The Ultimate Guide to Malware
2024 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports
Miercom on Ransomware
Check Point Infinity platform excels in Miercom's secur...
Last month
IDC on Firewall
Check Point launches Quantum Spark to boost cybersecuri...
Last month
IDC on Firewall
Fortinet report reveals cyber threats & defence gaps in...
Last month
Forrester Research on Ransomware
Proofpoint acquires Tessian to bolster AI-driven cybers...
Thu, 28th Dec 2023
Expert columns
By George Moawad of Genetec
Cybersecurity risks of legacy access control systems
5 days ago
By Jamie Moles of ExtraHop
How AI is powering the next-generation of cybercriminal...
Last week
By Nils Krumrey of Logpoint
The convergence of endpoint security & automated invest...
This month
By Jana Dekanovska of CrowdStrike
IWD 2024: Defending against modern adversaries requires...
This month
By Gemma Moore of Cyberis
Take a closer look at your company's software supply ch...
Last month
More expert columns
By Shane Buckley of Gigamon
Why 2024 is the year of scaling security efficiencies
Last month
By Nyuk Loong Kiw of Spark
Combating cybercrime in NZ with a robust cybersecurity ...
Wed, 17th Jan 2024
By Anthony Daniel of WatchGuard Technologies
Five ways cybercriminals are making use of ChatGPT
Tue, 13th Jun 2023
Top players
You can read more from the top players Check Point Software, Apple, Trend Micro, Kaspersky, and Symantec.
Recent news
About Cyber Threats
Rubrik urges shift from data backup to cyber resilience
Yesterday
About Data Protection
World Backup Day highlights need for robust data protec...
Yesterday
About Ransomware
Global malware surge revealed in WatchGuard's latest In...
2 days ago
About Communication
Advanced malware AcidPour disrupts Ukrainian telecoms a...
4 days ago
About Telecommunications
Spark unveils online protections against cyber hazards ...
Last week
More news
About Ransomware
Ransomware attacks against companies rise by 27% in 202...
Last week
About Government
Recorded Future reveals potential AI exploitation in 20...
Last week
About Ransomware
Australia ranks high in global malware detection rates,...
This month
About Scams
Singtel's SingVerify to tackle scams, boost digital sec...
This month
About Social Media
Silobreaker launches integration with MITRE ATT&CK
This month
Even more news
About IT professionals
Global companies ill-prepared for AI-boosted cyber thre...
This month
About Remote Working
Security risks plague SMEs in shift to remote working
This month
About Docker
Cado Security uncovers sophisticated Linux malware camp...
This month
About Cyber Threats
AI tools drive rapid surge in sophisticated phishing at...
This month
About Dark web
36m AI & gaming credentials breached, Kaspersky reveals
Last month
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Technology Gifts, Firewall, and Ransomware.
Powered by