Serious Discussion Comodo Internet Security 2025 was obliterated by an exploit!

Digmor Crusher

Level 25
Verified
Top Poster
Well-known
Jan 27, 2018
1,491
Xcitium product earns very little revenue. Not enough to justify dedicating a development team to it.

The basic formula in software development is that a software must generate 750,000 Euros in revenue to support 3 employees with a salary of less than 60,000 Euros on the payroll.

Xcitium very likely generates less than 300,000 Euros per year in revenue. That is not nearly enough to even support 1 dedicated development employee. Unless Melih hires developers from poor 2nd and 3rd world nations. He can hire an army of programmers in Zimbabwe or Vietnam for only 100,000 Euros.



The marketing can say whatever it wants.

The EULA however states that the buyer/end user assumes all risk and the product is sold "AS IS" with no warranty of fitness of purpose. The product is not guaranteed to provide any protection and upon installation the end user agrees to these terms.

What that means is this: "You use this product and if it is bypassed then it is on you, and not on Xcitium or Comodo."



A true Zero Trust protection begins at the physical layer and goes all the way to the application layer in the network stack. Then on the operating system it is from the physical layer to the application layer. Then in the non-digital security realm, Zero Trust includes physical and personnel security. Next, Zero Trust includes very robust Governance, Risk Management and Compliance (GRC). All of these are combined.

I don't know how many times an enterprise has stated to me "We purchased Product XYZ marketed as Zero Trust and thereby implemented a Zero Trust Protection Model throughout our organization." They are extremely disappointed when I tell them they don't understand Zero Trust and that they need to spend another 5,000,000 Euros to get there.

Very, very few service providers know how to properly implement true Zero Trust and even fewer enterprises and governments can do it themselves. I don't know how many times a government has said to me "We air gap these high sensitivity machines. They are Zero Trust."

It takes a lot of time, resources, patience, knowledge, experience, and money to do Zero Trust the right way. It can be done - and done very well - using 100% Microsoft security. Why is this? Because Microsoft does adhere fully to the first principle of security: "Security is not software. It is a process." Plus it works so closely with the U.S. Government that it integrates many of the capabilities developed by NIST Special Publications that inform & guide virtually 100% of global enterprise security practices.

Lots of people and organizations think "Zero Trust implementation is purchase Zero Trust software and deploy it."

Meanwhile, for a small company, a correct Zero Trust security implementation is a 2 to 3 year process requiring an army of SMEs and implementers. And that usually only happens in very highly regulated industries where serious negative consequences can happen. It is not at all unusual for a financial transaction processor to take a couple of years fully implementing PCI DSS. And that is just the beginning of the security requirements and regulations that are applicable to their operations.

Most every Zero Trust product out there just exploits the words "Zero Trust." Why? Because people have no idea what Zero Trust really is.

Many organizations fail Zero Trust assessments and audits.
Please stop. Every time some posts something about Comodo you go off on a rant saying the same things over and over. We know, you hate Comodo, but we don't have to be reminded of it every 5 minutes.
 

rashmi

Level 15
Jan 15, 2024
733
Video testing COMODO Internet Security 2025 v12.3.4.8162 against a Malware that was not isolated in the previous test:
Double-check the video to make sure everything is accurate. 😊 With a flash of digital energy, Comodo destroyed the malware, its processes ended, and its files deleted! 😎
 
  • HaHa
Reactions: Behold Eck

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,780
It takes a lot of time, resources, patience, knowledge, experience, and money to do Zero Trust the right way....

Meanwhile, for a small company, a correct Zero Trust security implementation is a 2 to 3 year process requiring an army of SMEs and implementers....

Many organizations fail Zero Trust assessments and audits.
(y)
 

vitao

Level 4
Thread author
Mar 12, 2024
176
@vitao,

Strangely, your video is now about CapCut (CapCut: Install multiple versions and keep them all working!). :unsure:
ow? sorry. maybe its because the video is not published yet. its saved as draft so only people with the link can watch it. the link is this:

edit.: i can not update the first post. if some mod please edit it with the correct link, without the playlist segment.
 
