The Ultimate Guide to Malware
2024 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports
Miercom on Ransomware
Check Point Infinity platform excels in Miercom's secur...
Wed, 7th Feb 2024
IDC on Firewall
Check Point launches Quantum Spark to boost cybersecuri...
Fri, 2nd Feb 2024
IDC on Firewall
Fortinet report reveals cyber threats & defence gaps in...
Fri, 2nd Feb 2024
Forrester Research on Ransomware
Proofpoint acquires Tessian to bolster AI-driven cybers...
Thu, 28th Dec 2023
AV-TEST on Smartphones
Avast warns of AI-driven scams in Q3 Threat Report ahea...
Fri, 17th Nov 2023
Expert columns
By Mark Gorrie of Gen Digital Inc
What is vishing? Tips to spot and avoid voice phishing ...
Yesterday
By Jonathan Tanner of Barracuda Networks, Inc.
The remote desktop tools most targeted by attackers in ...
Yesterday
By Martyn Crew of Gigamon
Five top concerns in private cloud visibility
Last week
By Mark Gorrie of Gen Digital Inc
Watch out! There are hidden dangers lurking in your PDF...
Last month
By Sumit Bansal of BlueVoyant
The rising threat of search engine ad abuse
Last month
More expert columns
By Conan Bradley of Kordia
Rebuilding after ransomware – The case of The British L...
Last month
By Gabriel Moss of Barracuda Networks Inc
How attackers weaponise generative AI through data pois...
Last month
By George Moawad of Genetec
Cybersecurity risks of legacy access control systems
Mon, 25th Mar 2024
By Jamie Moles of ExtraHop
How AI is powering the next-generation of cybercriminal...
Wed, 20th Mar 2024
By Nils Krumrey of Logpoint
The convergence of endpoint security & automated invest...
Fri, 15th Mar 2024
By Jana Dekanovska of CrowdStrike
IWD 2024: Defending against modern adversaries requires...
Fri, 8th Mar 2024
Top players
Recent news
About Data Protection
Revyz unveils malware scanning & enhanced data protecti...
2 days ago
About Cloud Services
Cradlepoint launches rapid-deploy secure network soluti...
Last week
About Spam
Tecala partners with Check Point to boost Australia's e...
Last week
About Virus
Half of UK businesses fall to cyber attacks despite bol...
Last month
About Cloud Services
Cybersecurity services market to hit $445.3 billion by ...
Last month
More news
About Security analytics
Picus Security unveils AI assistant for improved cyber ...
Last month
About Cyber Threats
Southeast Asia sees 43m local cyber threats to business...
Last month
About Ransomware
Zyxel Networks highlights AI's key role in SMB network ...
Sat, 30th Mar 2024
About Cloud Services
Rubrik urges shift from data backup to cyber resilience
Fri, 29th Mar 2024
About Cloud Services
World Backup Day highlights need for robust data protec...
Fri, 29th Mar 2024
Even more news
About Firewall
Global malware surge revealed in WatchGuard's latest In...
Thu, 28th Mar 2024
About Communication
Advanced malware AcidPour disrupts Ukrainian telecoms a...
Wed, 27th Mar 2024
About Telecommunications
Spark unveils online protections against cyber hazards ...
Fri, 22nd Mar 2024
About Ransomware
Ransomware attacks against companies rise by 27% in 202...
Fri, 22nd Mar 2024
About Government
Recorded Future reveals potential AI exploitation in 20...
Thu, 21st Mar 2024
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Technology Gifts, Firewall, and Advanced Persistent Threat Protection.
Powered by