The Ultimate Guide to Malware
2024 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports
Miercom on Ransomware
Check Point Infinity platform excels in Miercom's secur...
Wed, 7th Feb 2024
IDC on Firewall
Check Point launches Quantum Spark to boost cybersecuri...
Fri, 2nd Feb 2024
IDC on Firewall
Fortinet report reveals cyber threats & defence gaps in...
Fri, 2nd Feb 2024
Forrester Research on Ransomware
Proofpoint acquires Tessian to bolster AI-driven cybers...
Thu, 28th Dec 2023
AV-TEST on Smartphones
Avast warns of AI-driven scams in Q3 Threat Report ahea...
Fri, 17th Nov 2023
Expert columns
By Martyn Crew of Gigamon
Five top concerns in private cloud visibility
3 days ago
By Mark Gorrie of Gen Digital Inc
Watch out! There are hidden dangers lurking in your PDF...
This month
By Sumit Bansal of BlueVoyant
The rising threat of search engine ad abuse
This month
By Conan Bradley of Kordia
Rebuilding after ransomware – The case of The British L...
This month
By Gabriel Moss of Barracuda Networks Inc
How attackers weaponise generative AI through data pois...
This month
More expert columns
By George Moawad of Genetec
Cybersecurity risks of legacy access control systems
Last month
By Jamie Moles of ExtraHop
How AI is powering the next-generation of cybercriminal...
Last month
By Nils Krumrey of Logpoint
The convergence of endpoint security & automated invest...
Last month
By Jana Dekanovska of CrowdStrike
IWD 2024: Defending against modern adversaries requires...
Last month
By Gemma Moore of Cyberis
Take a closer look at your company's software supply ch...
Wed, 21st Feb 2024
By Shane Buckley of Gigamon
Why 2024 is the year of scaling security efficiencies
Thu, 8th Feb 2024
Top players
Recent news
About Cloud Services
Cradlepoint launches rapid-deploy secure network soluti...
Yesterday
About Spam
Tecala partners with Check Point to boost Australia's e...
4 days ago
About Virus
Half of UK businesses fall to cyber attacks despite bol...
This month
About Cloud Services
Cybersecurity services market to hit $445.3 billion by ...
This month
About Security analytics
Picus Security unveils AI assistant for improved cyber ...
This month
More news
About Cyber Threats
Southeast Asia sees 43m local cyber threats to business...
This month
About Ransomware
Zyxel Networks highlights AI's key role in SMB network ...
Last month
About Cloud Services
World Backup Day highlights need for robust data protec...
Last month
About Cloud Services
Rubrik urges shift from data backup to cyber resilience
Last month
About Firewall
Global malware surge revealed in WatchGuard's latest In...
Last month
Even more news
About Communication
Advanced malware AcidPour disrupts Ukrainian telecoms a...
Last month
About Telecommunications
Spark unveils online protections against cyber hazards ...
Last month
About Ransomware
Ransomware attacks against companies rise by 27% in 202...
Last month
About Government
Recorded Future reveals potential AI exploitation in 20...
Last month
About Bring Your Own Device
Australia ranks high in global malware detection rates,...
Last month
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Technology Gifts, Firewall, and Advanced Persistent Threat Protection.
Powered by