Serious Discussion Public DNS malware filters tested

Bot

AI-powered Bot
Apr 21, 2016
3,819
Hello! Thank you for bringing up that information. It's good to know that the article does not include ControlD or NextDNS in their testing. However, keep in mind that the article provides a comprehensive list of tested public DNS malware filters to give an idea about their efficiency in blocking malicious domains.
 
F

ForgottenSeer 97327

Article: Public DNS malware filters tested

Sadly test doesnt include some dnses like controld or nextdns
DNS0.EU topped the the list. DNS0.EU is based on Next_DNS in default settings as good as DNS0.EU Sadly the test is incorrect, because CERT PL is co-funded by the Connecting Europe Facility which also sponsors DNS0.EU. So probably all malware URL's of CERT-PL were provided to DNS0.EU (and NEXT_DNS) 🤣🤣🤣 the real winners are Clean Browsing and QUAD9 (I am a NEXT-DNS user, so I would have liked DNS0.EU to win without the CERT-PL advantage).
 
Last edited by a moderator:

TairikuOkami

Level 36
Verified
Top Poster
Content Creator
Well-known
May 13, 2017
2,566
F

ForgottenSeer 97327

Prevalent malware signed by Comodo certificates.
That is why the behavioral blocker component of Comodo works so well. they know exactly which signatures they should run in a sandbox. It is a brilliant tactic. :ROFLMAO::ROFLMAO::ROFLMAO:
 

Trident

Level 30
Verified
Top Poster
Well-known
Feb 7, 2023
1,984
That’s not from now and it’s not news. Comodo as a business is only interested in beefs with other companies (such as the beef they had with Symantec when Google threatened to revoke their certificates). Their other hobby is signing malware. For example Trend Micro has this research of code signing abuse that claims Comodo (Sectigo) are easiest to abuse and are sold cheaply on the black market. The research was done around 2015 and the paper was published 2018.


Oh and they have various other hobbies like commenting how good they are on their forum, praising their software (apart them and 5 fans nobody else will), not updating, not fixing bugs and others. Their DNS has always been a disgrace too.
 

Trident

Level 30
Verified
Top Poster
Well-known
Feb 7, 2023
1,984
if i remember correctly, comodo used to use neustar as their dns provider, neustar itself was doing great blocking malicious content, not sure why comodo ditched(?) them or are they using the non filter dns of them still
They may have used NeuStar but I don’t remember that. In 2014 they acquired DNS.com (one fading DNS provider that perfectly fits and matches the fading Comodo brand). They then proceeded to rebrand from DNS.com to DNSbyComodo.com
Comodo doesn’t have the appropriate threat intelligence to provide secure DNS services as they don’t do any campaign hunting and don’t collect any telemetry related to malicious URLs.

 

Zappathustra

Level 2
Jul 1, 2019
48
That’s not from now and it’s not news. Comodo as a business is only interested in beefs with other companies (such as the beef they had with Symantec when Google threatened to revoke their certificates). Their other hobby is signing malware. For example Trend Micro has this research of code signing abuse that claims Comodo (Sectigo) are easiest to abuse and are sold cheaply on the black market. The research was done around 2015 and the paper was published 2018.


Oh and they have various other hobbies like commenting how good they are on their forum, praising their software (apart them and 5 fans nobody else will), not updating, not fixing bugs and others. Their DNS has always been a disgrace too.

I've seen love stories start like this. Trident, open your heart to beloved Comodo!
 
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top