The Ultimate Guide to Malware
2024 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports
Gartner Peer Insights on Ransomware
SentinelOne earns top ratings in Gartner review for sec...
This month
IDC on Data Protection
Acronis launches comprehensive XDR solution for MSPs
Last month
Gartner on SaaS
Logpoint names Mikkel Drucker as new CEO to drive growt...
Thu, 30th May 2024
Gartner on SIEM
Splunk celebrates 10 years as Leader in Gartner Magic Q...
Thu, 16th May 2024
Miercom on Ransomware
Check Point Infinity platform excels in Miercom's secur...
Wed, 7th Feb 2024
Expert columns
By Raj Samani of Rapid7
Defending against APTs: A learning exercise with Kimsuk...
Last week
By Mina Mousa of Extreme Networks
Adapting cybersecurity strategies to the escalating thr...
This month
By Trevor Dearing of Illumio
Why the answer to AI threats is not more AI
Last month
By Stephen Kho of Avast
YouTube, the backdrop of a scammer’s play
Last month
By Audra Simons of Everfox
Fighting back against the growing threat of ransomware
Last month
More expert columns
By Cradlepoint
Singapore cyber security bill amendment: Securing your ...
Last month
By Gigamon
Network visibility: How to improve it and why it will i...
Last month
By Anthony Daniel of WatchGuard Technologies
How the evolution of AI will reshape cybersecurity
Mon, 6th May 2024
By Simon Howe of ExtraHop
There is no zero trust without network visibility
Fri, 3rd May 2024
By Mark Gorrie of Gen Digital Inc
What is vishing? Tips to spot and avoid voice phishing ...
Thu, 2nd May 2024
By Jonathan Tanner of Barracuda Networks
The remote desktop tools most targeted by attackers in ...
Thu, 2nd May 2024
Top players
You can read more from the top players Check Point Software, Apple, Trend Micro, Kaspersky, and Symantec.
Recent news
About Network visibility
Dragos uncovers new malware FrostyGoop targeting ICS sy...
4 days ago
About Bring Your Own Device
Fortinet reveals rising cyber threats targeting Paris 2...
Last week
About Security vulnerabilities
Endor Labs warns of critical vulnerabilities in CocoaPo...
This month
About Sustainability
Zyxel Networks unveils new WiFi 6 security router for S...
This month
About Threat intelligence
NCSC's Malware Free Network disrupts 10 million cyber t...
This month
More news
About Ransomware
ANZ employees most likely to fall for phishing, report ...
This month
About Software Updates
Bitdefender & Netgear report reveals major IoT vulnerab...
Last month
About Smartphones
BlackBerry cyber report reveals 3.1 million attacks in ...
Last month
About Smartphones
BlackBerry thwarts 3.1 million cyberattacks in early 20...
Last month
About Development
Elastic discovers new attack vector in Microsoft Manage...
Last month
Even more news
About Risk & Compliance
Foregenix spins off tech to new venture Turaco Labs
Last month
About Cloud Services
New report details evolution of P2Pinfect into ransomwa...
Last month
About Cloud Services
Businesses to increase cloud use by 85% in next five ye...
Last month
About Ransomware
Global survey reveals growing inadequacies in cyber thr...
Last month
About Firewalls
Chinese espionage campaign targeting Southeast Asia rev...
Last month
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Advanced Persistent Threat Protection, Firewalls, and Ransomware.
Powered by