I can’t guarantee it as all systems are different in some respects, but it installed on mine with Windows 11 Pro (now on 25H2) in August w/o any issues and has been running flawlessly since then
Hey, I understand what it is, yes there is a difference, e.g. Windows 11 Pro/Windows 11 Home, my system is the second option from 25H2, of course I will take it into account, thanks for the answer.
I completely agree. A PC doesn’t just have the operating system; it also runs many other programs. Just the other day, I had a problem with “comodo” until I discovered that another program was involved, not comodo itself.
Windows 11
25H2
xxxx.7462
would there be any updates or news on the upcoming CIS 2026?
New threats await us, or rather, are in store for us:
Some precautions and countermeasures can be found there.
The analyses from Bot AI Assistant Verified are particularly interesting regarding:
-
Protection Scorecard (Detection & Prevention)
-
Performance & Usability
-
Feature Showdown (The Extras)
How do ESET, McAfee, and comodo compare to the above requirements?
The analyses from @Bot AI Assistant Verified are particularly interesting regarding:
How do ESET, McAfee, and comodo compare to the above requirements?
All of this leads to the requirements for security software.
I have a lot of faith in heuristic testing, but I don’t know how effective it is in comodo’s AV.
Here is a statement from @Andy Ful
Comodo Internet Security (CIS) was not tested recently by SE Labs. Comodo Antivirus (CAV) was tested instead.
The difference is that CIS blocks the Internet connections of contained processes and CAV does not.
CIS is poorly tested compared to other popular AVs.
@Bot adds:
hanks @andy Ful—that’s a solid point I overlooked in my earlier post. Thanks for the clarification ………a solid point I overlooked in my earlier post. You’re right; SE Labs has been testing Comodo Antivirus (CAV) more recently……, but Comodo Internet Security (CIS) hasn’t been in their lineup as often. The key difference you mentioned about CIS’s containment blocking internet access for sandboxed processes is huge—it adds an extra layer of zero-trust isolation that CAV lacks, ……It’s a shame CIS gets less lab attention overall; that might skew perceptions compared to heavyweights like ESET or McAfee, which are tested exhaustively.
Just my 2p but given that they have to execute a custom C++ loader according to that post, that loader would be untrusted/unknown by CIS as would the python script/stager so sandboxed/blocked and even if that isn;t triggered, a payload eventually gets executed which will also be blocked. Well, that’s as far as I understand it. I’m sure @cruelsister will be able to clarify ![]()
I hope so too. From what I’ve read, it seems that comodo CIS still offers quite good protection, because it’s quite frightening to read this (it seems as if there’s almost no remedy against it, or at least not one that quickly):
A novel malware delivery technique dubbed “PixelCode” has been demonstrated, showing how malicious executables can be encoded directly into video frames.
The approach allows threat actors to host these videos on legitimate platforms such as YouTube, helping the malware evade traditional detection mechanisms.
The PixelCode technique transforms binary executable files into visual pixel data, effectively disguising malware as harmless multimedia content.
By converting each byte of an executable into structured color matrices, attackers can embed entire payloads within image or video files without exposing their raw binary form.
And of course, I’m also hoping for a new version of CIS that offers some protection against new spying methods, if it hasn’t always had that capability. But with such a potential attack vector, user caution is useless. Is the heuristic method even possible here?
This interesting attack is a form of file obfuscation that uses Python encoder to convert a malicious C++ payload.
As it happens, I’m actually playing with a fresh malware stealer that works similarly but uses the LUA programming language instead of Python This one is new (from our friends in Russia, APT29) and is very pretty,
I’m thinking of doing a video with it against a tricked-out WD followed by one against CF.
Thanks. Would love to see the video!
I actually have finished it- it will be a followup (part 2) of the video that I published earlier today: Malware Obfuscation Part 1
Part 2 later this week.
Oh cool, thanks for doing these. Look forward to CFW’s result.
Thank you so much for your efforts. I’m very excited to see the result.
@EricCryptid - I hope cis recognizes this.
Warning:
2025 is over, 2026 is coming – a look back and a look ahead at cybercrime
“The threat landscape is expanding from large-scale ransomware campaigns to identity-centric attacks, AI-powered fraud, and insider risks, which are further amplified by increasing automation,” concludes the X-Ops report. “Security leaders must effectively establish their control mechanisms for identity, AI governance, and insider risks to stay ahead.”
Translated from: https://www.sophos.com/de-de/blog/2025-geht-2026-kommt-ein-rueck-und-ausblick-in-sachen-cyberkriminalitaet
An AI commented on my request and questions:
Consider layered defence – No single AV can block every threat.
Monitor CVE feeds – Keep an eye on security advisories (e.g., NVD, the vendor’s forum) for any new vulnerabilities affecting CIS 2025.
Bottom line
Comodo CIS 2025 can still be trusted provided you keep it fully patched and understand that, like any security product, it is not immune to emerging threats. Regular updates and a defense‑in‑depth approach are essential to maintain confidence in its protection.
Dear cruel sister, thank you for videos 1 and 2!!!
You deserve this!
![]()
Thank you so much for your effort and hard work!