The Ultimate Guide to Malware
2025 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports

Gartner on SaaS
Palo Alto Networks invests in Asia-Pacific cloud securi...
Last month

Gartner on MFA
AI to halve time needed for account takeover by 2027
Last month

Frost & Sullivan on Gaming
Group-IB's fraud solution now accessible via AWS Market...
Last month

Miercom on Cloud Security
Check Point's Infinity Platform excels in new security ...
Fri, 7th Feb 2025

IDC MarketScape on Firewalls
Sophos MDR services protect 26,000 organisations global...
Tue, 14th Jan 2025
Expert columns

By Dakshitaa Babu of SquareX
Why ClickFix attacks are outpacing enterprise security
Last month

By Bob Gilbert of Netskope
Bad AI, good AI: harnessing AI for a stronger security ...
Last month

By Martin Zugec of Bitdefender
Cybersecurity predictions 2025: Hype vs. reality
Fri, 17th Jan 2025

By Stephen Kho of Avast
Ransomware is doubling down — What you need to know abo...
Tue, 7th Jan 2025

By Alistair Miller of Aura Information Security
New year, new protections: Top tips to safeguard your b...
Thu, 19th Dec 2024
More expert columns

By Jake King of Elastic Security
Elastic Security's top three cybersecurity predictions ...
Tue, 17th Dec 2024

By Sneha Banerjee of ManageEngine
Sneaky scams to watch for this holiday season (and how ...
Fri, 13th Dec 2024

By Sadiq Iqbal of Check Point Software Technologies
From deepfakes to ransomware: The key trends which will...
Mon, 9th Dec 2024

By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Thu, 14th Nov 2024

By Dakshitaa Babu of SquareX
Attackers break malware into tiny pieces and bypass you...
Fri, 20th Sep 2024

By Dakshitaa Babu of SquareX
Hiding in plain sight – How attackers conceal malware i...
Fri, 13th Sep 2024
Top players
You can read more from the top players Extend, Check Point Software, Kaspersky, Volution, and Apple.
Recent news

About Social Media
New Netflix series 'Adolescence' sparks safety debate
Last week

About Threat intelligence
EclecticIQ unveils Intelligence Center 3.5 to fight cyb...
Last week

About Distributed Denial of Service
Study reveals rising cyber threats to financial industr...
Last week

About Firewalls
Cyber experts warn of public Wi-Fi risks in Australia
This month

About Software Updates
Kaspersky discovers & patches zero-day Chrome flaw
This month
More news

About Government
Sonatype reports rise in open source malware to 17,954
This month

About Cloud Security
ESET unveils new strategies to combat evolving cyber th...
Last month

About Unified Communications
How new malware SHELBY targets telecom via phishing
Last month

About Data Protection
Cybercriminals shift focus to mobiles & cryptocurrencie...
Last month

About Firewalls
Bitdefender uncovers the mysterious RedCurl ransomware ...
Last month
Even more news

About Ransomware
UK organisations face significant rise in phishing thre...
Last month

About Ransomware
Cybercriminals advance with MEDUSA ransomware campaign
Last month

About Software Updates
Netflix series Zero Day highlights real cyber threats
Last month

About Phishing
Red Canary warns of surge in identity & AI threats for ...
Last month

About Identity Theft
Vivek Ramachandran to discuss cyber threats in Singapor...
Last month
Other guides
You can read other related guides from Cybersecurity, Advanced Persistent Threat Protection, Email Security, Ransomware, and Breach Prevention.
Powered by