Serious Discussion Comodo Internet Security 2025 was obliterated by an exploit!

Status
Not open for further replies.
Oct 17, 2023
108
If anyone is interested. Here is the new topic about the new cis release against the loyisa exploit/poc.
1734373050233.png

@vitao POC is fixed
conversation is done
 
Oct 17, 2023
108
Non profits , schools and some enterprise use their enterprise product because they claim 100% bs and are cheaper then any alternative
I really like the idea of not full virtualization that comodo does because it uses less performance then virtualization but both their container can be escaped and trusted dlls ,exes ( trusted lolbins) are automatically run without containment while unlike Kaspersky , other av software it doesn't have good behavior detection to help against a bypass as viruscope is awful
I'm still using comodo on most my PCs (usually as a layer) so some bypasses might be stopped by either hitmanpro.alert or ESET on my system or checkpoint threat emulation that I have in the browser extension so I'm safe against 99.99%+ and I usually submit suspicious files to Broadcom before running them using Sample Submission | SymSubmission

But hopefully one day I could use only comodo comfortably if they do improve it as comodo has excellent performance usage and I have one low end 2gb ram with emmc laptop that can't run ESET on it without performance issues nor defender and comodo didn't seem to slow io , use much ram and it's a gift to low end machines making them mostly secure while not having to go chrome os route or any too restrictive policy config

So I definitely find comodo very useful and because it's not perfect if anyone uses comodo use it as a layer if possible with some free av (Kaspersky free, defender , bitdefender free ,avast free etc )
Machine Learning and Dynamic Behaviour Analysis is not good in Xcitium?
1734374705999.png

Bro what are you talking about i see VirusScope performing very good against unknown malware
 
  • Like
Reactions: simmerskool

vitao

Level 3
Thread author
Mar 12, 2024
108
View attachment 286649
@vitao POC is fixed
conversation is done
no, its not and the conversation is not done. comodo can try to avoid this subject but we, users, will not. talk to loyisa and ask him for the latest poc. that is the one im running and latest cis did nothing about it. with default config and with recomended configs by cruelsistes/melih and loyisa himself/herself.

now i would like to ask: why the need of "ending the conversation" when the problem was not solved? what are you afraid of? o_O
 
  • +Reputation
Reactions: roger_m
Oct 17, 2023
108
no, its not and the conversation is not done. comodo can try to avoid this subject but we, users, will not. talk to loyisa and ask him for the latest poc. that is the one im running and latest cis did nothing about it. with default config and with recomended configs by cruelsistes/melih and loyisa himself/herself.

now i would like to ask: why the need of "ending the conversation" when the problem was not solved? what are you afraid of? o_O
The POC is fixed for the previous exploit i said so it means Xcitium fixed the exploit and thats it
the conversation is ended here right?
 

vitao

Level 3
Thread author
Mar 12, 2024
108
The POC is fixed for the previous exploit i said so it means Xcitium fixed the exploit and thats it
the conversation is ended here right?
ah. sorry. agree. maybe my english was between understanding :p anyway, the subject regardless the poc v2, the one who evades sandbox, is really ended. now we need to talk about the poc v3, the one who execute an ransomware and cis do nothing...
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top