The Ultimate Guide to Malware
2024 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports
Gartner on Ransomware
Check Point Software named Visionary in 2024 Gartner re...
Fri, 27th Sep 2024
Forrester Wave on Ransomware
ColorTokens named leader in Forrester Wave for microseg...
Thu, 29th Aug 2024
IDC on Endpoint Protection
Appdome unveils GenAI-powered Threat Resolution Center
Thu, 8th Aug 2024
Gartner Peer Insights on Ransomware
SentinelOne earns top ratings in Gartner review for sec...
Wed, 3rd Jul 2024
IDC on Data Protection
Acronis launches comprehensive XDR solution for MSPs
Thu, 13th Jun 2024
Expert columns
By Alistair Miller of Aura Information Security
New year, new protections: Top tips to safeguard your b...
2 days ago
By Jake King of Elastic Security
Elastic Security's top three cybersecurity predictions ...
4 days ago
By Sneha Banerjee of ManageEngine
Sneaky scams to watch for this holiday season (and how ...
Last week
By Sadiq Iqbal of Check Point Software Technologies
From deepfakes to ransomware: The key trends which will...
This month
By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Last month
More expert columns
By Dakshitaa Babu of SquareX
Attackers break malware into tiny pieces and bypass you...
Fri, 20th Sep 2024
By Dakshitaa Babu of SquareX
Hiding in plain sight – How attackers conceal malware i...
Fri, 13th Sep 2024
By Dakshitaa Babu of SquareX
Unmonitored channels – Express malware delivery bypassi...
Thu, 5th Sep 2024
By Raj Sivaraju of Arete
Ransomware trends: A threat to insurance business conti...
Tue, 13th Aug 2024
By Chaim Mazal of Gigamon
The 2024 Olympics’ unseen cyber competition
Thu, 8th Aug 2024
By Stephen Kho of Avast
You’re telling me that ad was fake? Malvertising is sne...
Thu, 8th Aug 2024
Top players
You can read more from the top players Check Point Software, Volution, Apple, Kaspersky, and Trend Micro.
Recent news
About Phishing
ReliaQuest reveals increase in malware via fake CAPTCHA...
Yesterday
About Elections
Exabeam forecasts AI to transform APAC cybersecurity by...
2 days ago
About Firewalls
WatchGuard predicts rise in AI-driven cyber threats by ...
3 days ago
About Software Updates
Kaspersky reports rise in malware threats & attacks in ...
3 days ago
About Data management
Chinese cyberespionage targets European IT service firm...
3 days ago
More news
About Cyber Threats
Elastic identifies stealthy malware toolkit named PUMAK...
3 days ago
About Smartphones
Elastic Security Labs reveals new GOSAR backdoor threat
3 days ago
About Ransomware
Ransomware report reveals evolving threat landscape in ...
4 days ago
About Threat intelligence
Arctic Wolf uncovers 0-day Cleo MFT vulnerability explo...
4 days ago
About Firewalls
2024 cyber threat landscape highlights key attack trend...
4 days ago
Even more news
About Surveillance
Iran-linked malware targets critical infrastructure in ...
Last week
About Government
Open source malware up 156%, Sonatype research shows
Last week
About Unified Communications
CyTwist unveils engine to detect AI-powered cyberattack...
Last week
About Phishing
Kaspersky warns of phishing scams using Telegram Premiu...
Last week
About Threat intelligence
Chinese espionage targets European IT providers in new ...
Last week
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Advanced Persistent Threat Protection, Email Security, and Ransomware.
Powered by