective against the most advanced malware threats, including even new and unknown threats. The company’s innovative autocontainment technology provides a trust verdict for every file, so that only safe files can run, without impacting user productivity or computer resources. With its global headquarters in Clifton, New Jersey, Comodo also has international offices in China, India, the Philippines, Romania, Turkey and Ukraine. For more information, visit comodo.com or our blog. You can also follow us on Twitter (@ComodoNews) or LinkedIn.
Contact:
Deb Montner, Montner Tech PR
203-226-9290
dmontner@montner.com