  • Like
Reactions: Andy Ful

vitao

Level 4
Thread author
Mar 12, 2024
176
Double-check the video to make sure everything is accurate. 😊 With a flash of digital energy, Comodo destroyed the malware, its processes ended, and its files deleted! 😎
is that something wrong with the video? o_O if so, please, show me what is inaccurate.

i tried with cis in its default config and the file was ignored by cis. i tried it with cruelsister config + changes of mine + loyisa recomendations regardless the script check and the file was ignored by cis too. so what was wrong?

ps.: i dont know if it seemed irony. if so, its not. im really curious about it. if ive donne something wrong, please show me and explain me whats wrong so i can conduct another test to show the results and do an errata for the video already online.
 

n8chavez

Level 20
Well-known
Feb 26, 2021
995
@vitao really seems to be turned on by anti-comodo content and be generally anti-comodo in general. Why? I wonder what the phycological reasons are for such a deep seeded hatred from some with nothing to say except that narrow scope.
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,780
This sample was created to download/run a malicious payload (exe.exe) from the hardcoded URL. Six minutes after it was created, the payload was uploaded to VirusTotal.
The URL hosted the payload for less than 90 minutes. I suspect this sample + payload was a POC or an early version of the malware.

Edit.
The sample should not be detected as trusted. However, if the payload was still hosted at the time of Comodo's analysis, the sample would not be flagged as Trusted.
 
Last edited:

simmerskool

Level 40
Verified
Top Poster
Well-known
Apr 16, 2017
2,919
Sorry for making reading very inconvenient.
As I'm not really the most intelligent guy , and unsure when to use commas and periods , and haven't really forced myself ever to try and improve my grammar.
(Hopefully this is correct usage ,but uncertain if what I'm currently writing is even correct usage of comma and period.)


(if anyone has some good site to practice , and learn you can send me a private message, and or anything to improve grammar , writing skills.)
you do fine imho
 
  • Thanks
Reactions: Vitali Ortzi

simmerskool

Level 40
Verified
Top Poster
Well-known
Apr 16, 2017
2,919

vaccineboy

Level 3
Verified
Well-known
Sep 5, 2018
141
ow... sorry dude. not my intend o_O dont get me wrong. english is not my primary language. some expressions this word have more sense of power and meaning in my language. this word can describes better some thing i want to say. as i dont have any problems with this word, i dont see any problem using it. if you have any problem with it, im sorry, ok? but some language costumes are hard to change. a better solution would be you marking my profile to be ignored, or hyde me, something like that. atleast until i can become able to pay more attention to your feelings.
Uhm you say English is not your native language as an excuse, yet you clearly know the unpleasant meaning of it, hence the masking. You say you don't have any problem with the word, yet you went out of your way to mask it in different manners. Be a man. If you want to say it, then say it.

The way I see it, you personify a software as a helpless woman and derive pleasure from perpetrating sexual assault unto that woman. That's highly obsessed and a bit sick in the head.

Let me remind you, Comodo is named after a lizard, unless that's in fact what you want to seek sexual pleasure from.
 

vitao

Level 4
Thread author
Mar 12, 2024
176
Uhm you say English is not your native language as an excuse, yet you clearly know the unpleasant meaning of it, hence the masking. You say you don't have any problem with the word, yet you went out of your way to mask it in different manners. Be a man. If you want to say it, then say it.

The way I see it, you personify a software as a helpless woman and derive pleasure from perpetrating sexual assault unto that woman. That's highly obsessed and a bit sick in the head.

Let me remind you, Comodo is named after a lizard, unless that's in fact what you want to seek sexual pleasure from.
it seems you have serious issues regardless the word r@pe. do you need any help bro? just say and we can try to figure a way to help you... o_O
 

vitao

Level 4
Thread author
Mar 12, 2024
176
I don`t mean to be mean(if you know what I mean?) but it`s just that some people don`t have the time to waste.

Regards Eck :)
so instead of saying things like that, nonsense, show whats wrong and what can be donne to make it right! :D
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top