The Ultimate Guide to Malware
2023 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports

Future Market Insights on DDoS
8.4% CAGR for DNS security market between 2023 and 2033...
Last week

Future Market Insights on Smartphones
Botnet detection market to be US$11 billion by 2032: FM...
Wed, 1st Mar 2023

KuppingerCole on Ransomware
Absolute recognised in KuppingerCole Leadership Compass...
Thu, 22nd Sep 2022

Gartner on Firewall
Fortinet attributes Gartner-reported growth to ZTNA app...
Wed, 17th Aug 2022

Forrester Research on Ransomware
Manufacturing industry hard hit by ransomware, Akamai f...
Thu, 28th Jul 2022
Expert columns

By Jonathan Tomek of Digital Element
The perils of proxies: the backdoor into your data
Last month

By Usman Choudhary of VIPRE
Taking a Multi-Faceted Approach to Ransomware Protectio...
Wed, 15th Feb 2023

By Mark Gorrie of Gen Digital
Twelve social media threats to watch for in 2023
Mon, 14th Nov 2022

By John Donovan of Sophos
Cyber insurance. A changing of the guard.
Thu, 15th Sep 2022

By Carolina Valencia of Aqua Security
How to protect against the growing fileless malware thr...
Wed, 31st Aug 2022
Interviews

Discussing Bitdefender
Exclusive: Bitdefender on ensuring cyber safety in toda...
Tue, 30th Aug 2022

Discussing Artificial Intelligence
Exclusive: NZ-based DEFEND offers global cyber protecti...
Tue, 9th Aug 2022

Discussing Work from Home
Can SMEs run a hybrid work model securely in Aotearoa?
Tue, 31st May 2022
More expert columns

By Dave Russell of Veeam Enterprise
Breaking the myths of Zero Trust model and understandin...
Wed, 31st Aug 2022

By Diego Betancur of Nozomi Networks
Zero Trust, but verify - finding the OT in ZerO Trust
Fri, 12th Aug 2022

By Stephen Kho of Avast
Big business in cryptocurrencies and cybercrime
Wed, 10th Aug 2022

By Corne Mare and Glenn Maiden of Fortinet
Cyber threats impacting Australian and New Zealand busi...
Thu, 28th Jul 2022

By Caitlin Condon of Rapid7
Zero-day attacks climb as hackers get more sophisticate...
Mon, 18th Jul 2022

By Oliver Tavakoli of Vectra
Examining the future of ransomware threats with Vectra’...
Wed, 6th Jul 2022
Top players
Recent news

About WatchGuard Technologies
Top malware trends and security threats revealed in new...
4 days ago

About Intel
Acronis leverages Intel Detection Technology to defend ...
Last week

About Security vulnerabilities
Check Point finds potential cybercrime scenarios in Cha...
Last week

About Trojan
Check Point reveals top threats and targeted industries...
Last month

About Research
CPR uncovers cyber espionage campaign targeting SEA gov...
Last month
More news

About Fortinet
FortiGuard Labs reports an increase of 50% in wiper mal...
Fri, 24th Feb 2023

About Cybersecurity
2022 a breakthrough year for malware targeting critical...
Fri, 17th Feb 2023

About Ransomware
Taiwan-based TeamT5 brings threat-based intel services ...
Thu, 9th Feb 2023

About Ransomware
China-based threat group targeting public cloud - Radwa...
Fri, 20th Jan 2023

About Nozomi Networks
Hacktivists used more destructive malware in 2022 - rep...
Thu, 19th Jan 2023
Even more news

About Cloud Security
Malware-delivering cloud apps nearly tripled in 2022
Thu, 19th Jan 2023

About Kaspersky
Kaspersky researchers reveal worrying development of AP...
Wed, 4th Jan 2023

About Microsoft
Sophos discovers malicious code disabling security soft...
Fri, 23rd Dec 2022

About Java
Zimperium teams discover new malware in Flutter develop...
Fri, 16th Dec 2022

About Security vulnerabilities
China-based threat group targeting SE Asia, says Mandia...
Fri, 9th Dec 2022
Other guides
You can read other related guides from Cybersecurity, Technology Gifts, Breach Prevention, Network Security, and Network Management.
Powered by