DRAGON ENTERPRISE PLATFORM
IT Service Management
For MSSPs & MSPs
Am I Breached?
Am I Secured?
Am I Ready?
- Why Comodo?
SELECT YOUR INDUSTRY TYPE
Media & Press
Threat Research Labs
Comodo Cybersecurity Releases Q2 Global Threat Report
Trojans took the lead in a dynamic and dangerous malware marketplace
CLIFTON, N.J. – August 6, 2018 – Comodo Cybersecurity, a global leader in threat intelligence and malware cyber defense, today announced the second iteration of its Quarterly Global Threat Report which offers unmatched insight into today’s evolving threat landscape. In these reports, experts from the Comodo Cybersecurity Threat Research Labs present timely threat findings and analysis, and highlight today’s most pervasive malware and cyber-attacks. The report also highlights and analyses malware patterns that focus on specific geographies and industries in response to commercial and geopolitical trends and events.
Among the major findings in Q2, Comodo Cybersecurity discovered a significant increase in Trojan activity, and reports Trojans as the quarter’s leading malware type on the market. This detection is notable because of Trojans’ ability to deliver other malware and rapidly spread via phishing emails, which inevitably creates a new challenge for IT security departments.
“Trojans have always been a prevalent and dangerous threat, but their evolution in Q2 is particularly interesting as they are now able to hide for longer periods of time and persist despite the efforts of some of the most efficient AV solutions on the market,” commented VP of Comodo Cybersecurity Threat Research Labs, Fatih Orhan. “Q2 has by far displayed the most sophisticated variants of Trojan malware we have ever discovered.”
Other highlights from the Q2 Global Threat Report include:
– A slight decrease in cryptomining software but a sharp increase in their harmful capabilities: better concealment and stronger persistence
– Android users targeted by diverse malware: spying tools are most persistent followed by banking malware, ransomware and cryptominers
– Worms became a strategic threat, massively spreading in diverse forms and methods, attacking via networks, email, social media, and torrents
The intelligence presented in the Q2 Global Threat Report leverages Comodo Cybersecurity global presence of more than 86 million endpoints and affords readers of the report the information and awareness needed to stay ahead of these increasingly sophisticated cyber threats. These insights also enable Comodo to design and deploy innovative solutions to combat both current and future threats.
“Our Threat Research Labs and worldwide presence provide industry-leading insight into the global malware threatscape,” noted Comodo Cybersecurity President and CEO Steve Subar. “This quarterly report and the research expertise and infrastructure behind it, critically informs Comodo research and development, and provides the cybersecurity industry with actionable intelligence.”
For more information, download the complete report here.
Visit Comodo Cybersecurity at Black Hat
Comodo Cybersecurity will be present at this year’s Black Hat USA in Las Vegas, Nevada (booth #1456 and Lobby Lounge) showcasing its innovative cybersecurity platform that renders attacks useless across the LAN, web and cloud. The Comodo ONE platform includes endpoint security, managed detection and response, secure cloud and internet access, and threat intelligence.
About Comodo Cybersecurity
In a world where preventing all cyberattacks is impossible, Comodo Cybersecurity delivers an innovative cybersecurity platform that renders threats useless, across the LAN, web and cloud. The Comodo One platform enables customers to protect their systems and data against even military-grade threats, including zero-day attacks. Comodo Cybersecurity has experts and analysts in 193 countries, protects 85 million endpoints and serves 200,000 customers globally. Based in Clifton, New Jersey, the company has a 20-year history of protecting the most sensitive data for both businesses and consumers worldwide. For more information, visit comodo.com or our blog. You can also follow us on Twitter (@ComodoDesktop) and LinkedIn.
Montner Tech PR
Deb Montner, email@example.com